Joomla! Security Bypass Weakness and Cross-Site Scripting Vulnerability

SECUNIA ADVISORY ID:
SA46834

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46834/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46834

RELEASE DATE:
2011-11-14
DESCRIPTION:
A weakness and a vulnerability have been reported in Joomla!, which
can be exploited by malicious people to bypass certain security
restrictions and conduct cross-site scripting attacks.

1) Certain unspecified input is not properly sanitised before being
returned to the user. This can be exploited to execute arbitrary HTML
and script code in a user's browser session in context of an affected
site.

This vulnerability is reported in versions prior to 1.7.3.

2) An error in the random number generation when resetting passwords
can be exploited to change a user's password.

This weakness is reported in versions prior to 1.7.3 and 1.5.25.

SOLUTION:
Update to version 1.7.3 or 1.5.25.

PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Corn้ Hannema
2) David Jardin

ORIGINAL ADVISORY:
http://developer.joomla.org/security/news/373-20111101-core-xss-vulnerability
http://developer.joomla.org/security/news/374-20111102-core-password-change
http://developer.joomla.org/security/news/375-20111103-core-password-change

RECENT ARTICLE

RECENT POST