VA-24-331-01
Vulnerability from csaf_cisa - Published: 2024-11-26 18:15 - Updated: 2024-11-26 18:15Summary
Valor Apps Easy Folder Listing Pro Joomla! extension deserialization vulnerability
Notes
Risk Evaluation
Valor Apps Easy Folder Listing Pro has a deserialization vulnerability that allows any external user can gain console access to vulnerable web servers that could potentially lead to total compromise of the web server, potential privilege escalation, and initial access into organizations' internal networks.
Legal Notice
All information products included in https://github.com/cisagov/CSAF/tree/develop/csaf_files/IT/white are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Countries and Areas Deployed
Worldwide
Recommended Practices
This vulnerability is addressed in versions 3.8 (Joomla 3.10 or lower) and 4.5 (Joomla 5+).
Company Headquarters Location
Antigua and Barbuda
Critical Infrastructure Sectors
Information Technology
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "en-US",
"notes": [
{
"category": "summary",
"text": "Valor Apps Easy Folder Listing Pro has a deserialization vulnerability that allows any external user can gain console access to vulnerable web servers that could potentially lead to total compromise of the web server, potential privilege escalation, and initial access into organizations\u0027 internal networks.",
"title": "Risk Evaluation"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://github.com/cisagov/CSAF/tree/develop/csaf_files/IT/white are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries and Areas Deployed"
},
{
"category": "general",
"text": "This vulnerability is addressed in versions 3.8 (Joomla 3.10 or lower) and 4.5 (Joomla 5+).",
"title": "Recommended Practices"
},
{
"category": "other",
"text": "Antigua and Barbuda",
"title": "Company Headquarters Location"
},
{
"category": "description",
"text": "Information Technology",
"title": "Critical Infrastructure Sectors"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "https://www.cisa.gov/report",
"issuing_authority": "CISA",
"name": "CISA",
"namespace": "https://www.cisa.gov"
},
"references": [
{
"category": "self",
"summary": "Vulnerability Advisory VA-24-331-01 CSAF",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2024/va-24-331-01.json"
}
],
"title": "Valor Apps Easy Folder Listing Pro Joomla! extension deserialization vulnerability",
"tracking": {
"current_release_date": "2024-11-26T18:15:49Z",
"generator": {
"date": "2024-11-26T19:07:59Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.15"
}
},
"id": "VA-24-331-01",
"initial_release_date": "2024-11-26T18:15:49Z",
"revision_history": [
{
"date": "2024-11-26T18:15:49Z",
"number": "1.0.0",
"summary": "Initial publication"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=3.7|\u003c3.8",
"product": {
"name": "Valor Apps Easy Folder Listing Pro 3.7 \u003c 3.8",
"product_id": "CSAFPID-0001"
}
},
{
"category": "product_version",
"name": "3.8",
"product": {
"name": "Valor Apps Easy Folder Listing Pro 3.8",
"product_id": "CSAFPID-0002"
}
},
{
"category": "product_version_range",
"name": "\u003e=4.4|\u003c4.5",
"product": {
"name": "Valor Apps Easy Folder Listing Pro 4.4 \u003c 4.5",
"product_id": "CSAFPID-0003"
}
},
{
"category": "product_version",
"name": "4.5",
"product": {
"name": "Valor Apps Easy Folder Listing Pro 4.5",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "Easy Folder Listing Pro"
}
],
"category": "vendor",
"name": "Valor Apps"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ishan Brown"
],
"organization": "CISA"
}
],
"cve": "CVE-2024-11145",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "summary",
"text": "Valor Apps Easy Folder Listing Pro has a deserialization vulnerability that allows an unauthenticated, remote attacker to execute arbitrary code with the privileges of the Joomla! application. Fixed in versions 3.8 and 4.5.",
"title": "Description"
},
{
"category": "details",
"text": "SSVCv2/E:P/A:Y/T:T/2024-11-26T18:45:42Z/",
"title": "SSVC"
}
],
"product_status": {
"fixed": [
"CSAFPID-0002",
"CSAFPID-0004"
],
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "www.valorapps.com",
"url": "https://www.valorapps.com/web-products/easy-folder-listing-pro.html"
},
{
"category": "external",
"summary": "github.com",
"url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/IT/white/2024/va-24-331-01.json"
}
],
"release_date": "2024-11-11T00:00:00Z",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-12T05:00:00Z",
"details": "Fixed in versions 3.8 and 4.5.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.valorapps.com/web-products/easy-folder-listing-pro.html"
},
{
"category": "vendor_fix",
"date": "2024-11-12T05:00:00Z",
"details": "Fixed in versions 3.8 and 4.5.",
"product_ids": [
"CSAFPID-0002"
],
"url": "https://www.valorapps.com/web-products/easy-folder-listing-pro.html"
},
{
"category": "vendor_fix",
"date": "2024-11-12T05:00:00Z",
"details": "Fixed in versions 3.8 and 4.5.",
"product_ids": [
"CSAFPID-0003"
],
"url": "https://www.valorapps.com/web-products/easy-folder-listing-pro.html"
},
{
"category": "vendor_fix",
"date": "2024-11-12T05:00:00Z",
"details": "Fixed in versions 3.8 and 4.5.",
"product_ids": [
"CSAFPID-0004"
],
"url": "https://www.valorapps.com/web-products/easy-folder-listing-pro.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0003"
]
}
],
"title": "Easy Folder Listing Pro deserialization vulnerability"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…