Joomla! 1.6 < 1.6.2 Multiple Vulnerabilities (deprecated)

medium Nessus Network Monitor Plugin ID 5893

Synopsis

The remote web server has an application that is vulnerable to multiple attack vectors.

Description

The remote web server is hosting Joomla!, a content management system written in PHP.

Versions of Joomla 1.6 earlier than 1.6.2 are potentially affected by multiple vulnerabilities :

- Multiple inadequate error checking issues could lead to information disclosure. (20110402, 20110403)

- Unescaped values in the administrative modal windows causes potential cross-site scripting vulnerabilities. (20110404)

- Multiple inadequate filtering issues could lead to cross-site scripting attacks. (20110405, 20110406)

- Inadequate permissions checking could allow unauthorised access. (20110407)

- Unescaped values in a query could lead to a SQL injection vulnerability. (20110408)

- Inadequate protection could lead to a clickjacking vulnerability. (20110409)

Solution

Upgrade to Joomla! 1.6.2 or later.

See Also

http://www.joomla.org/announcements/release-news/5368-joomla-162-released.html

http://developer.joomla.org/security/news/341-20110402-core-information-disclosure

http://developer.joomla.org/security/news/342-20110403-core-information-disclosure

http://developer.joomla.org/security/news/343-20110404-core-xss-vulnerabilities

http://developer.joomla.org/security/news/344-20110405-core-xss-vulnerabilities

http://developer.joomla.org/security/news/345-20110406-core-xss-vulnerabilities

http://developer.joomla.org/security/news/346-20110407-core-unauthorised-access

http://developer.joomla.org/security/news/348-20110408-core-sql-injection

http://developer.joomla.org/security/news/347-20110409-core-clickjacking

Plugin Details

Severity: Medium

ID: 5893

Family: CGI

Published: 4/18/2011

Updated: 6/1/2015

Vulnerability Information

Patch Publication Date: 4/14/2011

Vulnerability Publication Date: 4/14/2011

Reference Information

BID: 47387