There is always a great deal of Joomla! development activity underway and communicating with other developers in the community is essential. This site is a resource for anyone looking to build or maintain software based on the Joomla! platform.
Where to Start
- Project: Joomla!
- SubProject: com_weblinks
- Severity: Moderate
- Versions: 1.5.7 and all previous 1.5 releases
- Exploit type: XSS
- Reported Date: 2008-November-9
- Fixed Date: 2008-November-10
Description
com_weblinks allows raw HTML into the title and description tags for weblink submissions (from both the administrator and site submission forms).
Affected Installs
All 1.5.x installs prior to and including 1.5.7 are affected.
Solution
Upgrade to latest Joomla! version (1.5.8 or newer).
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: com_content
- Severity: Moderate
- Versions: 1.5.7 and all previous 1.5 releases
- Exploit type: XSS
- Reported Date: 2008-October-03
- Fixed Date: 2008-November-10
Description
The defaults on com_content article submission allow entry of dangerous HTML tags (script, etc). This only affects users with access level Author or higher, and only if you have not set filtering options in com_content configuration.
Affected Installs
All 1.5.x installs prior to and including 1.5.7 are affected.
Solution
Upgrade to latest Joomla! version (1.5.8 or newer).
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: libraries
- Severity: High
- Versions: 1.5.6 and all previous 1.5 releases
- Exploit type: Brute Force
- Reported Date: 2008-August-23
- Fixed Date: 2008-September-9
Description
A flaw with the random number generation exists which vastly reduces the entropy of system used random functions. This impacts system generated tokens and passwords. The fix increases entropy, and greatly reduces the chance of a generated token being guessed.
3PD Concerns
3PD extensions which use random number generation must properly seed the random numbers first (See JUserHelper::genRandomPassword() for more information on how to seed) To generate a random string, the following method is recommended: $password = JUtility::getHash( JUserHelper::genRandomPassword() );.
Affected Installs
All 1.5.x installs prior to and including 1.5.6 are affected.
Solution
Upgrade to latest Joomla! version (1.5.7 or newer).
Contact
The JSST at the Joomla! Security Centre.