Joomla! Developer - Vulnerability News 
Joomla! Security News 
  
 
________________________________
 
[20090722] - Core - Missing JEXEC Check 
Posted: 22 Jul 2009 04:36 PM PDT
        * Project: Joomla!
        * SubProject: Framework
        * Severity: Moderate
        * Versions: 1.5.12 and all previous 1.5 releases
        * Exploit type: XSS
        * Reported Date: 2009-July-21
        * Fixed Date: 2009-July-22
Description
Some files were missing the check for JEXEC.  These scripts will then expose 
internal path information of the host.
Affected Installs
All 1.5.x installs prior to and including 1.5.12 are affected.
Solution
Upgrade to latest Joomla! version (1.5.13 or newer).
Reported by Juan Galiana Lara (Internet Security Auditors)
Contact
The JSST at the Joomla! Security Center.  
[20090722] - Core - File Upload 
Posted: 22 Jul 2009 04:17 PM PDT
        * Project: Joomla!
        * SubProject: TinyMCE editor
        * Severity: Critical
        * Versions: 1.5.12
        * Exploit type: Image File upload
        * Reported Date: 2009-July-22
        * Fixed Date: 2009-July-22
Description
Tiny browser included with TinyMCE 3.0 editor allowed files to be uploaded and 
removed without logging in.
Affected Installs
Version 1.5.12 only
Solution
Upgrade to latest Joomla! version (1.5.13 or newer).
Reported by Patrice Lazareff.
Contact
The JSST at the Joomla! Security Center.  
You are subscribed to email updates from Joomla! Developer - Vulnerability News 
To stop receiving these emails, you may unsubscribe now. Email delivery powered 
by Google 
Google Inc., 20 West Kinzie, Chicago IL USA 60610 
_______________________________________________
New York PHP SIG: Joomla! Mailing List
http://lists.nyphp.org/mailman/listinfo/joomla

NYPHPCon 2006 Presentations Online
http://www.nyphpcon.com

Show Your Participation in New York PHP
http://www.nyphp.org/show_participation.php

Reply via email to