Joomla vulnerability 1.5.x versions and possible solutions

The 12th of August 2008 the Official Support to the well-known Cms Joomla has announced the discovery of a security hole which is on all the versions 1.5.x. Such vulnerability allows an ill-intentioned to edit the Password of the Administrator account using the functionality of password restoration provided by the "com_user" component. 

OFFICIAL NOTICE (ENGLISH Version) 

OFFICIAL NOTICE (ITALIAN Version) 

If used, such vulnerability allows to access as Administrators to the Admin Panel of Joomla and, with this panel allows editing pages (defacing), reading the file contents, and modifying the details of the Database, etc. Particularly, once made such modification to the password, you can check the content of the "configuration.php" file and, consequently, take hold of the Ftp and MySQL details which are clearly reported in the same file.

There are two scheduled methods to fix the problem of such vulnerability.

1. The first, warmly advised by Aruba, consists of updating and maintaining constantly updated the application version which, in the meantime, is arrived to 1.5.7 version, because new vulnerabilities have been discovered. 

Following the links to download the updated version:

Official English packet

Official Italian packet 

2. The second method to fix the problem consists in manually editing the file of the “com_user" component which results to have the problem. 
 

In order to do it you need to open the file in editing: 

/components/com_user/models/reset.php 

and add the following code on the 113 line. In case the numbers of line do not match, the following code should be entered exactly after the "global $mainframe;" line

if(strlen($token) != 32) { 

$this->setError(JText::_('INVALID_TOKEN')); 

                return false;}

In case this type of hacking is registered immediately, the "defacing" can result still present after the updating or the manual correction.
In order to solve this type of problem we invite you to remove all the used templates and, then to make a new upload of the same.

Attention: in addition to the application update we strongly suggest you to provide with the change of the password of your MySql database and of the login to manage the domain.