Joomla! Cross-Site Scripting Vulnerability and Information Disclosure Security Issue

SECUNIA ADVISORY ID:
SA48683

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/48683/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=48683

RELEASE DATE:
2012-04-03
DESCRIPTION:
A security issue and a vulnerability have been reported in Joomla!,
which can be exploited by malicious people to disclose potentially
sensitive information and conduct cross-site scripting attacks.

1) An error related to insufficient permission checking can be
exploited to disclose certain information from the administration
backend.

2) Certain input passed via the update manager is not properly
sanitised before being returned to the user. This can be exploited to
execute arbitrary HTML and script code in a user's browser session in
context of an affected site.

The security issue and vulnerability are reported in versions prior
to 2.5.4.

SOLUTION:
Update to version 2.5.4.

PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Cyrille Barthelemy.
2) Alex Andreae.

ORIGINAL ADVISORY:
http://www.joomla.org/announcements/release-news/5418-joomla-254-released.html
http://developer.joomla.org/security/news/399-20120308-core-xss-vulnerability
http://developer.joomla.org/security/news/9-security/10-core-security/397-20120306-core-information-disclosure