Joomla Security |
by David Dwyer on 09/07/2015 |
Following up on our recent competency blog article about Joomla here is an example of what a competent Web Developer is signed up for to receive if they are managing Joomla websites.
Has your Joomla web developer been in touch to advise or have they dealt with or are they not even aware that the Security update has been released?
DescriptionLack of CSRF checks potentially enabled uploading malicious code.
Affected InstallsJoomla! CMS versions 3.2.0 through 3.4.1
SolutionUpgrade to version 3.4.2
DescriptionInadequate checking of the return value allowed to redirect to an extern page.
Affected InstallsJoomla! CMS versions 3.0.0 through 3.4.1
SolutionUpgrade to version 3.4.2
David Dwyer is Managing Director of Inspire Web Development. He has years of experience in a range of web and IT roles plus seven years in sales and marketing in a blue-chip FMCG company. David’s academic and professional qualifications include a BA (Hons) in Business Economics (Personnel & Ergonomics) from the University of Paisley, an MSc in Information Technology (Systems) from Heriot-Watt University and PRINCE2 Practitioner-level certification. He is also an active member of the British Computer Society, Entrepreneurial Exchange and Business for Scotland.
Follow Inspire on Twitter @inspireltd and @developersos |
Blogging, Customer Relationship Management, Cyber Security, Cyber Security Vulnerabilities, Developer SOS, Joomla, Security, Server, Server Security, Software as a Service Application Development, Web Consultancy, Website Support
|