Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 358609 - www-apps/joomla: multiple vulnerabilities in 1.6.0
Summary: www-apps/joomla: multiple vulnerabilities in 1.6.0
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/43658/
Whiteboard: ~3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2011-03-12 20:28 UTC by Paweł Hajdan, Jr. (RETIRED)
Modified: 2011-03-22 22:27 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Paweł Hajdan, Jr. (RETIRED) gentoo-dev 2011-03-12 20:28:49 UTC
Multiple vulnerabilities have been reported in Joomla!, which can be exploited by malicious users to bypass certain security restrictions and cause a DoS (Denial of Service) and by malicious people to disclose sensitive information, conduct cross-site scripting and request forgery, and SQL injection attacks.

1) Certain unspecified input is not properly sanitised before being used. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

NOTE: This can further be exploited to disclose the installation path via SQL error messages.

2) Certain unhandled exceptions can be exploited to disclose the full installation path.

3) Certain double URL-encoded input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

4) Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

5) An error in the checking of access permissions can be exploited to disclose certain information.

6) Certain unspecified input is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary site e.g. when the user clicks a specially crafted link to the affected script hosted on a trusted domain.

7) Certain unspecified input is not properly sanitised before being used. This can be exploited to disclose potentially sensitive information.

8) An error in the handling of access permissions can be exploited to edit otherwise restricted files.

9) The application allows users to perform certain actions via HTTP requests without making proper validity checks to verify the requests. This can be exploited to perform certain unspecified actions within the application by tricking a user into visiting a malicious web site while being logged in to the application.

10) An error within the editor caching facility can be exploited to use all available disk space.

The vulnerabilities are reported in versions prior to 1.6.1.
Comment 1 Paweł Hajdan, Jr. (RETIRED) gentoo-dev 2011-03-12 20:30:49 UTC
Maintainers, please make sure the ebuild for joomla-1.6.1 is not hard masked and has at least the same keywords the previous ~arch ebuild has.
Comment 2 Christian Faulhammer (RETIRED) gentoo-dev 2011-03-13 10:55:31 UTC
The hard mask will not be reverted as 1.6 is a major rewrite, and an upgrade is not so easily done.  Apart from this, the Secunia advisory is a bit misleading as 1.6.0 is the only affected version not anything below that, see the original Joomla! advisories.  From the Joomla! FAQ:

Question: how long will Joomla 1.5 and 1.6 be supported?
Joomla 1.5 is branded a Long Term Support Release (LTS)and will have support until the beginning of april 2012. Joomla 1.6 is a standard support release, and will be supported until august 2011. Joomla 1.7 should be released in july 2011. More about the development strategy can be found here: http://developer.joomla.org/strategy.html.

Additional KEYWORDS added.
Comment 3 Tim Sammut (RETIRED) gentoo-dev 2011-03-22 22:27:53 UTC
I've been through the Joomla advisories, most easily found at http://www.joomla.org/announcements/release-news/5350-joomla-161-released.html, and agree it looks like this only affected 1.6.0, which was never in the tree. 

http://sources.gentoo.org/cgi-bin/viewvc.cgi/gentoo-x86/www-apps/joomla/?hideattic=0

Therefore, I do not think we have anything to do here; please reopen if you disagree. Thanks, everyone.