Coder Social home page Coder Social logo

ovidiugabriel / joomla-cms Goto Github PK

View Code? Open in Web Editor NEW

This project forked from joomla/joomla-cms

0.0 0.0 0.0 180.44 MB

Home of the Joomla! Content Management System

Home Page: https://www.joomla.org

License: GNU General Public License v2.0

PHP 81.46% SQLPL 0.09% PLpgSQL 0.11% HTML 0.06% CSS 7.46% JavaScript 10.79% Makefile 0.01% Shell 0.02% Hack 0.01%

joomla-cms's People

Watchers

 avatar  avatar

joomla-cms's Issues

WS-2017-0195 Medium Severity Vulnerability detected by WhiteSource

WS-2017-0195 - Medium Severity Vulnerability

Vulnerable Libraries - jquery-1.12.4.js, jquery-1.12.4.min.js

jquery-1.12.4.js

JavaScript library for DOM operations

path: /joomla-cms/media/jui/js/jquery.js

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.12.4/jquery.js

Dependency Hierarchy:

  • jquery-1.12.4.js (Vulnerable Library)
jquery-1.12.4.min.js

JavaScript library for DOM operations

path: /joomla-cms/media/jui/js/jquery.min.js

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.12.4/jquery.min.js

Dependency Hierarchy:

  • jquery-1.12.4.min.js (Vulnerable Library)

Vulnerability Details

In v2.2.4 and previous, a lowercasing logic was used on the attribute names and was removed in v3.0.0.
Because of this, boolean attributes whose names were not all lowercase cause infinite recursion, and will exceed the stack call limit.

Publish Date: 2017-04-15

URL: WS-2017-0195

CVSS 2 Score Details (5.3)

Base Score Metrics not available

Suggested Fix

Type: Change files

Origin: jquery/jquery@d12e13d

Release Date: 2016-05-29

Fix Resolution: Replace or update the following files: attr.js, attributes.js


Step up your Open Source Security Game with WhiteSource here

CVE-2017-14596 High Severity Vulnerability detected by WhiteSource

CVE-2017-14596 - High Severity Vulnerability

Vulnerable Library - joomla/ldap-1.1.2

Joomla Framework LDAP Package

path: null

Dependency Hierarchy:

  • joomla/ldap-1.1.2 (Vulnerable Library)

Vulnerability Details

In Joomla! before 3.8.0, inadequate escaping in the LDAP authentication plugin can result in a disclosure of a username and password.

Publish Date: 2017-09-20

URL: CVE-2017-14596

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: http://www.securitytracker.com/id/1039407

Fix Resolution: The vendor has issued a fix (3.8.0).

[Editor's note: On November 7, 2017, the vendor issued a new security advisory (20171101) for an LDAP authentication plugin vulnerability using the same CVE number (CVE-2017-14596) as advisory 20170902. The new advisory lists versions 1.5.0 through 3.8.1 as affected and version 3.8.2 as a fixed version.]

The vendor advisory is available at:

https://developer.joomla.org/security-centre.html


Step up your Open Source Security Game with WhiteSource here

CVE-2015-9251 Medium Severity Vulnerability detected by WhiteSource

CVE-2015-9251 - Medium Severity Vulnerability

Vulnerable Libraries - jquery-1.12.4.js, jquery-1.11.3.min.js, jquery-1.12.4.min.js

jquery-1.12.4.js

JavaScript library for DOM operations

path: /joomla-cms/media/jui/js/jquery.js

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.12.4/jquery.js

Dependency Hierarchy:

  • jquery-1.12.4.js (Vulnerable Library)
jquery-1.11.3.min.js

JavaScript library for DOM operations

path: /joomla-cms/libraries/vendor/phpunit/php-code-coverage/src/CodeCoverage/Report/HTML/Renderer/Template/js/jquery.min.js

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.3/jquery.min.js

Dependency Hierarchy:

  • jquery-1.11.3.min.js (Vulnerable Library)
jquery-1.12.4.min.js

JavaScript library for DOM operations

path: /joomla-cms/media/jui/js/jquery.min.js

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.12.4/jquery.min.js

Dependency Hierarchy:

  • jquery-1.12.4.min.js (Vulnerable Library)

Vulnerability Details

jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.

Publish Date: 2018-01-18

URL: CVE-2015-9251

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Change files

Origin: jquery/jquery@b078a62#diff-bee4304906ea68bebadfc11be4368419

Release Date: 2015-10-12

Fix Resolution: Replace or update the following files: script.js, ajax.js, ajax.js


Step up your Open Source Security Game with WhiteSource here

WS-2018-0028 Medium Severity Vulnerability detected by WhiteSource

WS-2018-0028 - Medium Severity Vulnerability

Vulnerable Library - paragonie/random_compat-v1.4.1

PHP 5.x support for random_bytes() and random_int()

path: null

Dependency Hierarchy:

  • paragonie/random_compat-v1.4.1 (Vulnerable Library)

Vulnerability Details

The random_compat (before 2.0.0) uses the RAND_pseudo_bytes() API which has been marked as deprecated and by the OpenSSL team.

Publish Date: 2018-03-07

URL: WS-2018-0028

CVSS 2 Score Details (6.1)

Base Score Metrics not available

Suggested Fix

Type: Change files

Origin: paragonie/random_compat@1c435ec

Release Date: 2016-03-17

Fix Resolution: Replace or update the following files: build-phar.sh, random.php, libsodium_legacy.php, random_bytes_openssl.php


Step up your Open Source Security Game with WhiteSource here

CVE-2018-19296 Medium Severity Vulnerability detected by WhiteSource

CVE-2018-19296 - Medium Severity Vulnerability

Vulnerable Library - phpmailer/phpmailer-v5.2.22

The classic email sending library for PHP

path: null

Dependency Hierarchy:

  • phpmailer/phpmailer-v5.2.22 (Vulnerable Library)

Vulnerability Details

PHPMailer before 5.2.27 and 6.x before 6.0.6 is vulnerable to an object injection attack.

Publish Date: 2018-11-16

URL: CVE-2018-19296

CVSS 2 Score Details (5.3)

Base Score Metrics not available


Step up your Open Source Security Game with WhiteSource here

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.