Joomla! News

Joomla! Aardvertiser Component "cat_name" SQL Injection

SECUNIA ADVISORY ID:
SA41293

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/41293/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=41293

RELEASE DATE:
2010-09-07
DESCRIPTION:
A vulnerability has been discovered in the Aardvertiser component for
Joomla!, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed via "cat_name" to index.php (when "option" is set to
"com_aardvertiser" and "task" is set to "view") is not properly
sanitised before being used in SQL queries. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.

Successful exploitation requires that "magic_quotes_gpc" is
disabled.

The vulnerability is confirmed in version 2.1.1. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Stephan Sattler

Joomla 1.6 เบต้า 9 ออกแล้ว

1.6 Beta LogoJoomla! ได้ประกาศเวอร์ชันใหม่ออกมาแล้ว คือ Joomla 1.6 เบต้า 9 (ดาวน์โหลดที่นี่) หมายเหตุ: รุ่นเบต้านี้ยังไม่สามารถทำงานได้กับส่วนเสริมอื่นๆ ไม่แนะนำให้ใช้ทำเว็บไซต์จริง ซึ่งออกมาเพื่อที่จะใช้สำหรับการทดลอง และประเมินผลเท่านั้น

ตั้งแต่ Joomla 1.6 beta 8 ถูกปล่อยออกมาเมื่อวันที่ 23 สิงหาคม ทางทีมได้ทำการแก้ไขไปแล้ว 69 ปัญหาจากที่ได้มีการรายงานเข้ามา ดังนั้นความก้าวหน้าในรุ่นนี้ จะเกี่ยวข้องกับการแก้ไขให้ทำงานได้ดียิ่งขึ้นจากความพยายามของทีม Joomla! Bug Squad ดังนั้นเราขอบคุณสำหรับการทำงานหนักของทีม ซึ่งทำให้การทำงานของระบบมั่นคงขึ้น!

คุณสามารถดูรายละเอียดของการเปลี่ยนแปลงในรุ่นนี้จากในไฟล์ CHANGELOG.php

ถัดจากนี้ไป จะมีอะไร?

Read more ...

Joomla! Gantry Component "moduleid" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA41300

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/41300/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=41300

RELEASE DATE:
2010-09-07
DESCRIPTION:
A vulnerability has been discovered in the Gantry component for
Joomla!, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed via the "moduleid" parameter to index.php (when "option"
is set to "com_gantry", "tmpl" is set to "gantry-ajax", and "model" is
set to "module") is not properly sanitised before being used in SQL
queries. This can be exploited to manipulate SQL queries by injecting
arbitrary SQL code.

The vulnerability is confirmed in version 3.0.10. Other versions may
also be affected.

SOLUTION:
Update to version 3.0.11.

PROVIDED AND/OR DISCOVERED BY:
jdc

ORIGINAL ADVISORY:
Gantry:
http://www.gantry-framework.org/news/70-joomla-version-3011-released

Joomla! Clantools Component "squad" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA41310

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/41310/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=41310

RELEASE DATE:
2010-09-07
DESCRIPTION:
A vulnerability has been discovered in the Clantools component for
Joomla!, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed via the "squad" parameter to index.php (when "option" is
set to "com_clantools") is not properly sanitised before being used in
SQL queries. This can be exploited by to manipulate SQL queries by
injecting arbitrary SQL code.

The vulnerability is confirmed in version 1.5. Other versions may
also be affected.

SOLUTION:
Apply patch.

PROVIDED AND/OR DISCOVERED BY:
Stephan Sattler // Solidmedia

ORIGINAL ADVISORY:
Clantools:
http://joomla-clantools.de/downloads/doc_details/30-security-fix-v15.html


Joomla! Clantools Component Two SQL Injection Vulnerabilities

SECUNIA ADVISORY ID:
SA41322

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/41322/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=41322

RELEASE DATE:
2010-09-06
DESCRIPTION:
Two vulnerabilities have been discovered in the Clantools component
for Joomla!, which can be exploited by malicious people to conduct
SQL injection attacks.

1) Input passed via the "squad" parameter in index.php (when "option"
is set to "com_clantools") is not properly sanitised before being used
in SQL queries. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.

2) Input passed via the "showgame" parameter to index.php (when
"option" is set to "com_clantools" and "task" is set to "clanwar") is
not properly sanitised before being used in SQL queries. This can be
exploited to manipulate SQL queries by injecting arbitrary SQL code.

The vulnerabilities are confirmed in version 1.2.3. Other versions
may also be affected.

SOLUTION:
Update to version 1.2.4.

PROVIDED AND/OR DISCOVERED BY:
Stephan Sattler // Solidmedia

ORIGINAL ADVISORY:
Clantools:
http://joomla-clantools.de/downloads/doc_details/29-update-auf-124.html


Joomla! PicSell Component "dflink" File Disclosure Vulnerability

SECUNIA ADVISORY ID:
SA41187

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/41187/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=41187

RELEASE DATE:
2010-09-01
DESCRIPTION:
A vulnerability has been reported in the PicSell component for
Joomla!, which can be exploited by malicious people to disclose
sensitive information.

Input passed via the "dflink" parameter to index.php (when "option"
is set to "com_picsell", "controller" is set to "prevsell", and
"task" is set to "dwnfree") is not properly verified before being
used to read files. This can be exploited to download arbitrary files
from local resources via directory traversal sequences.

The vulnerability is reported in version 1.0. Other versions may also
be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
Craw


RECENT ARTICLE