-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2012.0156
 Two different vulnerabilities have been fixed in Joomla! 3.0.1 and 2.5.8
                             12 November 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Joomla!
Operating System:     UNIX variants (UNIX, Linux, OSX)
                      Windows
Impact/Access:        Cross-site Scripting           -- Remote with User Interaction
                      Provide Misleading Information -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2012-5827  
Member content until: Wednesday, December 12 2012

OVERVIEW

        A vulnerability has been fixed in Joomla! version 3.0.1 and another
        different vulnerability in Joomla! version 2.5.8.


IMPACT

        The following information is from the Joomla website:
        
        (No CVE assigned yet):
        "Typographical error leads to XSS vulnerability in language search
        component." [1]
        
        CVE-2012-5827:
        "Inadequate protection leads to clickjacking vulnerability." [2]


MITIGATION

        Customers using Joomla! version 3.0.0 should upgrade to version
        3.0.1 [1]; customers using Joomla! 2.5.7 and earlier 2.5.x
        versions should upgrade to version 2.5.8. [2]


REFERENCES

        [1] [20121001] - Core - XSS Vulnerability
            http://developer.joomla.org/security/news/541-20121001-core-xss-vulnerability.html

        [2] [20121102] - Core - Clickjacking
            http://developer.joomla.org/security/news/544-20121102-core-clickjacking.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=O641
-----END PGP SIGNATURE-----