The security update can be downloaded here
- [20090606] - Core - Missing JEXEC Check
- [20090605] - Core - Frontend XSS - PHP_SELF not properly filtered
- [20090604] - Core - Frontend XSS - HTTP_REFERER not properly filtered
Posted: 30 Jun 2009 09:46 PM PDT
DescriptionSome files were missing the check for JEXEC. These scripts will then expose internal path information of the host. Affected InstallsAll 1.5.x installs prior to and including 1.5.11 are affected. SolutionUpgrade to latest Joomla! version (1.5.12 or newer). ContactThe JSST at the Joomla! Security Center. |
Posted: 30 Jun 2009 09:46 PM PDT
DescriptionAn attacker can inject JavaScript code in a URL that will be executed in the context of targeted user browser. Affected InstallsAll 1.5.x installs prior to and including 1.5.11 are affected. SolutionUpgrade to latest Joomla! version (1.5.12 or newer). Reported By Paul Boekholt (Byte Internet) ContactThe JSST at the Joomla! Security Center. |
Posted: 30 Jun 2009 09:45 PM PDT
DescriptionAn attacker can inject JavaScript or DHTML code that will be executed in the context of targeted user browser, allowing the attacker to steal cookies. HTTP_REFERER variable is not properly parsed. Affected InstallsAll 1.5.x installs prior to and including 1.5.11 are affected. SolutionUpgrade to latest Joomla! version (1.5.12 or newer). Reported by Juan Galiana Lara (Internet Security Auditors) ContactThe JSST at the Joomla! Security Center.
|