First published: Sun Oct 07 2012(Updated: )
Joomla! before 1.5.12 does not perform a JEXEC check in unspecified files, which allows remote attackers to obtain the installation path via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Joomla | <=1.5.11 | |
Joomla | =1.5.3 | |
Joomla | =1.5.2 | |
Joomla | =1.5.9 | |
Joomla | =1.5.4 | |
Joomla | =1.5.10 | |
Joomla | =1.5.7 | |
Joomla | =1.5.0 | |
Joomla | =1.5.6 | |
Joomla | =1.5.1 | |
Joomla | =1.5.8 | |
Joomla | =1.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4911 is classified as a medium severity vulnerability due to its potential to expose sensitive information.
To fix CVE-2011-4911, upgrade Joomla! to version 1.5.12 or later, which includes the necessary JEXEC checks.
CVE-2011-4911 affects all Joomla! versions prior to 1.5.12, specifically versions 1.5.0 through 1.5.11.
CVE-2011-4911 can be exploited by remote attackers to obtain the installation path of the Joomla! application.
There is no specific workaround for CVE-2011-4911; upgrading to a patched version is the recommended solution.