There is always a great deal of Joomla! development activity underway and communicating with other developers in the community is essential. This site is a resource for anyone looking to build or maintain software based on the Joomla! platform.
Where to Start
- Project: Joomla!
- SubProject: CMS
- Severity: Low
- Versions: 3.7.0 through 3.8.1
- Exploit type: Information Disclosure
- Reported Date: 2017-May-17
- Fixed Date: 2017-November-07
- CVE Number: CVE-2017-16633
Description
A logic bug in com_fields exposed read-only information about a site's custom fields to unauthorized users.
Affected Installs
Joomla! CMS versions 3.7.0 through 3.8.1
Solution
Upgrade to version 3.8.2
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Severity: Medium
- Versions: 3.2.0 through 3.8.1
- Exploit type:
- Reported Date: 2017-October-31
- Fixed Date: 2017-November-07
- CVE Number: CVE-2017-16634
Description
A bug allowed third parties to bypass a user's 2-factor-authentication method.
Affected Installs
Joomla! CMS versions 3.2.0 through 3.8.1
Solution
Upgrade to version 3.8.2
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Severity: Medium
- Versions: 1.5.0 through 3.8.1
- Exploit type: Information Disclosure
- Reported Date: 2017-October-06
- Fixed Date: 2017-November-07
- CVE Number: CVE-2017-14596
Description
Inadequate escaping in the LDAP authentication plugin can result in disclosure of username and password.
Affected Installs
Joomla! CMS versions 1.5.0 through 3.8.1
Solution
Upgrade to version 3.8.2
Contact
The JSST at the Joomla! Security Centre.