DESCRIPTION:
Emilio Pinna has reported a vulnerability in Joomla!, which can be
exploited by malicious people to conduct cross-site scripting
attacks.
Input passed via the "lang" GET parameter to
/libraries/idna_convert/example.php is not properly sanitised before
being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context
of an affected site.
The vulnerability is reported in version 3.1.5. Other versions may
also be affected.
SOLUTION:
Fixed in the git repository.
PROVIDED AND/OR DISCOVERED BY:
Emilio Pinna
ORIGINAL ADVISORY:
Joomla!:
https://github.com/joomla/joomla-cms/issues/1658
Emilio Pinna:
http://disse.cting.org/2013/08/05/joomla-core-3_1_5_reflected-xss-vulnerability/
DESCRIPTION:
A vulnerability has been discovered in Joomla!, which can be
exploited by malicious users to compromise a vulnerable system.
The vulnerability is caused due to the
administrator/components/com_media/helpers/media.php script
improperly validating the extension of an uploaded file. This can be
exploited to e.g. execute arbitrary PHP code by uploading a PHP file
using a ".php." extension.
Successful exploitation requires permissions to upload files and that
the web server is configured to handle ".php." extensions as PHP
scripts.
The vulnerability is confirmed in version 3.1.4 and reported in
versions prior to 2.5.14 and 3.1.5.
SOLUTION:
Update to version 2.5.14 or 3.1.5.
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Jens Hinrichsen.
ORIGINAL ADVISORY:
http://www.joomla.org/announcements/release-news/5506-joomla-2-5-14-released.htmlhttp://www.joomla.org/announcements/release-news/5505-joomla-3-1-5-stable-released.htmlhttp://developer.joomla.org/security/news/563-20130801-core-unauthorised-uploads