-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                              ASB-2012.0012.2
          Information Disclosure & XSS vulnerabilities in Joomla!
                             7 September 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          Joomla!
Operating System: UNIX variants (UNIX, Linux, OSX)
                  Windows
Impact/Access:    Cross-site Scripting     -- Remote/Unauthenticated
                  Access Confidential Data -- Remote/Unauthenticated
Resolution:       Patch/Upgrade
CVE Names:        CVE-2012-0822 CVE-2012-0821 

Revision History: September  7 2012: Added CVEs
                  January   30 2012: Initial Release

OVERVIEW

        Multiple vulnerabilities have been identified in Joomla! 1.7.3 and 
        earlier versions. [1,2,3,4]


IMPACT

        The vulnerabilities advised by Joomla! are:
        
        Inadequate filtering leads to information disclosure. [1]
        
        Inadequate filtering leads to XSS vulnerability. [2]
        
        Inadequate filtering leads to XSS vulnerability. [3]
        
        Inadequate filtering leads to information disclosure. [4]


MITIGATION

        Upgrade to version 1.7.4 or 2.5.0 or higher. 
        
        Note: 1.7.x branch of the Joomla! CMS will reach its end of life on 
        24 February 2012. [5]


REFERENCES

        [1] [20120101] - Core - Information Disclosure
            http://developer.joomla.org/security/news/382-20120101-core-information-disclosure.html

        [2] [20120102] - Core - XSS Vulnerability
            http://developer.joomla.org/security/news/383-20120102-core-xss-vulnerability.html

        [3] [20120104] - Core - XSS Vulnerability
            http://developer.joomla.org/security/news/385-20120104-core-xss-vulnerability.html

        [4] [20120103] - Core - Information Disclosure
            http://developer.joomla.org/security/news/384-20120103-core-information-disclosure.html

        [5] Development Status
            http://developer.joomla.org/development-status.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ud4U
-----END PGP SIGNATURE-----