Welcome, Guest
Username: Password: Remember me
  • Page:
  • 1

TOPIC: Heads up!

Heads up! 6 years 3 months ago #20467

  • jen.dth
  • jen.dth's Avatar Topic Author
  • Offline
  • Junior Boarder
  • Junior Boarder
  • Posts: 32
  • Thank you received: 0
Please be aware, we are seeing an increase in Joomla 1.5 malware, sql injections, and security breaches. We understand it is not always feasible to do so, but we do recommend upgrading your Joomla.

Using tools such as injection monitors and firewalls can also help prevent these malicious and destructive codes.

We will continue to help where we can in identifying these issues via our support ticket system.

Jen

Please Log in or Create an account to join the conversation.

Jen
DTH Support

Heads up! 6 years 3 months ago #20729

  • kroskopf
  • kroskopf's Avatar
  • Offline
  • Fresh Boarder
  • Fresh Boarder
  • Posts: 11
  • Thank you received: 0
Hi Jen-

Can you give us more information about what you're seeing? Is the weakness in Joomla 1.5 itself or is the weakness in the DT Register version running on J1.5?

How would I know if I am vulnerable or if I'm under attack?

THANKS!!

Please Log in or Create an account to join the conversation.

Heads up! 5 years 11 months ago #21707

  • natecovington
  • natecovington's Avatar
  • Offline
  • Fresh Boarder
  • Fresh Boarder
  • Posts: 15
  • Thank you received: 0
There is a Joomla 1.5 vulnerability for 1.5.26; you need to install this unofficial patch:

http://anything-digital.com/blog/securi ... stall.html

Also, make sure your JCE Editor extension is up to date, this had a bad security issue back in early 2013 (January I think) so this one needs to be updated as well.

Otherwise I've got a lot of clients running Joomla 1.5 sites without issue.

Please Log in or Create an account to join the conversation.

Heads up! 5 years 11 months ago #21738

  • buro210
  • buro210's Avatar
  • Offline
  • Fresh Boarder
  • Fresh Boarder
  • Posts: 1
  • Thank you received: 0
DT Register 2.8 is also vulnerable.
Please take a look at this post:
http://www.joomlacorner.com/joomla-news ... ction.html

I have also checked this on version 2.8.8, but SQLmap still gives the exploit.
This has not been fixed since then.

Can someone please tell me how to fix this?
I cannot use this component if there is no fix; it is just not safe enough.

Please Log in or Create an account to join the conversation.

  • Page:
  • 1
Time to create page: 0.095 seconds