Using Extensions

Security Announcements

  1. [20180803] - Core - ACL Violation in custom fields
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Versions: 3.7.0 through 3.8.11
    • Exploit type: ACL Violation
    • Reported Date: 2018-July-10
    • Fixed Date: 2018-August-28
    • CVE Number: CVE-2018-15881

    Description

    Inadequate checks regarding disabled fields can lead to an ACL violation.

    Affected Installs

    Joomla! CMS versions 3.7.0 through 3.8.11

    Solution

    Upgrade to version 3.8.12

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Elisa Foltyn, COOLCAT CREATIONS
  2. [20180802] - Core - Stored XSS vulnerability in the frontend profile
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Versions: 1.5.0 through 3.8.11
    • Exploit type: XSS
    • Reported Date: 2018-July-10
    • Fixed Date: 2018-August-28
    • CVE Number: CVE-2018-15880

    Description

    Inadequate output filtering on the user profile page could lead to a stored XSS attack.

    Affected Installs

    Joomla! CMS versions 1.5.0 through 3.8.11

    Solution

    Upgrade to version 3.8.12

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Fouad Maakor
  3. [20180801] - Core - Hardening the InputFilter for PHAR stubs
    • Project: Joomla!
    • SubProject: CMS
    • Impact: High
    • Severity: Low
    • Versions: 1.5.0 through 3.8.11
    • Exploit type: Malicious file upload
    • Reported Date: 2018-August-23
    • Fixed Date: 2018-August-28
    • CVE Number: CVE-2018-15882

    Description

    Inadequate checks in the InputFilter class could allow specifically prepared PHAR files to pass the upload filter.

    Affected Installs

    Joomla! CMS versions 1.5.0 through 3.8.11

    Solution

    Upgrade to version 3.8.12

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Davide Tampellini
  4. [20180602] - Core - XSS vulnerability in language switcher module
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Versions: 1.6.0 through 3.8.8
    • Exploit type: XSS
    • Reported Date: 2018-May-07
    • Fixed Date: 2018-June-26
    • CVE Number: CVE-2018-12711

    Description

    In some cases the link of the current language might contain unescaped HTML special characters. This may lead to reflective XSS via injection of arbitrary parameters and/or values on the current page url.

    Affected Installs

    Joomla! CMS versions 1.6.0 through 3.8.8

    Solution

    Upgrade to version 3.8.9

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Borja Lorenzo, Innotecsystem
  5. [20180601] - Core - Local File Inclusion with PHP 5.3
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Versions: 2.5.0 through 3.8.8
    • Exploit type: LFI
    • Reported Date: 2018-April-23
    • Fixed Date: 2018-June-26
    • CVE Number: CVE-2018-12712

    Description

    Our autoload code checks classnames to be valid, using the "class_exists" function in PHP. In PHP 5.3 this function validates invalid names as valid, which can result in a Local File Inclusion.

    Affected Installs

    Joomla! CMS versions 2.5.0 through 3.8.8

    Solution

    Upgrade to version 3.8.9

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Davide Tampellini
 
 

Síguenos en las redes sociales

Conecta con nosotros en las redes sociales..

Contacto

Para cualquier tipo de información no dude en contactar con nosotros.

 
Email: This email address is being protected from spambots. You need JavaScript enabled to view it." target="_blank" title=" This email address is being protected from spambots. You need JavaScript enabled to view it."> This email address is being protected from spambots. You need JavaScript enabled to view it.
Website: www.helduakadi.org
You are here: Inicio Using Joomla! Using Extensions