Skip to main content

Critical Security at Joomla 1.5.X before 1.5.6 Version

Two day ago, Our Official website has defaced by some one, They change layout our official website with another picture.
i have investigate, the hole is from Joomla software where our office use to built website.

to recover that's hole we must edited joomla source code at :
File : /components/com_user/models/reset.php

Line: 111-130
{1} - Replace ' with empty char
{3} - If you enter ' in token field then query will be looks like : "SELECT id FROM jos_users WHERE block = 0 AND activation = '' "

that's smart solution, than upgrade to higher joomla version.

Comments

Popular posts from this blog

How SMS Works

SMS, or Short Message Service, is the technology behind what we often refer to as ‘text messages’ or ‘SMSes’, as well as what allows for news alerts on cellular phones. In recent years SMS has ballooned to over a 50 billion dollar industry and is quickly taking the communications world by storm. Short Message Service actually refers to a framework that uniquely allows computers, or in this case phones, to communicate with each other without the need of a central hub. With SMS, phones can find each other, send short packets of information back and forth, and do it all without any central computer to guide them. But because the system does not rely upon fixed lines like a land based telephone system does, the amount of information that can be sent at one time is limited in size. This depends on the language spoken, but for English letters this typically means around 150 characters (Chinese and Japanese letters are limited to 70). Quite recently, however, new developments in the technolog

Choosing the best computer model

Computer Families and Models Many computer manufacturers, especially such computer giants as IBM, Dell, Gateway, Sony, Apple, etc. issue families (series) of computers. Models of computers in each series have either the same principle of design, or same processor, or have been given diapason of performances. The series can include a base model, and several derivative models. Usually for each type of computer, manufacturers issue series that generally can be divided into 3-4 categories: budget-friendly (at low price), mid-range (at middle price), cutting-edge and ultimate performance (at high, and very high prices). IBM, Gateway, Dell and Apple issue computer families not only for Home and Home office, but also for Small, Mid size or Large Businesses. These families can also include the network optimized series. The needed features First of all, you have to make a preliminary analysis of your needs to pick a type of computer, and a zone where you might search this computer, for example,

Shocking Facts about Updating Your PC Operating System

From "ignorance is bliss" to "surprise attack and disaster" - how many thousands of Internet users have experienced this frustration and grief? This raises the obvious question: "Why haven't they prepared to avoid it?" The startling fact is that there are many long term Internet users who have never even considered updating their Operating Systems and protective Safe-ware. Perhaps the complexity of it all contributes to what might be described as User apathy - or indifference and a lack of enthusiasm toward the following: * The news of yet another vulnerability or patch process. * The potential damage to computer, personal information and reputation - i.e. the "It can't happen to me" attitude. * Their own abilities - i.e. "I'm too old, too dumb, too whatever - to learn how to fix a computer without breaking something." * Updating - i.e. "My computer came with an anti-virus program, so why does it need to be updated now?