Joomla! 2.5.x before 2.5.25, 3.x before 3.2.4, and 3.3.x before 3.3.4 allows remote attackers to authenticate and bypass intended access restrictions via vectors involving LDAP authentication.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://developer.joomla.org/security/594-20140902-core-unauthorised-logins.html | |
http://secunia.com/advisories/61638 | third party advisory |
http://secunia.com/advisories/61606 | third party advisory |