lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20110720131542.GB9851@foo.fgeek.fi> Date: Wed, 20 Jul 2011 16:15:42 +0300 From: Henri Salo <henri@...v.fi> To: full-disclosure@...ts.grok.org.uk Cc: oss-security@...ts.openwall.com Subject: Fwd: Joomla! Security News Joomla! Developer Network - Security News /////////////////////////////////////////// [20110701] - XSS Vulnerability Posted: 19 Jul 2011 09:15 PM PDT http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/4KDvSjZRIvs/357-20110701-xss-vulnerability.html?utm_source=feedburner&utm_medium=email Project: Joomla! SubProject: All Severity: Medium Versions: 1.6.5 and all earlier 1.6.x versions Exploit type: XSS Reported Date: 2011-July-11 Fixed Date: 2011-July-19 Description Inadequate escaping leads to XSS vulnerability. Affected Installs Joomla! version 1.6.5 and all earlier 1.6.x versions Solution Upgrade to the latest Joomla! version (1.7.0 or later) Reported by Aung Khant Contact The JSST at the Joomla! Security Center. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/