News Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Secunia.com:
Joomla! Multiple Vulnerabilities
July 30, 2007 @ 10:26:00

Secunia.com reports that multiple vulnerabilities have been found in the Joomla! content management system:

Some vulnerabilities have been reported in Joomla!, which can be exploited by malicious people to conduct session fixation attacks, cross-site scripting attacks or HTTP response splitting attacks.

The issues are marked as "less critical" but users should still update to the latest version to avoid these issues:

  • Certain unspecified input passed in com_search, com_content and mod_login is not properly sanitised before being returned to a user
  • Input passed to the "url" parameter is not properly sanitised before being returned to the user. This can be exploited to insert arbitrary HTTP headers.
  • An error exists in the handling of sessions and can be exploited to hijack another user's session by tricking the user into logging in after following a specially crafted link.

See the original advisory post here.

0 comments voice your opinion now!
joomla content management cms vulnerability secunia joomla content management cms vulnerability secunia


blog comments powered by Disqus

Similar Posts

Secunia.com: PHPChain Two Cross-Site Scripting Vulnerabilities

Tom Barrett's Blog: WordPress is more than a CMS, it is a PHP Framework

Greg Beaver's Blog: Quick review of Pixy vulnerability scanner for PEAR users

PHP Security Blog: Month of PHP bugs

Sandro Groganz's Blog: Saving CMS Consultants from Being Beaten Up


Community Events

Don't see your event here?
Let us know!


application framework interview list opinion api language composer yii2 community programming podcast part2 symfony series example project php7 laravel introduction

All content copyright, 2015 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework