Joomla! News

Joomla! Freestyle Testimonials Component SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA51101

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/51101/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=51101

RELEASE DATE:
2012-10-26
DESCRIPTION:
A vulnerability has been reported in the Freestyle Testimonials
component for Joomla!, which can be exploited by malicious people to
conduct SQL injection attacks.

Certain input is not properly sanitised before being used in a SQL
query. This can be exploited to manipulate SQL queries by injecting
arbitrary SQL code.

This is related to:
SA51068

The vulnerability is reported in versions prior to 1.9.2.1484.

SOLUTION:
Update to version 1.9.2.1484.

PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.

ORIGINAL ADVISORY:
http://freestyle-joomla.com/help/announcements?announceid=60

Joomla! Commedia Component "id" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA51076

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/51076/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=51076

RELEASE DATE:
2012-10-24
DESCRIPTION:
A vulnerability has been reported in the Commedia component for
Joomla!, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed via the "id" parameter to index.php (when "option" is
set to "com_commedia" and "task" is set to"down") is not properly
sanitised before being used in a SQL query. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.

The vulnerability is reported in version 3.1. Other versions may also
be affected.

SOLUTION:
No official solution is currently available.

PROVIDED AND/OR DISCOVERED BY:
Daniel Barragan "D4NB4R"

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/22152/

Joomla! Freestyle Support Component "prodid" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA51068

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/51068/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=51068

RELEASE DATE:
2012-10-22

DESCRIPTION:
A vulnerability has been reported in the Freestyle Support component
for Joomla!, which can be exploited by malicious people to conduct
SQL injections attacks.

Input passed via the "prodid" GET parameter to index.php (when
"option" is set to "com_fss" and "view" is set to "test") is not
properly sanitised before being used in a SQL query. This can be
exploited to manipulate SQL queries by injecting arbitrary SQL code.

The vulnerability is reported in version 1.9.1.1400. Other versions
may also be affected.

SOLUTION:
No official solution is currently available.

PROVIDED AND/OR DISCOVERED BY:
Daniel Barragan (D4NB4R)

Joomla! Language Search Cross-Site Scripting Vulnerability

SECUNIA ADVISORY ID:
SA50879

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/50879/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=50879

RELEASE DATE:
2012-10-10
DESCRIPTION:
A vulnerability has been reported in Joomla!, which can be exploited
by malicious people to conduct cross-site scripting attacks.

Certain unspecified input passed to the language search component is
not properly sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's
browser session in context of an affected site.

The vulnerability is reported in versions prior to 3.0.1.

SOLUTION:
Update to version 3.0.1.

PROVIDED AND/OR DISCOVERED BY:
The vendor credits Jeff Channell

ORIGINAL ADVISORY:
http://www.joomla.org/announcements/release-news/5468-joomla-3-0-1-released.html
http://developer.joomla.org/security/news/541-20121001-core-xss-vulnerability

Joomla! AceFTP Component Unspecified Vulnerability

SECUNIA ADVISORY ID:
SA50822

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/50822/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=50822

RELEASE DATE:
2012-10-10
DESCRIPTION:
A vulnerability with an unknown impact has been reported in the
AceFTP component for Joomla!.

The vulnerability is caused due to an unspecified error. No further
information is currently available.

The vulnerability is reported in version 1.0.2. Other versions may
also be affected.

SOLUTION:
No official solution is currently available.

PROVIDED AND/OR DISCOVERED BY:
Reported by the Joomla! VEL team

ORIGINAL ADVISORY:
Joomla! Vulnerable Extensions List:
http://docs.joomla.org/Vulnerable_Extensions_List#ACEFTP

Joomla! 3.0.1 ออกแล้ว

จูมล่า 3.0.1ทีม Joomla! Project ได้ปล่อย Joomla! 3.0.1 ออกมาให้ได้ดาวน์โหลดกันอีกครั้งแล้ว รุ่นนี้ โดยรุ่นนี้แก้ไขปัญหาเรื่องความปลอดภัยครับ รุ่นนี้ได้ทำการแก้ไขปัญหาที่มีความสำคัญสูงหนึ่งจุด และปัญหาในส่วนอื่นๆ ที่มีในรุ่น 3.0.0 ครับ

Read more ...

RECENT ARTICLE