Joomla! News

Thai language for Joomla 2.5.4 released

ภาษาไทยสำหรับ จูมล่า 2.5.4

แพคเกจไฟล์ภาษาไทยสำหรับ Joomla 2.5.4 ออกมาแล้วครับ โดยชุดไฟล์ภาษาไทยนี้ ทางทีมจูมล่าลายไทย (JoomlaCorner) ภายใต้การสนับสนุนจากบริษัท มาร์เวลิค เอ็นจิ้น จำกัด ได้ทำการปรับปรุงไฟล์ภาษาที่เพิ่มเติม จาก Joomla 2.5.1 ในไฟล์เมื่อท่านทำการติดตั้งแล้ว หากทีมงานมีการอัพเดดไฟล์ชุดไฟล์ภาษา ระบบจะทำการแจ้งเตือนท่าน และทำให้ท่านสามารถคลิกเพื่อทำการอัพเดดได้ตามความสามารถใหม่ที่มีในจูมล่า

นอกจากนี้ในส่วนของระบบวันที่ จะถูกเปลี่ยนเป็น ปีพุทธศักราช และเป็นตัวเลขไทย ในส่วนของคำแปลนั้น ยังมีอีกหลายส่วนที่ยังไม่ได้แปล หากสมาชิกท่านไทยสนใจจะอาสาช่วยกันแปลแล้วส่งกลับมาให้ทีมงาน ก็จะเป็นประโยชน์กับเพื่อนๆ อีกจำนวนมากครับ ลำพังทีมจูมล่าลายไทย เองมีงานในส่วนอื่นๆ ที่ต้องทำร่วมกับทีมพัฒนาจูมล่าอีกมาก เพื่อพัฒนาออกมาแจกจ่ายให้ทุกท่านได้ใช้งานกัน

คลิกที่นี่ เพื่อดาวน์โหลดไฟล์ภาษาไทย สำหรับ Joomla 2.5.4 v.1

Joomla! nBill Component "message" Cross-Site Scripting Vulnerability

SECUNIA ADVISORY ID:
SA49004

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/49004/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=49004

RELEASE DATE:
2012-04-27
DESCRIPTION:
A vulnerability has been discovered in the nBill component for
Joomla!, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Input passed via the "message" parameter to index.php (when "option"
is set to "com_nbill" and "task" is set to "generated-view") is not
properly sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's
browser session in context of an affected site.

The vulnerability is confirmed in version 2.3.2. Other versions may
also be affected.

SOLUTION:
Filter malicious characters and character sequences using a proxy.

PROVIDED AND/OR DISCOVERED BY:
Jakub Galczyk.

Joomla! NinjaXplorer Component Unspecified Vulnerability

SECUNIA ADVISORY ID:
SA48958

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/48958/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=48958

RELEASE DATE:
2012-04-26

DESCRIPTION:
A vulnerability with an unknown impact has been reported in the
NinjaXplorer component for Joomla!.

The vulnerability is caused due to an unspecified error. No further
information is currently available.

The vulnerability is reported in versions prior to 1.0.7.

SOLUTION:
Update to version 1.0.7.

PROVIDED AND/OR DISCOVERED BY:
The vendor credits CloudAccess.

ORIGINAL ADVISORY:
http://ninjaforge.com/blog/318-security-vulnerability-discovered-in-ninjaxplorer-upgrade-immediately

Joomla! ccNewsletter Component "id" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA48934

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/48934/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=48934

RELEASE DATE:
2012-04-25

DESCRIPTION:
A vulnerability has been discovered in the ccNewsletter component for
Joomla!, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed via the "id" parameter to
modules/mod_ccnewsletter/helper/popup.php is not properly sanitised
before being used in SQL queries. This can be exploited to manipulate
SQL queries by injecting arbitrary SQL code.

The vulnerability is confirmed in version 1.0.9. Prior versions may
also be affected.

SOLUTION:
Update to version 1.0.10 or later.

PROVIDED AND/OR DISCOVERED BY:
E1nzte1N

ORIGINAL ADVISORY:
Chill Creations:
http://www.chillcreations.com/blog/5-ccnewsletter-joomla-newsletter/274-ccnewsletter-1010-security-release.html

E1nzte1N:
http://packetstormsecurity.org/files/112092/Joomla-CCNewsLetter-1.0.7-SQL-Injection.html

Joomla! Phoca Favicon Component Insecure Directory Permissions Weakness

SECUNIA ADVISORY ID:
SA48806

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/48806/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=48806

RELEASE DATE:
2012-04-17

DESCRIPTION:
A weakness has been reported in the Phoca Favicon component for
Joomla!, which can be exploited by malicious, local users to
manipulate certain data and potentially gain escalated privileges.

The weakness is caused due to the component setting insecure
permissions (777) for the "images/phocafavicon" folder. This can be
exploited to e.g. modify, create, or delete files contained in the
folder.

The weakness is reported in version 2.0.2. Other versions may also be
affected.

SOLUTION:
Modify the directory permissions to restrict access.

PROVIDED AND/OR DISCOVERED BY:
Reported by the Joomla! VEL team.

ORIGINAL ADVISORY:
Joomla:
http://docs.joomla.org/Vulnerable_Extensions_List#Phoca_Fav_Icon

Joomla! VirtueMart Component "virtuemart_userinfo_id" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA48713

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/48713/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=48713

RELEASE DATE:
2012-04-06
DESCRIPTION:
A vulnerability has been discovered in the VirtueMart component for
Joomla!, which can be exploited by malicious users to conduct SQL
injection attacks.

Input passed via the "virtuemart_userinfo_id" POST parameter to
index.php/virtue-mart-edit-address (when "option" is set to
"com_virtuemart") is not properly sanitised before being used in a
SQL query. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.

The vulnerability has been confirmed in version 2.0.2. Other versions
may also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
renangbarreto

ORIGINAL ADVISORY:
http://forum.virtuemart.net/index.php?topic=99999.0

RECENT ARTICLE