DESCRIPTION:
Jennifer Bornholt has discovered two vulnerabilities in the Jomres
component for Joomla!, which can be exploited by malicious users to
conduct script insertion and SQL injection attacks.
1) Input passed via the "property_name" POST parameter when editing
property details is not properly sanitised before being used. This
can be exploited to insert arbitrary HTML and script code, which will
be executed in a user's browser session in the context of an affected
site if malicious data is viewed.
2) Input passed via the "id" GET parameter to administrator/index.php
(when "option" is set to "com_jomres" and "task" is set to
"editProfile") is not properly sanitised before being used in a SQL
query. This can be exploited to manipulate SQL queries by injecting
arbitrary SQL code.
Successful exploitation of the vulnerabilities requires "Business
Manager" permissions.
The vulnerabilities are confirmed in version 7.3.0. Other versions
may also be affected.
SOLUTION:
Update to version 7.3.1.
PROVIDED AND/OR DISCOVERED BY:
Jennifer Bornholt via Secunia
DESCRIPTION:
Emilio Pinna has reported a vulnerability in Joomla!, which can be
exploited by malicious people to conduct cross-site scripting
attacks.
Input passed via the "lang" GET parameter to
/libraries/idna_convert/example.php is not properly sanitised before
being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context
of an affected site.
The vulnerability is reported in version 3.1.5. Other versions may
also be affected.
SOLUTION:
Fixed in the git repository.
PROVIDED AND/OR DISCOVERED BY:
Emilio Pinna
ORIGINAL ADVISORY:
Joomla!:
https://github.com/joomla/joomla-cms/issues/1658
Emilio Pinna:
http://disse.cting.org/2013/08/05/joomla-core-3_1_5_reflected-xss-vulnerability/
DESCRIPTION:
A vulnerability has been discovered in Joomla!, which can be
exploited by malicious users to compromise a vulnerable system.
The vulnerability is caused due to the
administrator/components/com_media/helpers/media.php script
improperly validating the extension of an uploaded file. This can be
exploited to e.g. execute arbitrary PHP code by uploading a PHP file
using a ".php." extension.
Successful exploitation requires permissions to upload files and that
the web server is configured to handle ".php." extensions as PHP
scripts.
The vulnerability is confirmed in version 3.1.4 and reported in
versions prior to 2.5.14 and 3.1.5.
SOLUTION:
Update to version 2.5.14 or 3.1.5.
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Jens Hinrichsen.
ORIGINAL ADVISORY:
http://www.joomla.org/announcements/release-news/5506-joomla-2-5-14-released.htmlhttp://www.joomla.org/announcements/release-news/5505-joomla-3-1-5-stable-released.htmlhttp://developer.joomla.org/security/news/563-20130801-core-unauthorised-uploads