Mandriva Security Update Fixes Joomla Multiple Remote Vulnerabilities


Description   Multiple vulnerabilities have been identified in Mandriva, which could be exploited to conduct cross site scripting and request forgery attacks. These issues are caused by input validation errors in various Joomla pages when processing user-supplied data, which could be exploited by attackers to perform malicious actions via HTTP requests or cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
     
Vulnerable Products   Vulnerable Software:
Mandriva Linux 2007.0Mandriva Linux 2007.1Mandriva Linux 2008.0
     
Solution   Upgrade the affected packages :Mandriva Linux 2007.0:5f0adf1ca84dfa5252ca1a82ab865a75 2007.0/i586/joomla-1.0.15-0.1mdv2007.0.noarch.rpmf794badb8ac18137990f401eea61fcd5 2007.0/i586/joomla-administrator-1.0.15-0.1mdv2007.0.noarch.rpmebd92dea41fbfe31328aa60b876e3d78 2007.0/SRPMS/joomla-1.0.15-0.1mdv2007.0.src.rpmMandriva Linux 2007.0/X86_64:c4dfb0c218ecd4677db7cb73c2de1f14 2007.0/x86_64/joomla-1.0.15-0.1mdv2007.0.noarch.rpm23d52be38d17120cde974adab8375d86 2007.0/x86_64/joomla-administrator-1.0.15-0.1mdv2007.0.noarch.rpmebd92dea41fbfe31328aa60b876e3d78 2007.0/SRPMS/joomla-1.0.15-0.1mdv2007.0.src.rpmMandriva Linux 2007.1:19a42a1369674164538db858af9405ff 2007.1/i586/joomla-1.0.15-0.1mdv2007.1.noarch.rpm55525938eabff027c19bdd233cfc5bde 2007.1/i586/joomla-administrator-1.0.15-0.1mdv2007.1.noarch.rpm4be5e56dec84c4d0f34c8363b68e68a3 2007.1/SRPMS/joomla-1.0.15-0.1mdv2007.1.src.rpmMandriva Linux 2007.1/X86_64:7d78e93c570396f2db0ebc12e9201dc5 2007.1/x86_64/joomla-1.0.15-0.1mdv2007.1.noarch.rpmc4854df8790fc8eabe4b0024e72f174a 2007.1/x86_64/joomla-administrator-1.0.15-0.1mdv2007.1.noarch.rpm4be5e56dec84c4d0f34c8363b68e68a3 2007.1/SRPMS/joomla-1.0.15-0.1mdv2007.1.src.rpmMandriva Linux 2008.0:fa7eb9a56f6b0b3d7e143e467baf181e 2008.0/i586/joomla-1.0.15-0.1mdv2008.0.noarch.rpmec3fb80329c9a2c7bd14af9a39a8ed8e 2008.0/i586/joomla-administrator-1.0.15-0.1mdv2008.0.noarch.rpm1c09f30544ae0ddcfad1b19eaab5400d 2008.0/SRPMS/joomla-1.0.15-0.1mdv2008.0.src.rpmMandriva Linux 2008.0/X86_64:9c05dd8c7fdc9c9c31490b40594c0c74 2008.0/x86_64/joomla-1.0.15-0.1mdv2008.0.noarch.rpm1bffce8962d7208a28af7bbcc6380d96 2008.0/x86_64/joomla-administrator-1.0.15-0.1mdv2008.0.noarch.rpm1c09f30544ae0ddcfad1b19eaab5400d 2008.0/SRPMS/joomla-1.0.15-0.1mdv2008.0.src.rpm
     
CVE   CVE-2007-6645
CVE-2007-6644
CVE-2007-6643
CVE-2007-6642
     
References   http://archives.mandrivalinux.com/security-announce/2008-03/msg00005.php
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious tag with event found in data
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - POST : suspicious 'object' tag found in data
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious 'applet' tag found in data
3.2.0
XSS - Prevention - POST : 'location' javascript object found in data
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - POST : javascript code found in data
3.2.0
XSS - Prevention - POST : suspicious 'iframe' tag found in data
3.2.0
XSS - Prevention - POST : code allowing cookie access found in data
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious 'embed' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'style' tag found in data
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
XSS - Prevention - POST : suspicious 'div' tag found in data
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - POST : 'script' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'style' attribute found in data
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
     


 
 
 
 
 Risk level 
Low 

 Vulnerability First Public Report Date 
2008-03-06 

 Target Type 
Client 

 Possible exploit 
Local & Remote