FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

Joomla! -- multiple vulnerabilities

Affected packages
1.5.0 <= joomla3 < 3.4.7

Details

VuXML ID c0ef061a-c7f0-11e6-ae1b-002590263bf5
Discovery 2015-12-21
Entry 2016-12-22

The JSST and the Joomla! Security Center report:

[20151206] - Core - Session Hardening

The Joomla Security Strike team has been following up on the critical security vulnerability patched last week. Since the recent update it has become clear that the root cause is a bug in PHP itself. This was fixed by PHP in September of 2015 with the releases of PHP 5.4.45, 5.5.29, 5.6.13 (Note that this is fixed in all versions of PHP 7 and has been back-ported in some specific Linux LTS versions of PHP 5.3). This fixes the bug across all supported PHP versions.

[20151207] - Core - SQL Injection

Inadequate filtering of request data leads to a SQL Injection vulnerability.

References

URL https://developer.joomla.org/security-centre/639-20151206-core-session-hardening.html
URL https://developer.joomla.org/security-centre/640-20151207-core-sql-injection.html
URL https://www.joomla.org/announcements/release-news/5643-joomla-3-4-7.html