Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 8 Oct 2010 23:19:11 +0200
From: Hanno Böck <hanno@...eck.de>
To: oss-security@...ts.openwall.com
Subject: CVE request: joomla before 1.5.21 XSS


http://developer.joomla.org/security/news/9-security/10-core-security/322-20101001-core-xss-
vulnerabilities


  [20101001] - Core - XSS Vulnerabilities

    * Project: Joomla!
    * SubProject: All
    * Severity: Medium
    * Versions: 1.5.20 and all previous 1.5 releases
    * Exploit type: XSS Injection
    * Reported Date: 2010-October-05
    * Fixed Date: 2010-October-08

Description

Inadequate filtering of multiple encoded entities permits XSS attacks in some
circumstances.
Affected Installs

All 1.5.x installs prior to and including 1.5.20 are affected.
-- 
Hanno Böck		Blog:		http://www.hboeck.de/
GPG: 3DBD3B20		Jabber/Mail:	hanno@...eck.de

http://schokokeks.org - professional webhosting

[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