There is always a great deal of Joomla! development activity underway and communicating with other developers in the community is essential. This site is a resource for anyone looking to build or maintain software based on the Joomla! platform.
Where to Start
- Project: Joomla! Framework
- SubProject: Session
- Severity: High
- Versions: 1.0.0 through 1.3.0
- Exploit type: Remote Code Execution
- Reported Date: 2015-December-13
- Fixed Date: 2015-December-14
- CVE Number: CVE-2015-8566
Description
Browser information is not filtered properly while saving the session values which leads to a Remote Code Execution vulnerability.
Affected Versions
Joomla! Framework Session package versions 1.0.0 through 1.3.0
Solution
Upgrade to version 1.3.1
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Severity: Low
- Versions: 3.2.0 through 3.4.5
- Exploit type: CSRF
- Reported Date: 2015-November-26
- Fixed Date: 2015-December-14
- CVE Number: CVE-2015-8563
Description
Add additional CSRF hardening in com_templates.
Affected Installs
Joomla! CMS versions 3.2.0 through 3.4.5
Solution
Upgrade to version 3.4.6
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Severity: Low
- Versions: 3.4.0 through 3.4.5
- Exploit type: Directory Traversal
- Reported Date: 2015-November-26
- Fixed Date: 2015-December-14
- CVE Number: CVE-2015-8564
Description
Failure to properly sanitise input data from the XML install file located within an extension's package archive allows for directory traversal.
Affected Installs
Joomla! CMS versions 3.4.0 through 3.4.5
Solution
Upgrade to version 3.4.6
Contact
The JSST at the Joomla! Security Centre.