Joomla! Developer Network

  • Project: Joomla!
  • SubProject: Multiple
  • Severity: Low
  • Versions: 1.5.6 and all previous 1.5 releases
  • Exploit type: Redirect Spam 
  • Reported Date: 2008-August-26 
  • Fixed Date: 2008-September-9



Several components utilize a passed in URL to redirect to after processing.  These URLs are not validated prior to the redirect.  A crafted URL can cause the system to redirect to a spam or phishing site.

3PD Concerns

3pd extensions should validate all redirects (where the URL cannot be trusted) using the new JURI method isInternal($url).  JURI::isInternal($url) will return true if the passed in url is a url on the same host as Joomla, or false if it is not.  JURI::isInternal($url) was not available prior to 1.5.7.

Affected Installs

All 1.5.x installs prior to and including 1.5.6 are affected.


Upgrade to latest Joomla! version (1.5.7 or newer).

Reported By Emanuele Gentili


The JSST at the Joomla! Security Center.

Joomla! CMS

Current Release 

View known Issues

Development Status

Nightly CMS builds for developers are available for download

Joomla! Framework

Joomla! Reading

Joomla! Programming

Joomla! Programming

Mark Dexter & Louis Landry
Joomla! Templates

Joomla! Templates

Angie Radtke