FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

joomla -- multiple vulnerabilities

Affected packages
joomla15 < 1.5.11

Details

VuXML ID bdccd14b-5aac-11de-a438-003048590f9e
Discovery 2009-06-03
Entry 2009-06-16
Modified 2010-05-02

Secunia reports:

Some vulnerabilities have been reported in Joomla!, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks.

Certain unspecified input is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in the context of an affected site when the malicious data is displayed.

Certain unspecified input passed to the user view of the com_users core component is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Input passed via certain parameters to the "JA_Purity" template is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

References

CVE Name CVE-2009-1938
CVE Name CVE-2009-1939
CVE Name CVE-2009-1940
URL http://secunia.com/advisories/35278/
URL http://www.joomla.org/announcements/release-news/5235-joomla-1511-security-release-now-available.html