DESCRIPTION:
A vulnerability has been reported in the DJ-Classifieds component for
Joomla!, which can be exploited by malicious people to conduct SQL
injection attacks.
Input passed via the "se_regs[]" GET parameter to index.php (when
"limitstart" is set to "0" and "se" is set to "1") is not properly
sanitised before being used in a SQL query. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.
The vulnerability is reported in version 2.3.2. Other versions may
also be affected.
SOLUTION:
No official solution is currently available.
PROVIDED AND/OR DISCOVERED BY:
Napsterakos
ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/25248
DESCRIPTION:
A vulnerability has been reported in the ALFContact component for
Joomla!, which can be exploited by malicious people to conduct
cross-site scripting attacks.
Certain unspecified input is not properly sanitised before being
returned to the user. This can be exploited to execute arbitrary HTML
and script code in a user's browser session in context of an affected
site.
The vulnerability is reported in version 3.1.3. Other versions may
also be affected.
SOLUTION:
No official solution is currently available.
PROVIDED AND/OR DISCOVERED BY:
Reported via the Joomla! Vulnerable Extensions List.
ORIGINAL ADVISORY:
Joomla! VEL:
http://docs.joomla.org/Vulnerable_Extensions_List#alfcontact