News Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Secunia.com:
Joomla! Multiple Vulnerabilities
July 30, 2007 @ 10:26:00

Secunia.com reports that multiple vulnerabilities have been found in the Joomla! content management system:

Some vulnerabilities have been reported in Joomla!, which can be exploited by malicious people to conduct session fixation attacks, cross-site scripting attacks or HTTP response splitting attacks.

The issues are marked as "less critical" but users should still update to the latest version to avoid these issues:

  • Certain unspecified input passed in com_search, com_content and mod_login is not properly sanitised before being returned to a user
  • Input passed to the "url" parameter is not properly sanitised before being returned to the user. This can be exploited to insert arbitrary HTTP headers.
  • An error exists in the handling of sessions and can be exploited to hijack another user's session by tricking the user into logging in after following a specially crafted link.

See the original advisory post here.

0 comments voice your opinion now!
joomla content management cms vulnerability secunia joomla content management cms vulnerability secunia


blog comments powered by Disqus

Similar Posts

Nick Halstead's Blog: Google Gears Caching of WordPress in PHP

NETTUTS.com: How to Create Your First Joomla Template

Paranoid Engineering Blog: CMS Battle: Drupal va Joomla va Custom Programming

Community News: Joomla!Day West Announced (Registration Open)

Keith Casey's Blog: Content Management comes to DC!


Community Events





Don't see your event here?
Let us know!


release code wordpress language podcast community interview developer configure list introduction application library threedevsandamaybe laravel install api unittest series bugfix

All content copyright, 2014 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework