CVE-2011-3747
https://notcve.org/view.php?id=CVE-2011-3747
Joomla! 1.6.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by libraries/phpmailer/language/phpmailer.lang-joomla.php. Joomla! v1.6.0 permite a atacantes remotos obtener información sensible a través de una petición directa a un archivo .php, lo que revela la ruta de instalación en un mensaje de error, como se demostró con libraries/phpmailer/language/phpmailer.lang-joomla.php. • http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/joomla-1.6.0 http://www.openwall.com/lists/oss-security/2011/06/27/6 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2011-2892
https://notcve.org/view.php?id=CVE-2011-2892
Joomla! 1.6.x before 1.6.2 does not prevent page rendering inside a frame in a third-party HTML document, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site. Joomla! v1.6.x anteriores a v1.6.2 no impide la renderización de páginas dentro de un marco en un documento HTML de terceros, lo que hace facilita a los atacantes remotos el realizar ataques de clickjacking mediante un sitio web manipulado. • http://bl0g.yehg.net/2011/04/joomla-161-and-lower-information.html http://developer.joomla.org/security/news/347-20110409-core-clickjacking.html • CWE-20: Improper Input Validation •
CVE-2011-2710
https://notcve.org/view.php?id=CVE-2011-2710
Multiple cross-site scripting (XSS) vulnerabilities in Joomla! before 1.7.0 allow remote attackers to inject arbitrary web script or HTML via (1) the URI to includes/application.php, reachable through index.php; and, when Internet Explorer or Konqueror is used, (2) allow remote attackers to inject arbitrary web script or HTML via the searchword parameter in a search action to index.php in the com_search component. NOTE: vector 2 exists because of an incomplete fix for CVE-2011-2509.5. Múltiples vulnerabilidades de ejecución de secuencias de comandos en sitios cruzados (XSS) en Joomla! before v1.7.0, permiten a atacantes remotos inyectar secuencias de comandos web o HTML a través de(1) la URI sobre includes/application.php, accesible desde index.php; y, cuando de usa Internet Explorer o Konqueror, (2) permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro searchword en una acción search sobre index.php en el componente com_search. • http://developer.joomla.org/security/news/357-20110701-xss-vulnerability.html http://www.openwall.com/lists/oss-security/2011/07/22/1 http://www.openwall.com/lists/oss-security/2011/07/22/5 http://www.openwall.com/lists/oss-security/2011/10/16/1 http://www.openwall.com/lists/oss-security/2011/11/21/27 http://yehg.net/lab/pr0js/advisories/joomla/core/%5Bjoomla_1.7.0-rc%5D_cross_site_scripting%28XSS%29 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2011-2891
https://notcve.org/view.php?id=CVE-2011-2891
Joomla! 1.6.x before 1.6.2 allows remote attackers to obtain sensitive information via an empty Itemid array parameter to index.php, which reveals the installation path in an error message, a different vulnerability than CVE-2011-2488. Joomla! v1.6.x anterior a v1.6.2 permite a atacantes remotos obtener información sensible a través de un parámetro de array Itemid vacío sobre index.php, lo que revela la ruta de instalación en un mensaje de error, una vulnerabilidad diferente a CVE-2011-2488. • http://bl0g.yehg.net/2011/04/joomla-161-and-lower-information.html http://developer.joomla.org/security/news/341-20110402-core-information-disclosure.html http://www.openwall.com/lists/oss-security/2011/06/27/6 http://www.openwall.com/lists/oss-security/2011/06/27/8 https://exchange.xforce.ibmcloud.com/vulnerabilities/68881 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2011-2509 – Joomla! 1.6.3 Cross Site Scripting
https://notcve.org/view.php?id=CVE-2011-2509
Multiple cross-site scripting (XSS) vulnerabilities in Joomla! before 1.6.4 allow remote attackers to inject arbitrary web script or HTML via (1) the query string to the com_contact component, as demonstrated by the Itemid parameter to index.php; (2) the query string to the com_content component, as demonstrated by the filter_order parameter to index.php; (3) the query string to the com_newsfeeds component, as demonstrated by an arbitrary parameter to index.php; or (4) the option parameter in a reset.request action to index.php; and, when Internet Explorer or Konqueror is used, (5) allow remote attackers to inject arbitrary web script or HTML via the searchword parameter in a search action to index.php in the com_search component. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en Joomla! en versiones anteriores a la 1.6.4. Permiten a usuarios remotos inyectar codigo de script web o código HTML de su elección a través de (1) la cadena de texto de petición ("query string") al componente com_contact, como se ha demostrado con el parámetro filter_order de index.php; (3) la "query string" al componente com_newsfeeds, como se ha demostrado por un parámetro arbitrario a index.php; o (4) el parámetro option en una acción ("action") reset.request de index.php; y, si Internet Explorer o Konqueror es utilizado, (5) permite a usuarios remotos inyectar codigo de script web o código HTML de su elección a través del parámetro searchword de una acción search a index.php en el componente com_search. • http://developer.joomla.org/security/news/352-20110604-xss-vulnerability.html http://www.openwall.com/lists/oss-security/2011/06/28/4 http://www.openwall.com/lists/oss-security/2011/06/29/12 http://yehg.net/lab/pr0js/advisories/joomla/core/%5Bjoomla_1.6.3%5D_cross_site_scripting%28XSS%29 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •