There is always a great deal of Joomla! development activity underway and communicating with other developers in the community is essential. This site is a resource for anyone looking to build or maintain software based on the Joomla! platform.
Where to Start
- Project: Joomla!
- SubProject: All
- Severity: High
- Versions: 1.7.2 and all 1.6.x versions
- Exploit type: Password Change
- Reported Date: 2011-October-28
- Fixed Date: 2011-November-14
Description
Weak random number generation during password reset leads to possibility of changing a user's password.
Affected Installs
Joomla! version 1.7.2 and all earlier 1.7.x and 1.6.x versions
Solution
Upgrade to the latest Joomla! version (1.7.3 or later)
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: All
- Severity: High
- Versions: 1.5.24 and all earlier 1.5 versions
- Exploit type: Password Change
- Reported Date: 2011-October-28
- Fixed Date: 2011-November-14
Description
Weak random number generation during password reset leads to possibility of changing a user's password.
Affected Installs
Joomla! version 1.5.24 and all earlier 1.5 versions
Solution
Upgrade to the latest Joomla! 1.5 version (1.5.25 or later)
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: All
- Severity: Moderate
- Versions: 1.7.1
- Exploit type: Information Disclosure
- Reported Date: 2011-September-09
- Fixed Date: 2011-October-17
Description
Weak encryption causes potential information disclosure.
Affected Installs
Joomla! version 1.7.1 and earlier
Solution
Upgrade to the latest Joomla! version (1.7.2 or later)
Contact
The JSST at the Joomla! Security Centre.