Vulnerability Description
An issue was discovered in components/com_users/models/registration.php in Joomla! before 3.6.5. Incorrect filtering of registration form data stored to the session on a validation error enables a user to gain access to a registered user's account and reset the user's group mappings, username, and password, as demonstrated by submitting a form that targets the `registration.register` task.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Joomla | Joomla\! | <= 3.6.4 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/94893Third Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/41157/
- https://www.joomla.org/announcements/release-news/5693-joomla-3-6-5-released.htmPatchVendor Advisory
- http://www.securityfocus.com/bid/94893Third Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/41157/
- https://www.joomla.org/announcements/release-news/5693-joomla-3-6-5-released.htmPatchVendor Advisory
FAQ
What is CVE-2016-9838?
CVE-2016-9838 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in components/com_users/models/registration.php in Joomla! before 3.6.5. Incorrect filtering of registration form data stored to the session on a validation error enables a use...
How severe is CVE-2016-9838?
CVE-2016-9838 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-9838?
Check the references section above for vendor advisories and patch information. Affected products include: Joomla Joomla\!.