TITLE: Joomla! vCard Email Address Disclosure and TinyMCE Compressor Vulnerabilities
SECUNIA ADVISORY ID: SA18361
VERIFY ADVISORY: http://secunia.com/advisories/18361/
CRITICAL: Moderately critical
IMPACT: Cross Site Scripting, Exposure of sensitive information
WHERE: >From remote
SOFTWARE: Joomla! 1.x http://secunia.com/product/5788/
DESCRIPTION: Two vulnerabilities have been reported in Joomla!, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information.
1) An error exists in restricting direct access to users' vCard via URL. This can be exploited to retrieve users' vCards and gain access to their email addresses even when vCard access has been disabled.
2) A vulnerable version of TinyMCE is used by Joomla!.
For more information: SA18262
The vulnerabilities have been reported in version 1.0.5. Prior versions may also be affected.
SOLUTION: The vulnerabilities have been fixed in the CVS repositories.
The fixes will reportedly be included in version 1.0.6.
PROVIDED AND/OR DISCOVERED BY: 1) L. Lister 2) Reported by vendor
ORIGINAL ADVISORY: Joomla: http://forge.joomla.org/sf/go/artf2950 http://forge.joomla.org/integration/viewcvs/viewcvs.cgi?root=joomla&rev=1713&system=exsy1002&view=rev http://forge.joomla.org/integration/viewcvs/viewcvs.cgi?root=joomla&rev=1717&system=exsy1002&view=rev
OTHER REFERENCES: SA18262: http://secunia.com/advisories/18262/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.