Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2015.0104 A number of vulnerabilities have been identified in Joomla! 26 October 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Joomla! Operating System: UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2015-7899 CVE-2015-7859 CVE-2015-7858 CVE-2015-7857 CVE-2015-7297 Member content until: Wednesday, November 25 2015 OVERVIEW A number of vulnerabilities have been identified in Joomla! prior to version 3.4.5. [1, 2, 3] IMPACT The vendor has provided the following details regarding these vulnerabilities: CVE-2015-7297, CVE-2015-7857, CVE-2015-7858: "Inadequate filtering of request data leads to a SQL Injection vulnerability." [1] CVE-2015-7859: "Inadequate ACL checks in com_contenthistory provide potential read access to data which should be access restricted." [2] CVE-2015-7899: "Inadequate ACL checks in com_content provide potential read access to data which should be access restricted." [3] MITIGATION The vendor recommends updating to the latest version of Joomla! to correct these issues. [1, 2, 3] REFERENCES [1] [20151001] - Core - SQL Injection http://developer.joomla.org/security-centre/628-20151001-core-sql-injection.html [2] [20151002] - Core - ACL Violations http://developer.joomla.org/security-centre/629-20151002-core-acl-violations.html AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVi2rPn6ZAP0PgtI9AQJl+w/9HVv1ok1A3SLkV+CpSiZcfTi7JSfHjbH+ NRYknRf8JpuQ3lBoEkJvOIvEIjqjk+Yt200wBbwn3BzXaC9scUcOEkUftQW2MJnB s0kpH2TwhaweGcAGu26SG3eSNx9o0NUwgdqs/nIu/qmwQQBkPfsC9Yy7BmUDUx2S 1wH6Yj9mKGz4hDmgCJxT1gk6lrd3kgONt/NPXS0VF8+naR3KfxNec2gVrJraglaY z+ferN/ZOiU1/K9Ejt+cOdTkB5C2qZ/SNwPQXF6qFw9J7CLmVeFqnpYJq0LrOW/5 1TCNjs6dYrevLXw8I9Bw4U5bZeevQNlFT1XzPiBUab5No5llB9r5XWs5jkZR+eCP P2Unn2NZKX+sv8ryUf31UoR2Fqu/bi2acZZths68ffyKfhBfscRIiH1JXqojzZdJ /jVBL+N5bXiZiDoc4pFiBuIPwyie+1V5axs8NebxToqCM7g6Wr41vHkOGrQGH07Z Sq9DNAed7t20sHyBV46M8NxoJVZro/E+cv3aTtc691V/L0FjSTaJ9mKRN2yxg7Pe tn3aB9rAfLpUDb3fr9RS81Qa44oVvVNWcSqQrSG3M/jneeR8VRXLlu1DrnJ3vkJv G0BfMdwY5QE3WxUn7EjhL2bnjX2BSz7YtaFvcWG/+pYz1asRGXb/qeCs8LI2S0Xl Z86SgTztIpU= =BSb2 -----END PGP SIGNATURE-----