|
Message-Id: <201004261400.58418.hanno@hboeck.de>
Date: Mon, 26 Apr 2010 14:00:58 +0200
From: Hanno Böck <hanno@...eck.de>
To: oss-security@...ts.openwall.com
Cc: Josh Bressers <bressers@...hat.com>,
Steven Christey <coley@...us.mitre.org>
Subject: CVE request: joomla <= 1.5.15 code upload, information leak, session fixation, unauthorized access (was Fwd: Joomla! Security News)
---------- forwarded message ----------
Subject: Joomla! Security News
Date: Samstag 24 April 2010
From: "Joomla! Developer - Vulnerability News" <no_reply@...mla.org>
Joomla! Developer - Vulnerability News
///////////////////////////////////////////
[20100423] - Core - Negative Values for Limit and Offset
Posted: 23 Apr 2010 10:31 AM PDT
http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/K3rjMh4AvSE/311-20100423-
core-negative-values-for-limit-and-
offset.html?utm_source=feedburner&utm_medium=email
Project: Joomla!
SubProject: All
Severity: Moderate
Versions: 1.5.15 and all previous 1.5 releases
Exploit type: information Disclosure
Reported Date: 2010-Feb-21
Fixed Date: 2010-Apr-23
Description
If a user entered a URL with a negative query limit or offset, a PHP notice
would display revealing information about the system.
Affected Installs
All 1.5.x installs prior to and including 1.5.15 are affected.
Solution
Upgrade to the latest Joomla! version (1.5.16 or later)
Reported by Security List
Contact
The JSST at the Joomla! Security Center.
///////////////////////////////////////////
[20100423] - Core - Installer Migration Script
Posted: 23 Apr 2010 10:27 AM PDT
http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/QLis4AG_-cs/310-20100423-
core-installer-migration-script.html?utm_source=feedburner&utm_medium=email
Project: Joomla!
SubProject: All
Severity: Low
Versions: 1.5.15 and all previous 1.5 releases
Exploit type: Code upload
Reported Date: 2009-Dec-30
Fixed Date: 2010-Apr-23
Description
The migration script in the Joomla! installer does not check the file type
being uploaded. If the installation application is present, an attacker
could use it to upload malicious files to a server.
Affected Installs
All 1.5.x installs prior to and including 1.5.15 are affected.
Solution
Upgrade to the latest Joomla! version (1.5.16 or later)
Reported by Nicola Bettini
Contact
The JSST at the Joomla! Security Center.
///////////////////////////////////////////
[20100423] - Core - Sessation Fixation
Posted: 23 Apr 2010 10:22 AM PDT
http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/KWB_pRZpcP4/309-20100423-
core-sessation-fixation.html?utm_source=feedburner&utm_medium=email
Project: Joomla!
SubProject: All
Severity: Moderate
Versions: 1.5.15 and all previous 1.5 releases
Exploit type: Session fixation
Reported Date: 2010-Mar-25
Fixed Date: 2010-Apr-23
Description
Session id doesn't get modified when user logs in. A remote site may be
able to forward a visitor to the Joomla! site and set a specific cookie.
If the user then logs in, the remote site can use that cookie to
authenticate as that user.
Affected Installs
All 1.5.x installs prior to and including 1.5.15 are affected.
Solution
Upgrade to the latest Joomla! version (1.5.16 or later)
Reported by Raúl Siles and Steven Pignataro
Contact
The JSST at the Joomla! Security Center.[20100423] - Core - Password Reset
Tokens
///////////////////////////////////////////
[20100423] - Core - Password Reset Tokens
Posted: 22 Apr 2010 05:00 PM PDT
http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/UdLK-p0f7tQ/308-20100423-
core-password-reset-tokens.html?utm_source=feedburner&utm_medium=email
Project: Joomla!
SubProject: All
Severity: Low
Versions: 1.5.15 and all previous 1.5 releases
Exploit type: Unauthorised Access
Reported Date: 2010-Jan-07
Fixed Date: 2010-Apr-23
Description
When a user requests a password reset, the reset tokens were stored in
plain text in the database. While this is not a vulnerability in itself, it
allows user accounts to be compromised if there is an extension on the site
with an SQL injection vulnerability.
Affected Installs
All 1.5.x installs prior to and including 1.5.15 are affected.
Solution
Upgrade to the latest Joomla! version (1.5.16 or later)
Reported by Madis Abel
Contact
The JSST at the Joomla! Security Center.
--
Hanno Böck Blog: http://www.hboeck.de/
GPG: 3DBD3B20 Jabber/Mail: hanno@...eck.de
http://schokokeks.org - professional webhosting
Download attachment "signature.asc " of type "application/pgp-signature" (199 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.