Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:10961
HistoryJan 10, 2006 - 12:00 a.m.

[SA18361] Joomla! vCard Email Address Disclosure and TinyMCE Compressor Vulnerabilities

2006-01-1000:00:00
vulners.com
16

TITLE:
Joomla! vCard Email Address Disclosure and TinyMCE Compressor
Vulnerabilities

SECUNIA ADVISORY ID:
SA18361

VERIFY ADVISORY:
http://secunia.com/advisories/18361/

CRITICAL:
Moderately critical

IMPACT:
Cross Site Scripting, Exposure of sensitive information

WHERE:
>From remote

SOFTWARE:
Joomla! 1.x
http://secunia.com/product/5788/

DESCRIPTION:
Two vulnerabilities have been reported in Joomla!, which can be
exploited by malicious people to conduct cross-site scripting attacks
and disclose sensitive information.

1) An error exists in restricting direct access to users' vCard via
URL. This can be exploited to retrieve users' vCards and gain access
to their email addresses even when vCard access has been disabled.

2) A vulnerable version of TinyMCE is used by Joomla!.

For more information:
SA18262

The vulnerabilities have been reported in version 1.0.5. Prior
versions may also be affected.

SOLUTION:
The vulnerabilities have been fixed in the CVS repositories.

The fixes will reportedly be included in version 1.0.6.

PROVIDED AND/OR DISCOVERED BY:
1) L. Lister
2) Reported by vendor

ORIGINAL ADVISORY:
Joomla:
http://forge.joomla.org/sf/go/artf2950
http://forge.joomla.org/integration/viewcvs/viewcvs.cgi?root=joomla&rev=1713&system=exsy1002&view=rev
http://forge.joomla.org/integration/viewcvs/viewcvs.cgi?root=joomla&rev=1717&system=exsy1002&view=rev

ListerIT:
http://www.listerit.com/content/view/116/84/

OTHER REFERENCES:
SA18262:
http://secunia.com/advisories/18262/


About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.