logo
 
  1. Webseiten erstellen >
  2. Joomla

EnglishFrenchGermanItalianPortugueseRussianSpanish

Was ist Joomla?

Joomla dient in erster Linie der Erstellung von Webseiten mit veränderlichen, d. h. dynamischen Inhalten, die von mehreren Personen ohne vertiefte Kenntnisse über Webseitenerstellung editiert werden können. Dabei wird innerhalb von Joomla zwischen drei Ebenen streng unterschieden: der funktionellen Struktur, den eigentlichen Seiteninhalten und dem Layout.

Die Einrichtung der funktionellen Struktur, häufig mit dem englischen Begriff management bezeichnet, ist aufwändig und setzt profunde Kenntnisse voraus. Sie liegt daher häufig in den Händen einer entsprechend ausgebildeten Einzelperson, die als Administrator bezeichnet wird. Dieser muss Joomla auf einem Webserver installieren, üblicherweise einem Apache-Webserver, außerdem wird ein MySQL-Datenbank-Server benötigt.

Joomla Webseitenerstellung

Wir bieten Joomla Dienstleistungen an für 30,- Euro.

Joomla Webseite erstellen. Webseitenerstellung Kosten zwischen 500- Euro und 900,- Euro inkl. Schulung über die Grundlagen der Bedienung.

Nehmen Sie Kontakt mit uns über Telefon 0441-2333305 (Mo. - Fr. 9 Uhr - 17 Uhr) in Oldenburg auf, oder per Email an info@php-consulting.com (24/7).

Joomla News

Joomla 3.8.8 Release

joomla 3.8.8

Joomla 3.8.8 is now available. This is a security release which addresses 9 security vulnerabilities, contains over 50 bug fixes, and includes various security related improvements.

Datum: 22.05.2018 | 15:45

Joomla 3.9 and Joomla 3.10

Joomla 3.9

As you most probably know, the General Data Protection Regulation (GDPR) will enter into force on 25 May, 2018.
Joomla, listening to its users, intends to integrate a Privacy Tool Suite in the Joomla CMS to facilitate the compliance of your sites and to make developers’ life easier to get their extensions compliant.

Datum: 8.05.2018 | 11:00

Joomla 3.8.7 Release

Joomla 3.8.7

Joomla 3.8.7 is now available. This is a bug fix release for the 3.x series of Joomla including over 70 bug fixes and improvements.

Datum: 18.04.2018 | 15:45

Joomla 3.8.6 Release

Joomla 3.8.6

Joomla 3.8.6 is now available. This is a security fix release for the 3.x series of Joomla addressing one security vulnerability and including over 60 bug fixes and improvements.

Datum: 13.03.2018 | 14:45

Joomla 3.8.5 Release

Joomla 3.8.5

Joomla 3.8.5 is now available. This is a bug fix release for the 3.x series of Joomla fixing regressions which were reported after the 3.8.4 release.

Datum: 6.02.2018 | 15:45

Joomla 3.8.4 Release

Joomla 3.8.4

Joomla 3.8.4 is now available. This is a security release for the 3.x series of Joomla addressing four security vulnerabilities and including over 100 bug fixes and improvements.

Datum: 30.01.2018 | 15:45

Joomla Year in Review - 2017

joomla 2017

There are many fine achievements to reflect on as we look back on 2017. Most importantly the Joomla Project wants to say a massive "thank you" to all our volunteers. As an open source project, Joomla can only achieve what it does with the valuable contributions of our extensive global community of hard-working volunteers. On behalf of the Joomla Project, Thank You!

Datum: 28.12.2017 | 13:00

Joomla’s Response to Overturning Net Neutrality in the United States

joomla net neutrality

New York - December 15, 2017
The FCC (Federal Communications Commission) vote on Thursday December 14, 2017 to repeal Net Neutrality, while unfortunately expected, is tremendously disappointing to all believers of an open and free internet.
Open Source Matters, Inc. and the Joomla Community believe wholeheartedly in content creation and dissemination. We as a community have been overwhelmingly in favor of retaining Net Neutrality in the United States and worldwide and will seek to make our voices heard in as many ways as possible.

