News Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Secunia.com:
Joomla! Multiple Vulnerabilities
July 30, 2007 @ 10:26:00

Secunia.com reports that multiple vulnerabilities have been found in the Joomla! content management system:

Some vulnerabilities have been reported in Joomla!, which can be exploited by malicious people to conduct session fixation attacks, cross-site scripting attacks or HTTP response splitting attacks.

The issues are marked as "less critical" but users should still update to the latest version to avoid these issues:

  • Certain unspecified input passed in com_search, com_content and mod_login is not properly sanitised before being returned to a user
  • Input passed to the "url" parameter is not properly sanitised before being returned to the user. This can be exploited to insert arbitrary HTTP headers.
  • An error exists in the handling of sessions and can be exploited to hijack another user's session by tricking the user into logging in after following a specially crafted link.

See the original advisory post here.

0 comments voice your opinion now!
joomla content management cms vulnerability secunia joomla content management cms vulnerability secunia


blog comments powered by Disqus

Similar Posts

Secunia.com: phpChess Community Edition Multiple File Inclusion

Paranoid Engineering Blog: CMS Battle: Drupal va Joomla va Custom Programming

Mambo Foundation Blog: Baking Mambo

Reddit.com: How do you manage many PHP projects? Lots of VMs?

Secunia.com: CMS Mundo SQL Injection and File Upload Vulnerabilities


Community Events

Don't see your event here?
Let us know!


release interview performance api configure language framework symfony2 voicesoftheelephpant laravel introduction opinion conference community php7 example series application library podcast

All content copyright, 2015 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework