Description: "irk4z has discovered a vulnerability in Joomla!, which can be exploited by malicious people to disclose sensitive information. Input passed to the "X_CMS_LIBRARY_PATH" HTTP header handled in plugins/editors/xstandard/attachmentlibrary.php is not properly verified before being used. This can be exploited to display arbitrary directory contents via directory traversal attacks. This vulnerability is confirmed in version 1.5.8. Other versions may also be affected." Exploit is also available: http://milw0rm.com/exploits/7691
1.5.9 is out: http://www.joomla.org/announcements/release-news/5226-joomla-159-security-release-now-available.html
*** Bug 255969 has been marked as a duplicate of this bug. ***
New version (1.5.9) was just added to the tree. Ebuild is ~arch, and package.masked, so bug can be closed.
Closing then. Third one in a row, yay. :p