Datum: 15.12.2017 | 13:00

Joomla Security

[20180509] - Core - XSS vulnerability in the media manager

  • Project: Joomla!
  • SubProject: CMS
  • Impact: Low
  • Severity: Low
  • Versions: 1.5.0 through 3.8.7
  • Exploit type: XSS
  • Reported Date: 2017-October-28
  • Fixed Date: 2018-May-22
  • CVE Number: CVE-2018-6378

Description

Inadequate filtering of file and folder names lead to various XSS attack vectors in the media manager.

Affected Installs

Joomla! CMS versions 1.5.0 through 3.8.7

Solution

Upgrade to version 3.8.8

Contact

The JSST at the Joomla! Security Centre.

Reported By: David Jardin, JSST

Datum: 22.05.2018 | 15:30

[20180508] - Core - Possible XSS attack in the redirect method

  • Project: Joomla!
  • SubProject: CMS
  • Impact: Low
  • Severity: Low
  • Versions: 3.1.2 through 3.8.7
  • Exploit type: XSS
  • Reported Date: 2018-March-30
  • Fixed Date: 2018-May-22
  • CVE Number: CVE-2018-11328

Description

Under specific circumstances (a redirect issued with a URI containing a username and password when the Location: header cannot be used), a lack of escaping the user-info component of the URI could result in a XSS vulnerability.

Affected Installs

Joomla! CMS versions 3.1.2 through 3.8.7

Solution

Upgrade to version 3.8.8

Contact

The JSST at the Joomla! Security Centre.

Reported By: David Jardin, JSST

Datum: 22.05.2018 | 15:30

[20180507] - Core - Session deletion race condition

  • Project: Joomla!
  • SubProject: CMS
  • Impact: Medium
  • Severity: Low
  • Versions: 3.0.0 through 3.8.7
  • Exploit type: Session race condition
  • Reported Date: 2017-July-08
  • Fixed Date: 2018-May-22
  • CVE Number: CVE-2018-11324

Description

A long running background process, such as remote checks for core or extension updates, could create a race condition where a session which was expected to be destroyed would be recreated.

Affected Installs

Joomla! CMS versions 3.0.0 through 3.8.7

Solution

Upgrade to version 3.8.8

Additional Resources

  • Links Go Here

Contact

The JSST at the Joomla! Security Centre.

Reported By: David Jardin, JSST

Datum: 22.05.2018 | 15:30

[20180506] - Core - Filter field in com_fields allows remote code execution

  • Project: Joomla!
  • SubProject: CMS
  • Impact: Moderate
  • Severity: Low
  • Versions: 3.7.0 through 3.8.7
  • Exploit type: Remote Code Execution
  • Reported Date: 2018-May-14
  • Fixed Date: 2018-May-22
  • CVE Number: CVE-2018-11321

Description

Inadequate filtering allows users authorised to create custom fields to manipulate the filtering options and inject an unvalidated option.

Affected Installs

Joomla! CMS versions 3.7.0 through 3.8.7

Solution

Upgrade to version 3.8.8

Contact

The JSST at the Joomla! Security Centre.

Reported By: Benjamin Trenkle, JSST

Datum: 22.05.2018 | 15:30

[20180505] - Core - XSS Vulnerabilities & additional hardening

  • Project: Joomla!
  • SubProject: CMS
  • Impact: Moderate
  • Severity: Moderate
  • Versions: 3.0.0 through 3.8.7
  • Exploit type:XSS
  • Reported Date:2018-February-02 & 2018-March-27
  • Fixed Date: 2018-May-22
  • CVE Number: CVE-2018-11326

Description

Inadequate input filtering leads to multiple XSS vulnerabilities. Additionally, the default filtering settings could potentially allow users of the default Administrator user group to perform a XSS attack.

