Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <201004261400.58418.hanno@hboeck.de>
Date: Mon, 26 Apr 2010 14:00:58 +0200
From: Hanno Böck <hanno@...eck.de>
To: oss-security@...ts.openwall.com
Cc: Josh Bressers <bressers@...hat.com>,
  Steven Christey <coley@...us.mitre.org>
Subject: CVE request: joomla <= 1.5.15 code upload, information leak, session fixation, unauthorized access (was Fwd: Joomla! Security News)


----------  forwarded message  ----------

Subject: Joomla! Security News
Date: Samstag 24 April 2010
From: "Joomla! Developer - Vulnerability News" <no_reply@...mla.org>


Joomla! Developer - Vulnerability News

///////////////////////////////////////////
[20100423] - Core - Negative Values for Limit and Offset

Posted: 23 Apr 2010 10:31 AM PDT
http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/K3rjMh4AvSE/311-20100423-
core-negative-values-for-limit-and-
offset.html?utm_source=feedburner&utm_medium=email


  Project: Joomla!
  SubProject: All
  Severity: Moderate
  Versions: 1.5.15 and all previous 1.5 releases
  Exploit type: information Disclosure
  Reported Date: 2010-Feb-21
  Fixed Date: 2010-Apr-23

Description

If a user entered a URL with a negative query limit or offset, a PHP notice  
would display revealing information about the system.
Affected Installs

All 1.5.x installs prior to and including 1.5.15 are affected.
Solution

Upgrade to the latest Joomla! version (1.5.16 or later)

Reported by Security List
Contact

The JSST at the Joomla! Security Center.



///////////////////////////////////////////
[20100423] - Core - Installer Migration Script

Posted: 23 Apr 2010 10:27 AM PDT
http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/QLis4AG_-cs/310-20100423-
core-installer-migration-script.html?utm_source=feedburner&utm_medium=email


  Project: Joomla!
  SubProject: All
  Severity: Low
  Versions: 1.5.15 and all previous 1.5 releases
  Exploit type: Code upload
  Reported Date: 2009-Dec-30
  Fixed Date: 2010-Apr-23

Description

The migration script in the Joomla! installer does not check the file type  
being uploaded. If the installation application is present, an attacker  
could use it to upload malicious files to a server.
Affected Installs

All 1.5.x installs prior to and including 1.5.15 are affected.
Solution

Upgrade to the latest Joomla! version (1.5.16 or later)

Reported by Nicola Bettini
Contact

The JSST at the Joomla! Security Center.



///////////////////////////////////////////
[20100423] - Core - Sessation Fixation

Posted: 23 Apr 2010 10:22 AM PDT
http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/KWB_pRZpcP4/309-20100423-
core-sessation-fixation.html?utm_source=feedburner&utm_medium=email


  Project: Joomla!
  SubProject: All
  Severity: Moderate
  Versions: 1.5.15 and all previous 1.5 releases
  Exploit type: Session fixation
  Reported Date: 2010-Mar-25
  Fixed Date: 2010-Apr-23

Description

Session id doesn't get modified when user logs in.  A remote site may be  
able to forward a visitor to the Joomla! site and set a specific cookie.   
If the user then logs in, the remote site can use that cookie to  
authenticate as that user.
Affected Installs

All 1.5.x installs prior to and including 1.5.15 are affected.
Solution

Upgrade to the latest Joomla! version (1.5.16 or later)

Reported by Raúl Siles and Steven Pignataro



Contact

The JSST at the Joomla! Security Center.[20100423] - Core - Password Reset  
Tokens



///////////////////////////////////////////
[20100423] - Core - Password Reset Tokens

Posted: 22 Apr 2010 05:00 PM PDT
http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/UdLK-p0f7tQ/308-20100423-
core-password-reset-tokens.html?utm_source=feedburner&utm_medium=email


  Project: Joomla!
  SubProject: All
  Severity: Low
  Versions: 1.5.15 and all previous 1.5 releases
  Exploit type: Unauthorised Access
  Reported Date: 2010-Jan-07
  Fixed Date: 2010-Apr-23

Description

When a user requests a password reset, the reset tokens were stored in  
plain text in the database. While this is not a vulnerability in itself, it  
allows user accounts to be compromised if there is an extension on the site  
with an SQL injection vulnerability.
Affected Installs

All 1.5.x installs prior to and including 1.5.15 are affected.
Solution

Upgrade to the latest Joomla! version (1.5.16 or later)

Reported by Madis Abel
Contact

The JSST at the Joomla! Security Center.



-- 
Hanno Böck		Blog:		http://www.hboeck.de/
GPG: 3DBD3B20		Jabber/Mail:	hanno@...eck.de

http://schokokeks.org - professional webhosting

Download attachment "signature.asc " of type "application/pgp-signature" (199 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.