Security Announcements
This feed provides announcements of resolved security issues in Joomla! software releases.
For more information about the Joomla! Security Strike Team (JSST) and its processes, please review our Security article.
To report potential security issues, please follow the guidelines in the above referenced article. Please note that we are only able to provide support for the Joomla! CMS, Joomla! Framework, and *.joomla.org network of websites.
You can subscribe to notifications from this feed through a RSS reader.
- Project: Joomla!
- SubProject: CMS
- Severity: Low
- Versions: 1.6.0 through 3.6.0
- Exploit type: XSS Vulnerability
- Reported Date: 2016-February-05
- Fixed Date: 2016-August-03
- CVE Number: Requested
Description
Inadequate escaping leads to XSS vulnerability in mail component.
Affected Installs
Joomla! CMS versions 1.6.0 through 3.6.0
Solution
Upgrade to version 3.6.1
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Severity: Low
- Versions: 1.6.0 through 3.6.0
- Exploit type: ACL Violation
- Reported Date: 2016-April-29
- Fixed Date: 2016-August-03
- CVE Numbers: requested
Description
Inadequate ACL checks in com_content provide potential read access to data which should be access restricted to users with edit_own level.
Affected Installs
Joomla! CMS versions 1.6.0 through 3.6.0
Solution
Upgrade to version 3.6.1
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Severity: Medium
- Versions: 3.6.0
- Exploit type: CSRF
- Reported Date: 2016-July-19
- Fixed Date: 2016-August-03
- CVE Numbers: requested
Description
Add additional CSRF hardening in com_joomlaupdate.
Affected Installs
Joomla! CMS version 3.6.0
Solution
Upgrade to version 3.6.1
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Severity: Low
- Versions: 3.0.0 through 3.4.6
- Exploit type: SQL Injection
- Reported Date: 2015-December-15
- Fixed Date: 2015-Decemer-21
- CVE Numbers: requested
Description
Inadequate filtering of request data leads to a SQL Injection vulnerability.
Affected Installs
Joomla! CMS versions 3.0.0 through 3.4.6
Solution
Upgrade to version 3.4.7
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Severity: High
- Versions: 1.5.0 through 3.4.6
- Exploit type: Remote Code Execution
- Reported Date: 2015-December-15
- Fixed Date: 2015-December-21
- CVE Number: requested
Description
The Joomla Security Strike team has been following up on the critical security vulnerability patched last week. Since the recent update it has become clear that the root cause is a bug in PHP itself. This was fixed by PHP in September of 2015 with the releases of PHP 5.4.45, 5.5.29, 5.6.13 (Note that this is fixed in all versions of PHP 7 and has been back-ported in some specific Linux LTS versions of PHP 5.3). This fixes the bug across all supported PHP versions.
Affected Installs
Joomla! CMS versions 1.5.0 through 3.4.6
Solution
Upgrade to version 3.4.7
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Severity: High
- Versions: 1.5.0 through 3.4.5
- Exploit type: Remote Code Execution
- Reported Date: 2015-December-13
- Fixed Date: 2015-December-14
- CVE Numbers: CVE-2015-8562
Description
Browser information is not filtered properly while saving the session values into the database which leads to a Remote Code Execution vulnerability.
Affected Installs
Joomla! CMS versions 1.5.0 through 3.4.5
Solution
Upgrade to version 3.4.6
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla! Framework
- SubProject: Session
- Severity: High
- Versions: 1.0.0 through 1.3.0
- Exploit type: Remote Code Execution
- Reported Date: 2015-December-13
- Fixed Date: 2015-December-14
- CVE Number: CVE-2015-8566
Description
Browser information is not filtered properly while saving the session values which leads to a Remote Code Execution vulnerability.
Affected Versions
Joomla! Framework Session package versions 1.0.0 through 1.3.0
Solution
Upgrade to version 1.3.1
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Severity: Low
- Versions: 3.2.0 through 3.4.5
- Exploit type: CSRF
- Reported Date: 2015-November-26
- Fixed Date: 2015-December-14
- CVE Number: CVE-2015-8563
Description
Add additional CSRF hardening in com_templates.
Affected Installs
Joomla! CMS versions 3.2.0 through 3.4.5
Solution
Upgrade to version 3.4.6
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Severity: Low
- Versions: 3.4.0 through 3.4.5
- Exploit type: Directory Traversal
- Reported Date: 2015-November-26
- Fixed Date: 2015-December-14
- CVE Number: CVE-2015-8564
Description
Failure to properly sanitise input data from the XML install file located within an extension's package archive allows for directory traversal.
Affected Installs
Joomla! CMS versions 3.4.0 through 3.4.5
Solution
Upgrade to version 3.4.6
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Severity: Low
- Versions: 3.2.0 through 3.4.5
- Exploit type: Directory Traversal
- Reported Date: 2015-November-26
- Fixed Date: 2015-December-14
- CVE Number: CVE-2015-8565
Description
Inadequate filtering of request data leads to a Directory Traversal vulnerability.
Affected Installs
Joomla! CMS versions 3.2.0 through 3.4.5
Solution
Upgrade to version 3.4.6
Contact
The JSST at the Joomla! Security Centre.