Affected Installs

Joomla! CMS versions 3.0.0 through 3.8.7

Solution

Upgrade to version 3.8.8

Additional Resources

Contact

The JSST at the Joomla! Security Centre.

Reported By: Kai Zhao of 3H Security Team & Zhouyuan Yang (FortiGuard Labs)

Datum: 22.05.2018 | 15:30

[20180504] - Core - Installer leaks plain text password to local user

  • Project: Joomla!
  • SubProject: CMS
  • Impact: Low
  • Severity: Low
  • Versions: 3.0.0 through 3.8.7
  • Exploit type: Information Disclosure
  • Reported Date: 2018-February-09
  • Fixed Date: 2018-May-22
  • CVE Number: CVE-2018-11325

Description

The web install application would autofill password fields after either a form validation error or navigating to a previous install step, and displays the plain text password for the administrator account at the confirmation screen.

Affected Installs

Joomla! CMS versions 3.0.0 through 3.8.7

Solution

Upgrade to version 3.8.8

Contact

The JSST at the Joomla! Security Centre.

Reported By: Sascha Egerer

Datum: 22.05.2018 | 15:30

[20180503] - Core - Information Disclosure about unpublished tags

  • Project: Joomla!
  • SubProject: CMS
  • Impact: Low
  • Severity: Moderate
  • Versions: 3.1.0 through 3.8.7
  • Exploit type: Information Disclosure
  • Reported Date: 2018-April-27
  • Fixed Date: 2018-May-22
  • CVE Number: CVE-2018-11327

Description

Inadequate checks allowed users to see the names of tags that were either unpublished or published with restricted view permission .

Affected Installs

Joomla! CMS versions 3.1.0 through 3.8.7

Solution

Upgrade to version 3.8.8

Contact

The JSST at the Joomla! Security Centre.

Reported By: Phil Taylor, JSST

Datum: 22.05.2018 | 15:30

[20180502] - Core - Add PHAR files to the upload blacklist

  • Project: Joomla!
  • SubProject: CMS
  • Impact: High
  • Severity: Low
  • Versions: 2.5.0 through 3.8.7
  • Exploit type: Malicious file upload
  • Reported Date: 2018-March-14
  • Fixed Date: 2018-May-22
  • CVE Number: CVE-2018-11322

Description

Depending on the server configuration, PHAR files might be handled as executable PHP scripts by the webserver.

Affected Installs

Joomla! CMS versions 2.5.0 through 3.8.7

Solution

Upgrade to version 3.8.8

Contact

The JSST at the Joomla! Security Centre.

Reported By: Demis Palma, JSST

Datum: 22.05.2018 | 15:30

[20180501] - Core - ACL violation in access levels

  • Project: Joomla!
  • SubProject: CMS
  • Impact: High
  • Severity: Low
  • Versions: 2.5.0 through 3.8.7
  • Exploit type: ACL violation
  • Reported Date: 2018-March-08
  • Fixed Date: 2018-May-22
  • CVE Number: CVE-2018-11323

Description

Inadequate checks allowed users to modify the access levels of user groups with higher permissions.

Affected Installs

Joomla! CMS versions 2.5.0 through 3.8.7

Solution

Upgrade to version 3.8.8

Contact

The JSST at the Joomla! Security Centre.

Reported By: Matias Aguirre, JSST

Datum: 22.05.2018 | 15:30

[20180301] - Core - SQLi vulnerability User Notes

  • Project: Joomla!
  • SubProject: CMS
  • Impact: High
  • Severity: Low
  • Versions: 3.5.0 through 3.8.5
  • Exploit type: SQLi
  • Reported Date: 2018-March-08
  • Fixed Date: 2018-March-12
  • CVE Number: CVE-2018-8045

Description

The lack of type casting of a variable in SQL statement leads to a SQL injection vulnerability in the User Notes list view

Affected Installs

Joomla! CMS versions 3.5.0 through 3.8.5

Solution

Upgrade to version 3.8.6

Contact

The JSST at the Joomla! Security Centre.

Reported By: Entropy Moe

Datum: 13.03.2018 | 14:45