News Feed
Jobs Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Secunia.com:
Joomla! Multiple Vulnerabilities
July 30, 2007 @ 10:26:00

Secunia.com reports that multiple vulnerabilities have been found in the Joomla! content management system:

Some vulnerabilities have been reported in Joomla!, which can be exploited by malicious people to conduct session fixation attacks, cross-site scripting attacks or HTTP response splitting attacks.

The issues are marked as "less critical" but users should still update to the latest version to avoid these issues:

  • Certain unspecified input passed in com_search, com_content and mod_login is not properly sanitised before being returned to a user
  • Input passed to the "url" parameter is not properly sanitised before being returned to the user. This can be exploited to insert arbitrary HTTP headers.
  • An error exists in the handling of sessions and can be exploited to hijack another user's session by tricking the user into logging in after following a specially crafted link.

See the original advisory post here.

0 comments voice your opinion now!
joomla content management cms vulnerability secunia joomla content management cms vulnerability secunia


blog comments powered by Disqus

Similar Posts

ServerGrove Blog: Implementing a staging/live website system with symfony and Apostrophe CMS

AppStorm.net: Using PyroCMS to Manage Content With Simplicity

Content with Style: Viewing BLOB content in phpMyAdmin

Lukas Smith's Blog: Stop building gold on top of crap

Paul Jones' Blog: What Does This Say About Unit-Testing in PHP Land?


Community Events











Don't see your event here?
Let us know!


install opinion framework overview application facebook language hhvm example security package hack component symfony2 introduction code release unittest composer podcast

All content copyright, 2014 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework