Security Announcements
This feed provides announcements of resolved security issues in Joomla! software releases.
For more information about the Joomla! Security Strike Team (JSST) and its processes, please review our Security article.
To report potential security issues, please follow the guidelines in the above referenced article. Please note that we are only able to provide support for the Joomla! CMS, Joomla! Framework, and *.joomla.org network of websites.
You can subscribe to notifications from this feed through a RSS reader.
- Project: Joomla!
- SubProject: All
- Severity: Low
- Versions: 2.5.6 and all earlier 2.5.x versions
- Exploit type: XSS Vulnerability
- Reported Date: 2012-April-30
- Fixed Date: 2012-September-13
Description
Inadequate escaping of output leads to XSS vulnerability.
Affected Installs
Joomla! versions 2.5.6 and all earlier 2.5.x versions
Solution
Upgrade to version 2.5.7
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: All
- Severity: Low
- Versions: 2.5.6 and all earlier 2.5.x versions
- Exploit type: XSS Vulnerability
- Reported Date: 2012-July-2
- Fixed Date: 2012-September-13
Description
Inadequate escaping of output leads to XSS vulnerability in language switcher module.
Affected Installs
Joomla! versions 2.5.6 and all earlier 2.5.x versions
Solution
Upgrade to version 2.5.7
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: All
- Severity: Medium High
- Versions: 2.5.4 and all earlier 2.5.x versions
- Exploit type: Privilege Escalation
- Reported Date: 2012-April-29
- Fixed Date: 2012-June-18
Description
Inadequate checking leads to possible user privilege escalation.
Affected Installs
Joomla! versions 2.5.4 and all earlier 2.5.x versions
Solution
Upgrade to version 2.5.5
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: All
- Severity: Low
- Versions: 2.5.4 and all earlier 2.5.x versions
- Exploit type: Information Disclosure
- Reported Date: 2012-May-1
- Fixed Date: 2012-June-18
Description
Inadequate filtering leads SQL error and information disclosure.
Affected Installs
Joomla! versions 2.5.4 and all earlier 2.5.x versions
Solution
Upgrade to version 2.5.5
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: All
- Severity: Low
- Versions: 2.5.3 and all earlier 2.5.x versions
- Exploit type: Information Disclosure
- Reported Date: 2012-January-7
- Fixed Date: 2012-April-2
Description
Inadequate permission checking allows unauthorised viewing of some administrative back end information.
Affected Installs
Joomla! versions 2.5.3 and all earlier 2.5.x versions
Solution
Upgrade to version 2.5.4
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: All
- Severity: Low
- Versions: 2.5.3 and all earlier 2.5.x versions
- Exploit type: XSS Vulnerability
- Reported Date: 2012-February-3
- Fixed Date: 2012-April-2
Description
Inadequate filtering in update manager leads to XSS vulnerability.
Affected Installs
Joomla! versions 2.5.3 and all earlier 2.5.x versions
Solution
Upgrade to version 2.5.4
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: All
- Severity: High
- Versions: 1.5.25 and all earlier 1.5.x versions
- Exploit type: Password Change
- Reported Date: 2012-March-8
- Fixed Date: 2012-March-27
Description
Insufficient randomness leads to password reset vulnerability.
Affected Installs
Joomla! versions 1.5.25 and all earlier 1.5.x versions
Solution
Upgrade to version 1.5.26
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: All
- Severity: Low
- Versions: 1.5.25 and all earlier 1.5.x versions
- Exploit type: Information Disclosure
- Reported Date: 2012-January-7
- Fixed Date: 2012-March-27
Description
Inadequate permission checking allows unauthorised viewing of administrative back end information.
Affected Installs
Joomla! versions 1.5.25 and all earlier 1.5.x versions
Solution
Upgrade to version 1.5.26
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: All
- Severity: High
- Versions: 2.5.2, 2.5.1, 2.5.0, and all 1.7.x and 1.6.x releases
- Exploit type: Password Change
- Reported Date: 2012-March-8
- Fixed Date: 2012-March-15
Description
Insufficient randomness leads to password reset vulnerability.
Affected Installs
Joomla! versions 2.5.2, 2.5.1, 2.5.0, and all 1.7.x and 1.6.x versions
Solution
Upgrade to version 2.5.3
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: All
- Severity: High
- Versions: 2.5.2, 2.5.1, 2.5.0, and all 1.7.x and 1.6.x releases
- Exploit type: Privilege Escalation
- Reported Date: 2012-March-12
- Fixed Date: 2012-March-15
Description
Programming error allows privilege escalation in some cases.
Affected Installs
Joomla! versions 2.5.2, 2.5.1, 2.5.0, and all 1.7.x and 1.6.x versions
Solution
Upgrade to version 2.5.3
Contact
The JSST at the Joomla! Security Centre.