There is always a great deal of Joomla! development activity underway and communicating with other developers in the community is essential. This site is a resource for anyone looking to build or maintain software based on the Joomla! platform.
Where to Start
- Project: Joomla!
- SubProject: CMS
- Severity: Low
- Versions: 1.6.0 through 3.6.0
- Exploit type: ACL Violation
- Reported Date: 2016-April-29
- Fixed Date: 2016-August-03
- CVE Numbers: requested
Description
Inadequate ACL checks in com_content provide potential read access to data which should be access restricted to users with edit_own level.
Affected Installs
Joomla! CMS versions 1.6.0 through 3.6.0
Solution
Upgrade to version 3.6.1
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Severity: Medium
- Versions: 3.6.0
- Exploit type: CSRF
- Reported Date: 2016-July-19
- Fixed Date: 2016-August-03
- CVE Numbers: requested
Description
Add additional CSRF hardening in com_joomlaupdate.
Affected Installs
Joomla! CMS version 3.6.0
Solution
Upgrade to version 3.6.1
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Severity: Low
- Versions: 3.0.0 through 3.4.6
- Exploit type: SQL Injection
- Reported Date: 2015-December-15
- Fixed Date: 2015-Decemer-21
- CVE Numbers: requested
Description
Inadequate filtering of request data leads to a SQL Injection vulnerability.
Affected Installs
Joomla! CMS versions 3.0.0 through 3.4.6
Solution
Upgrade to version 3.4.7
Contact
The JSST at the Joomla! Security Centre.