[SA18361] Joomla! vCard Email Address Disclosure and TinyMCE Compressor Vulnerabilities

2006-01-10T00:00:00
ID SECURITYVULNS:DOC:10961
Type securityvulns
Reporter Securityvulns
Modified 2006-01-10T00:00:00

Description

TITLE: Joomla! vCard Email Address Disclosure and TinyMCE Compressor Vulnerabilities

SECUNIA ADVISORY ID: SA18361

VERIFY ADVISORY: http://secunia.com/advisories/18361/

CRITICAL: Moderately critical

IMPACT: Cross Site Scripting, Exposure of sensitive information

WHERE: >From remote

SOFTWARE: Joomla! 1.x http://secunia.com/product/5788/

DESCRIPTION: Two vulnerabilities have been reported in Joomla!, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information.

1) An error exists in restricting direct access to users' vCard via URL. This can be exploited to retrieve users' vCards and gain access to their email addresses even when vCard access has been disabled.

2) A vulnerable version of TinyMCE is used by Joomla!.

For more information: SA18262

The vulnerabilities have been reported in version 1.0.5. Prior versions may also be affected.

SOLUTION: The vulnerabilities have been fixed in the CVS repositories.

The fixes will reportedly be included in version 1.0.6.

PROVIDED AND/OR DISCOVERED BY: 1) L. Lister 2) Reported by vendor

ORIGINAL ADVISORY: Joomla: http://forge.joomla.org/sf/go/artf2950 http://forge.joomla.org/integration/viewcvs/viewcvs.cgi?root=joomla&rev=1713&system=exsy1002&view=rev http://forge.joomla.org/integration/viewcvs/viewcvs.cgi?root=joomla&rev=1717&system=exsy1002&view=rev

ListerIT: http://www.listerit.com/content/view/116/84/

OTHER REFERENCES: SA18262: http://secunia.com/advisories/18262/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.