• +54 9 2657 529169
  • fernando@estudiomarketing.com.ar

    News Feed Category

    Joomla! Security News

      • Project: Joomla!
      • SubProject: CMS
      • Impact:Low
      • Severity: Low
      • Versions: 1.5.0 through 3.8.7
      • Exploit type: XSS
      • Reported Date: 2017-October-28
      • Fixed Date: 2018-May-22
      • CVE Number: CVE-2018-6378

      Description

      Inadequate filtering of file and folder names lead to various XSS attack vectors in the media manager.

      Affected Installs

      Joomla! CMS versions 1.5.0 through 3.8.7

      Solution

      Upgrade to version 3.8.8

      Contact

      The JSST at the Joomla! Security Centre.

      Reported By:David Jardin, JSST
      • Project: Joomla!
      • SubProject: CMS
      • Impact: Low
      • Severity: Low
      • Versions: 3.1.2 through 3.8.7
      • Exploit type: XSS
      • Reported Date: 2018-March-30
      • Fixed Date: 2018-May-22
      • CVE Number: CVE-2018-11328

      Description

      Under specific circumstances (a redirect issued with a URI containing a username and password when the Location: header cannot be used), a lack of escaping the user-info component of the URI could result in a XSS vulnerability.

      Affected Installs

      Joomla! CMS versions 3.1.2 through 3.8.7

      Solution

      Upgrade to version 3.8.8

      Contact

      The JSST at the Joomla! Security Centre.

      Reported By:David Jardin, JSST
      • Project: Joomla!
      • SubProject: CMS
      • Impact: Medium
      • Severity: Low
      • Versions: 3.0.0 through 3.8.7
      • Exploit type: Session race condition
      • Reported Date: 2017-July-08
      • Fixed Date: 2018-May-22
      • CVE Number: CVE-2018-11324

      Description

      A long running background process, such as remote checks for core or extension updates, could create a race condition where a session which was expected to be destroyed would be recreated.

      Affected Installs

      Joomla! CMS versions 3.0.0 through 3.8.7

      Solution

      Upgrade to version 3.8.8

      Additional Resources

      • Links Go Here

      Contact

      The JSST at the Joomla! Security Centre.

      Reported By:David Jardin, JSST
      • Project: Joomla!
      • SubProject: CMS
      • Impact: Moderate
      • Severity: Low
      • Versions: 3.7.0 through 3.8.7
      • Exploit type: Remote Code Execution
      • Reported Date: 2018-May-14
      • Fixed Date: 2018-May-22
      • CVE Number: CVE-2018-11321

      Description

      Inadequate filtering allows users authorised to create custom fields to manipulate the filtering options and inject an unvalidated option.

      Affected Installs

      Joomla! CMS versions 3.7.0 through 3.8.7

      Solution

      Upgrade to version 3.8.8

      Contact

      The JSST at the Joomla! Security Centre.

      Reported By:Benjamin Trenkle, JSST
      • Project: Joomla!
      • SubProject: CMS
      • Impact: Moderate
      • Severity: Moderate
      • Versions: 3.0.0 through 3.8.7
      • Exploit type:XSS
      • Reported Date:2018-February-02 & 2018-March-27
      • Fixed Date: 2018-May-22
      • CVE Number: CVE-2018-11326

      Description

      Inadequate input filtering leads to multiple XSS vulnerabilities. Additionally, the default filtering settings could potentially allow users of the default Administrator user group to perform a XSS attack.

      Affected Installs

      Joomla! CMS versions 3.0.0 through 3.8.7

      Solution

      Upgrade to version 3.8.8

      Additional Resources

      Contact

      The JSST at the Joomla! Security Centre.

      Reported By:Kai Zhao of 3H Security Team & Zhouyuan Yang (FortiGuard Labs)

    About Helix

    Ball tip biltong pork belly frankfurter shankle jerky leberkas pig kielbasa kay boudin alcatra short loin.

    Jowl salami leberkas turkey pork brisket meatball turducken flank bilto porke belly ball tip. pork belly frankf urtane bilto