{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Joomla! CMS versions 5.x ant\u00e9rieures \u00e0 5.0.3","product":{"name":"Joomla!","vendor":{"name":"Joomla!","scada":false}}},{"description":"Joomla! CMS versions 4.x ant\u00e9rieures \u00e0 4.4.3","product":{"name":"Joomla!","vendor":{"name":"Joomla!","scada":false}}},{"description":"Joomla! CMS versions ant\u00e9rieures \u00e0 3.10.15-elts","product":{"name":"Joomla!","vendor":{"name":"Joomla!","scada":false}}}],"affected_systems_content":"","content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2024-21725","url":"https://www.cve.org/CVERecord?id=CVE-2024-21725"},{"name":"CVE-2023-21724","url":"https://www.cve.org/CVERecord?id=CVE-2023-21724"},{"name":"CVE-2023-21726","url":"https://www.cve.org/CVERecord?id=CVE-2023-21726"},{"name":"CVE-2023-21722","url":"https://www.cve.org/CVERecord?id=CVE-2023-21722"},{"name":"CVE-2023-21725","url":"https://www.cve.org/CVERecord?id=CVE-2023-21725"},{"name":"CVE-2023-21723","url":"https://www.cve.org/CVERecord?id=CVE-2023-21723"}],"links":[],"reference":"CERTFR-2024-AVI-0151","revisions":[{"description":"Version initiale","revision_date":"2024-02-21T00:00:00.000000"},{"description":"Ajout de l'identifiant CVE-2024-21725","revision_date":"2025-01-28T00:00:00.000000"}],"risks":[{"description":"Injection de code indirecte \u00e0 distance (XSS)"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Joomla!. Elles\npermettent \u00e0 un attaquant de provoquer un contournement de la politique\nde s\u00e9curit\u00e9 et une injection de code indirecte \u00e0 distance (XSS).\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Joomla!","vendor_advisories":[{"published_at":"2024-02-20","title":"Bulletin de s\u00e9curit\u00e9 Joomla! 20240202","url":"https://developer.joomla.org/security-centre/926-20240202-core-open-redirect-in-installation-application.html"},{"published_at":"2024-02-20","title":"Bulletin de s\u00e9curit\u00e9 Joomla! 20240203","url":"https://developer.joomla.org/security-centre/927-20240203-core-xss-in-media-selection-fields.html"},{"published_at":"2024-02-20","title":"Bulletin de s\u00e9curit\u00e9 Joomla! 20240204","url":"https://developer.joomla.org/security-centre/928-20240204-core-xss-in-mail-address-outputs.html"},{"published_at":"2024-02-20","title":"Bulletin de s\u00e9curit\u00e9 Joomla!","url":"https://www.joomla.org/announcements/release-news/5904-joomla-5-0-3-and-4-4-3-security-and-bug-fix-release.html"},{"published_at":"2024-02-20","title":"Bulletin de s\u00e9curit\u00e9 Joomla! 20240201","url":"https://developer.joomla.org/security-centre/925-20240201-core-insufficient-session-expiration-in-mfa-management-views.html"},{"published_at":"2024-02-20","title":"Bulletin de s\u00e9curit\u00e9 Joomla! 20240205","url":"https://developer.joomla.org/security-centre/929-20240205-core-inadequate-content-filtering-within-the-filter-code.html"}]}
