FortiDAST
FortiDAST performs automated black-box dynamic application security testing of web applications to identify vulnerabilities that bad actors may exploit.
dmaciejak
Staff
Staff
Article Id 257343
Description

This article describes the Joomla! CMS improper access check vulnerability assessment with FortiDAST.

 

CVE-2023-23752 vulnerability was discovered in Joomla! CMS.

Joomla! is a free and open-source content management system (CMS) for publishing web content. Joomla's content management system, is developed using PHP language and MySQL database, and can run on various platforms such as Linux, Windows, and MacOSX.

The vulnerability is an improper access check in webservice endpoints which may eventually leads to the disclosure of sensitive information such as account information, usernames or passwords.

Scope

FortiDAST version 23.2

Solution

Detection against that vulnerability is empowered by the FortiDAST Scripting Engine (FSE).

 

This technology enables FortiDAST to assess remotely with high level of confidence if an asset is vulnerable to a specific vulnerability by testing the disarmed exploit against the asset itself.

 

To configure the scan, you will need to enable the FSE group signature “joomla” which will select the underlying script:

'CVE-2023-23752 Joomla improper access check'

 

For reference, a step-by-step guide on how to configure FortiDAST to trigger FSE can be found on Fortinet’s blog.

 

For more details regarding mitigating the vulnerability by utilizing Fortinet products, refer to https://www.fortiguard.com/outbreak-alert/joomla-improper-access-check

Contributors