Security Announcements
This feed provides announcements of resolved security issues in Joomla! software releases.
For more information about the Joomla! Security Strike Team (JSST) and its processes, please review our Security article.
To report potential security issues, please follow the guidelines in the above referenced article. Please note that we are only able to provide support for the Joomla! CMS, Joomla! Framework, and *.joomla.org network of websites.
You can subscribe to notifications from this feed through a RSS reader.
- Project: Joomla!
- SubProject: libraries
- Severity: Critical
- Versions: 1.5.6 and all previous 1.5 releases
- Exploit type: Variable Injection
- Reported Date: 2008-September-7
- Fixed Date: 2008-September-9
Description
A flaw in JRequest exists where variables set with JRequest::setVar
are not cleaned when fetching the variable at a later point in the request. This can result in variable injection (unwanted characters injected into returned data).
3PD Concerns
3PD extensions which use JRequest do not need to change anything for proper function.
Affected Installs
All 1.5.x installs prior to and including 1.5.6 are affected.
Solution
Upgrade to latest Joomla! version (1.5.7 or newer).
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: com_user
- Severity: Critical
- Versions: 1.5.5 and all previous 1.5 releases
- Exploit type: Password Reset Forgery
- Reported Date: 2008-August-12
- Fixed Date: 2008-August-12
Description
A flaw in the reset token validation mechanism allows for non-validating tokens to be forged. This will allow an unauthenticated, unauthorized user to reset the password of the first enabled user (lowest id). Typically, this is an administrator user. Note, that changing the first users username may lessen the impact of this exploit (since the person who changed the password does not know the login associated with the new password). However, the only way to completely rectify the issue is to upgrade to 1.5.6 (or patch the /components/com_user/models/reset.php file).
Affected Installs
All 1.5.x installs prior to and including 1.5.5 are affected.
Solution
Upgrade to latest Joomla! version (1.5.6 or newer), or patch /components/com_user/models/reset.php with the code below:
After global $mainframe; on line 113 of reset.php, add:
if(strlen($token) != 32) {
$this->setError(JText::_('INVALID_TOKEN'));
return false;
}