CVE-2023-23755

7.5 HIGH

📋 TL;DR

This vulnerability in Joomla! allows attackers to perform brute force attacks against multi-factor authentication (MFA) methods due to insufficient rate limiting. Attackers can repeatedly guess MFA codes to bypass authentication and gain unauthorized access. All Joomla! installations between versions 4.2.0 and 4.3.1 are affected.

💻 Affected Systems

Products:
  • Joomla!
Versions: 4.2.0 through 4.3.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Joomla! installations with MFA enabled. All default configurations with MFA are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover of administrative or user accounts, leading to data theft, website defacement, or further system compromise.

🟠

Likely Case

Successful brute force attacks against user accounts with weak MFA codes, resulting in unauthorized access to sensitive content or functionality.

🟢

If Mitigated

Failed authentication attempts due to proper rate limiting, with only legitimate users able to access accounts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires knowledge of valid usernames and ability to bypass first authentication factor. Attack tools can automate brute force attempts against MFA codes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.3.2

Vendor Advisory: https://developer.joomla.org/security-centre/900-20230502-core-bruteforce-prevention-within-the-mfa-screen.html

Restart Required: No

Instructions:

1. Backup your Joomla! installation and database. 2. Update Joomla! to version 4.3.2 or later via the Joomla! Update component. 3. Verify the update completed successfully.

🔧 Temporary Workarounds

Implement Web Application Firewall (WAF) Rate Limiting

all

Configure WAF rules to limit authentication attempts per IP address or session.

Disable MFA Temporarily

all

Temporarily disable MFA until patching is complete (increases other authentication risks).

🧯 If You Can't Patch

  • Implement network-level rate limiting at firewall or load balancer
  • Enable strong password policies and monitor for failed login attempts

🔍 How to Verify

Check if Vulnerable:

Check Joomla! version in administrator panel or via phpMyAdmin in #__extensions table.

Check Version:

php -r "include 'configuration.php'; echo JVERSION;"

Verify Fix Applied:

Confirm version is 4.3.2 or later and test MFA login with multiple failed attempts to verify rate limiting.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed MFA authentication attempts from same IP/session
  • Unusual authentication patterns outside business hours

Network Indicators:

  • High volume of POST requests to /administrator/index.php?option=com_users&task=user.mfaauthenticate

SIEM Query:

source="joomla.log" AND "MFA authentication failed" | stats count by src_ip

🔗 References

📤 Share & Export