Joomla! Developer - Vulnerability News Joomla! Security News ________________________________ [20090722] - Core - Missing JEXEC Check Posted: 22 Jul 2009 04:36 PM PDT * Project: Joomla! * SubProject: Framework * Severity: Moderate * Versions: 1.5.12 and all previous 1.5 releases * Exploit type: XSS * Reported Date: 2009-July-21 * Fixed Date: 2009-July-22 Description Some files were missing the check for JEXEC. These scripts will then expose internal path information of the host. Affected Installs All 1.5.x installs prior to and including 1.5.12 are affected. Solution Upgrade to latest Joomla! version (1.5.13 or newer). Reported by Juan Galiana Lara (Internet Security Auditors) Contact The JSST at the Joomla! Security Center. [20090722] - Core - File Upload Posted: 22 Jul 2009 04:17 PM PDT * Project: Joomla! * SubProject: TinyMCE editor * Severity: Critical * Versions: 1.5.12 * Exploit type: Image File upload * Reported Date: 2009-July-22 * Fixed Date: 2009-July-22 Description Tiny browser included with TinyMCE 3.0 editor allowed files to be uploaded and removed without logging in. Affected Installs Version 1.5.12 only Solution Upgrade to latest Joomla! version (1.5.13 or newer). Reported by Patrice Lazareff. Contact The JSST at the Joomla! Security Center. You are subscribed to email updates from Joomla! Developer - Vulnerability News To stop receiving these emails, you may unsubscribe now. Email delivery powered by Google Google Inc., 20 West Kinzie, Chicago IL USA 60610
_______________________________________________ New York PHP SIG: Joomla! Mailing List http://lists.nyphp.org/mailman/listinfo/joomla
NYPHPCon 2006 Presentations Online http://www.nyphpcon.com Show Your Participation in New York PHP http://www.nyphp.org/show_participation.php