{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Joomla! versions 1.6.x (toutes les versions de cette branche sont affect\u00e9es).","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Joomla! version 1.7.0 ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nDeux vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Joomla!. Un mauvais\nfiltrage des param\u00e8tres dans le composant com_search ainsi que dans le\nbackend permet l'injection de code indirecte \u00e0 distance.\n\n## Solution\n\nMettre Joomla! \u00e0 jour en version 1.7.1.\n","cves":[],"links":[{"title":"Bulletins de s\u00e9curit\u00e9 Joomla! 20110901 et 20110902 du 22    septembre 2011 :","url":"http://developer.joomla.org/security/news/368-20110902-core-xss-vulnerability"},{"title":"Bulletins de s\u00e9curit\u00e9 Joomla! 20110901 et 20110902 du 22    septembre 2011 :","url":"http://developer.joomla.org/security/news/367-20110901-core-xss-vulnerability"}],"reference":"CERTA-2011-AVI-546","revisions":[{"description":"version initiale.","revision_date":"2011-10-04T00:00:00.000000"}],"risks":[{"description":"Injection de code indirecte \u00e0 distance"}],"summary":"Deux vuln\u00e9rabilit\u00e9s dans <span class=\"textit\">Joomla!</span> permettent\nl'injection de code indirecte \u00e0 distance.\n","title":"Vuln\u00e9rabilit\u00e9s dans Joomla!","vendor_advisories":[{"published_at":null,"title":"Bulletins de s\u00e9curit\u00e9 Joomla! 20110901 et 20110902 du 22 septembre 2011","url":null}]}
