First published: Mon Dec 03 2012(Updated: )
Joomla! 1.5.x before 1.5.26 has unspecified impact and attack vectors related to "insufficient randomness" and a "password reset vulnerability."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Joomla | =1.5.0 | |
Joomla | =1.5.1 | |
Joomla | =1.5.2 | |
Joomla | =1.5.3 | |
Joomla | =1.5.4 | |
Joomla | =1.5.5 | |
Joomla | =1.5.6 | |
Joomla | =1.5.7 | |
Joomla | =1.5.8 | |
Joomla | =1.5.9 | |
Joomla | =1.5.10 | |
Joomla | =1.5.11 | |
Joomla | =1.5.12 | |
Joomla | =1.5.13 | |
Joomla | =1.5.14 | |
Joomla | =1.5.15 | |
Joomla | =1.5.15-rc | |
Joomla | =1.5.16 | |
Joomla | =1.5.17 | |
Joomla | =1.5.18 | |
Joomla | =1.5.19 | |
Joomla | =1.5.20 | |
Joomla | =1.5.21 | |
Joomla | =1.5.22 | |
Joomla | =1.5.23 | |
Joomla | =1.5.24 | |
Joomla | =1.5.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1598 has an unspecified severity rating related to insufficient randomness in the password reset process.
To fix CVE-2012-1598, you should upgrade your Joomla! installation to version 1.5.26 or later.
CVE-2012-1598 affects Joomla! versions 1.5.0 through 1.5.25.
CVE-2012-1598 is a password reset vulnerability resulting from insufficient randomness.
Yes, CVE-2012-1598 can potentially allow attackers to exploit the password reset mechanism to compromise user accounts.