Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise restricted actions and subsequently reset the password of the first enabled user (lowest id) which, typically, is the administrator user; this gives attackers complete control over the affected website. Joomla! Core versions 1.5.x ranging from 1.5.0 and up to and including 1.5.5 are vulnerable.
Remediation
Update to Joomla! Core version 1.5.6 or latest
References
https://www.exploit-db.com/exploits/6234/
http://forum.joomla.org/viewtopic.php?f=432&t=404303
https://developer.joomla.org/security-centre/241-20080801-core-password-remind-functionality.html
Related Vulnerabilities
WordPress Configuration Vulnerability (CVE-2009-2335)
WordPress Plugin NextGEN Gallery-WordPress Gallery Local File Inclusion (2.1.56)
WordPress Plugin Google Map Remote Code Execution (1.0)
Drupal Core 4.5.x Security Bypass (4.5.0 - 4.5.7)
WordPress Plugin Tune Library 'letter' Parameter SQL Injection (1.5.1)