Joomla! Security News

  1. [20160802] - Core - XSS Vulnerability

    • Project: Joomla!
    • SubProject: CMS
    • Severity: Low
    • Versions: 1.6.0 through 3.6.0
    • Exploit type: XSS Vulnerability
    • Reported Date: 2016-February-05
    • Fixed Date: 2016-August-03
    • CVE Number:Requested

    Description

    Inadequate escaping leads to XSS vulnerability in mail component.

    Affected Installs

    Joomla! CMS versions 1.6.0 through 3.6.0

    Solution

    Upgrade to version 3.6.1

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Dingjie (Daniel) Yang
  2. [20160801] - Core - ACL Violation

    • Project: Joomla!
    • SubProject: CMS
    • Severity: Low
    • Versions: 1.6.0 through 3.6.0
    • Exploit type: ACL Violation
    • Reported Date: 2016-April-29
    • Fixed Date: 2016-August-03
    • CVE Numbers: requested

    Description

    Inadequate ACL checks in com_content provide potential read access to data which should be access restricted to users with edit_own level.

    Affected Installs

    Joomla! CMS versions 1.6.0 through 3.6.0

    Solution

    Upgrade to version 3.6.1

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: T-Systems Multimedia Solutions
  3. [20160803] - Core - CSRF

    • Project: Joomla!
    • SubProject: CMS
    • Severity: Medium
    • Versions: 3.6.0
    • Exploit type: CSRF
    • Reported Date: 2016-July-19
    • Fixed Date: 2016-August-03
    • CVE Numbers: requested

    Description

    Add additional CSRF hardening in com_joomlaupdate.

    Affected Installs

    Joomla! CMS version 3.6.0

    Solution

    Upgrade to version 3.6.1

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Calum Hutton
  4. [20151207] - Core - SQL Injection

    • Project: Joomla!
    • SubProject: CMS
    • Severity: Low
    • Versions: 3.0.0 through 3.4.6
    • Exploit type: SQL Injection
    • Reported Date: 2015-December-15
    • Fixed Date: 2015-Decemer-21
    • CVE Numbers: requested

    Description

    Inadequate filtering of request data leads to a SQL Injection vulnerability.

    Affected Installs

    Joomla! CMS versions 3.0.0 through 3.4.6

    Solution

    Upgrade to version 3.4.7

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Georgios Papadakis
  5. [20151206] - Core - Session Hardening

    • Project: Joomla!
    • SubProject: CMS
    • Severity: High
    • Versions: 1.5.0 through 3.4.6
    • Exploit type: Remote Code Execution
    • Reported Date: 2015-December-15
    • Fixed Date: 2015-December-21
    • CVE Number: requested

    Description

    The Joomla Security Strike team has been following up on the critical security vulnerability patched last week. Since the recent update it has become clear that the root cause is a bug in PHP itself. This was fixed by PHP in September of 2015 with the releases of PHP 5.4.45, 5.5.29, 5.6.13 (Note that this is fixed in all versions of PHP 7 and has been back-ported in some specific Linux LTS versions of PHP 5.3). This fixes the bug across all supported PHP versions.

    Affected Installs

    Joomla! CMS versions 1.5.0 through 3.4.6

    Solution

    Upgrade to version 3.4.7

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Found by JSST and independently reported by Dennis Hermatski

AYSO Area G regions

Go to top