The CMS team behind Joomla reported last week an infringement of security. The incident occurred after a member of the Joomla Resources Directory (JRD) team left an Amazon S3 bucket owned by their own company with the full JRD site backup (resources.joomla.org).
The Joomla team said that the backup file is not encrypted and contains information for around 2,700 JRD profiles, which professionals can use on the JRD website to promote their Joomla skills.
Joomla administrators said the incident is still being investigated. It is not clear that anybody has found and downloaded the data from the S3 server of the third party company.
The details that could have been potentially accessed by an unauthorized third-party are as follows:
It is recommended that all JRD users update their JRD portal password. The team also suggests that users on other sites who have used the same password change the password, to prevent an attack on credentials.Joomla Team
Joomla! It is a Content Management System (CMS) free and open source for web content publishing. Joomla over the years! He won numerous awards. It is based on a model-view web app controller architecture that allows you to create compelling online applications independent of the CMS.
One of the most popular website software, thanks to its global growing and voluntary community, which makes the platform user-friendly, extendable, multilingual, open, sensitive, optimized search engine, and much more.
CMS is a Web-based program that allows multiple users to control (all or a portion of) content, website data or information, or intranet program at different permit rates.
Content management relates to website content creation, updates, preserves, publishes, cooperates, reports, and distributes, as well as data and information.
The seriousness of this infringement is considered weak, as most of this data was already public because Joomla professionals use the JRD portal as a database. Hashed IP addresses and passwords were not meant to be available.
The Joomla team is now proposing that all JRD users change their JRD password, but also in other websites where they have been reusing their password, as accounts of such sites may be threatened by a credential stuffing attack if they can scrape users’ passwords.
The team of Joomla said that they had conducted a full security audit of the JRD portal after they learned of this accidental leak from the JRD website’s help.
The Joomla team said in a violation of disclosure released last Thursday, the audit also highlighted the existence of the Super User accountments of individuals outside open source matters.
The Joomla Devs stated that the Superuser accounts were deleted, and all user accounts that did not log in after 1 January 2019 were disabled.
Joomla is an on-line application for the development and management of self-hosted websites, a content management system (CMS). Currently, it is the third-largest online CMS in use. This month, Shopify passed it to second place.
The Joomla team immediately conducted a thorough security audit of the JRD portal in response to the accidental leak on JRD site backup.
The audit also revealed the existence of individual Super User accounts outside the Open Source sector.