The essential news about content management systems and mobile technology.
Powered by Joocial, XT Search for Algolia, and SlimApps.

  • Project: Joomla!
  • SubProject: All
  • Severity: Low
  • Versions: 1.5.25 and all earlier 1.5.x versions
  • Exploit type: Information Disclosure
  • Reported Date: 2012-January-7
  • Fixed Date: 2012-March-27

Description

Inadequate permission checking allows unauthorised viewing of administrative back end information.

Affected Installs

Joomla! versions 1.5.25 and all earlier

...

  • Project: Joomla!
  • SubProject: All
  • Severity: High
  • Versions: 2.5.2, 2.5.1, 2.5.0, and all 1.7.x and 1.6.x releases
  • Exploit type: Password Change
  • Reported Date: 2012-March-8
  • Fixed Date: 2012-March-15

Description

Insufficient randomness leads to password reset vulnerability.

Affected Installs

Joomla! versions 2.5.2, 2.5.1, 2.5.0, and all 1.7.x and 1.6.x versions

...

  • Project: Joomla!
  • SubProject: All
  • Severity: High
  • Versions: 2.5.1, 2.5.0 and 1.7.0 - 1.7.5
  • Exploit type: SQL Injection
  • Reported Date: 2012-February-29
  • Fixed Date: 2012-March-05

Description

Inadequate escaping leads to SQL injection vulnerability.

Affected Installs

Joomla! version 2.5.1, 2.5.0, 1.7.4, and all earlier 1.7.x versions

Solution

Upgrade to version

...

  • Project: Joomla!
  • SubProject: All
  • Severity: High
  • Versions: 2.5.2, 2.5.1, 2.5.0, and all 1.7.x and 1.6.x releases
  • Exploit type: Privilege Escalation
  • Reported Date: 2012-March-12
  • Fixed Date: 2012-March-15

Description

Programming error allows privilege escalation in some cases.

Affected Installs

Joomla! versions 2.5.2, 2.5.1, 2.5.0, and all 1.7.x and 1.6.x

...

  • Project: Joomla!
  • SubProject: All
  • Severity: Moderate
  • Versions: 2.5.1 and 2.5.0
  • Exploit type: XSS Vulnerability
  • Reported Date: 2012-February-29
  • Fixed Date: 2012-March-05

Description

Inadequate filtering leads to XSS vulnerability.

Affected Installs

Joomla! version 2.5.1 and 2.5.0.

Solution

Upgrade to version 2.5.2

Reported by Phil Purviance

Contact

The JSST at

...