FreeBSD : joomla -- flaw in the reset token validation (8514b6e7-6f0f-11dd-b3db-001c2514716c)

High Nessus Plugin ID 34018


The remote FreeBSD host is missing a security-related update.


Joomla project reports :

A flaw in the reset token validation mechanism allows for non-validating tokens to be forged. This will allow an unauthenticated, unauthorized user to reset the password of the first enabled user (lowest id). Typically, this is an administrator user.
Note, that changing the first users username may lessen the impact of this exploit (since the person who changed the password does not know the login associated with the new password). However, the only way to completely rectify the issue is to upgrade to 1.5.6 (or patch the /components/com_user/models/reset.php file).


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 34018

File Name: freebsd_pkg_8514b6e76f0f11ddb3db001c2514716c.nasl

Version: $Revision: 1.10 $

Type: local

Published: 2008/08/21

Modified: 2013/06/22

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:joomla15, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2008/08/20

Vulnerability Publication Date: 2008/08/14

Reference Information

CVE: CVE-2008-3681

CWE: 264