Vulnerability Name: | CVE-2018-11325 (CCN-143753) | ||||||||||||
Assigned: | 2018-05-04 | ||||||||||||
Published: | 2018-05-04 | ||||||||||||
Updated: | 2019-10-03 | ||||||||||||
Summary: | An issue was discovered in Joomla! Core before 3.8.8. The web install application would autofill password fields after either a form validation error or navigating to a previous install step, and display the plaintext password for the administrator account at the confirmation screen. | ||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-209 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-11325 Source: CCN Type: SECTRACK ID: 1040966 Joomla! Multiple Flaws Let Remote Authenticated Users Modify ACLs and Execute Arbitrary Code, Remote Users Obtain Potentially Sensitive Information and Conduct Cross-Site Scripting Attacks, and Local Users Obtain Passwords Source: BID Type: Third Party Advisory, VDB Entry 104278 Source: CCN Type: BID-104278 Joomla! Core CVE-2018-11325 Information Disclosure Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry 1040966 Source: CCN Type: Joomla! Web site [20180504] - Core - Installer leaks plain text password to local user Source: MISC Type: Vendor Advisory https://developer.joomla.org/security-centre/732-20180504-core-installer-leaks-plain-text-password-to-local-user.html Source: XF Type: UNKNOWN joomla-core-cve201811325-info-disc(143753) | ||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||
BACK |