Joomla! News

Joomla! / Mambo BlastChat Client Component "Itemid" Cross-Site Scripting Vulnerability

SECUNIA ADVISORY ID:
SA41129

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/41129/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=41129

RELEASE DATE:
2010-08-28
DESCRIPTION:
Aung Khant has reported a vulnerability in the BlastChat Client
component for Joomla! / Mambo, which can be exploited by malicious
people to conduct cross-site scripting attacks.

Input passed via the "Itemid" parameter to index.php (when "option"
is set to "com_blastchatc") is not properly sanitised before being
returned to the user. This can be exploited to execute arbitrary HTML
and script code in a user's browser session in context of an affected
site.

The vulnerability is reported in versions prior to 3.4.

SOLUTION:
Update to version 3.4.

PROVIDED AND/OR DISCOVERED BY:
Aung Khant, YGN Ethical Hacker Group.

ORIGINAL ADVISORY:
Aung Khant:
http://yehg.net/lab/pr0js/advisories/joomla/%5Bcom_blastchatc%5D_cross_site_scripting


Joomla! / Mambo Remository Component Arbitrary File Upload Vulnerability

SECUNIA ADVISORY ID:
SA41161

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/41161/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=41161

RELEASE DATE:
2010-08-27
DESCRIPTION:
A vulnerability has been discovered in the Remository component for
Joomla! / Mambo, which can be exploited by malicious users to
compromise a vulnerable system.

The vulnerability is caused due to an error in application when
uploading thumbnails, which allows uploading of files with arbitrary
extensions to a folder inside the webroot. This can be exploited to
e.g. execute arbitrary PHP code by uploading a PHP file.

NOTE: The stored file name is based on the original file name and a
time stamp, which is predictable.

The vulnerability is confirmed in version 3.53.5J on Joomla!. Other
versions may also be affected.

SOLUTION:
Restrict access to the "components/com_remository_files" directory
(e.g. via .htaccess).

PROVIDED AND/OR DISCOVERED BY:
J3yk0ob

Joomla! Zoom Portfolio Component "id" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA41047

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/41047/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=41047

RELEASE DATE:
2010-08-24
DESCRIPTION:
A vulnerability has been reported in the Zoom Portfolio component for
Joomla!, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed via the "id" parameter to index.php (when "option" is
set to "com_zoomportfolio" and "view" is set to "portfolio") is not
properly sanitised before being used in SQL queries. This can be
exploited to manipulate SQL queries by injecting arbitrary SQL code.

The vulnerability is reported in version 1.5. Other versions may also
be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Chip D3 Bi0s


Joomla 1.6 เบต้า 8 ออกแล้ว

1.6 Beta LogoJoomla! ได้ประกาศเวอร์ชันใหม่ออกมาแล้ว คือ Joomla 1.6 เบต้า 8 (ดาวน์โหลดที่นี่) หมายเหตุ: รุ่นเบต้านี้ยังไม่สามารถทำงานได้กับส่วนเสริมอื่นๆ ไม่แนะนำให้ใช้ทำเว็บไซต์จริง ซึ่งออกมาเพื่อที่จะใช้สำหรับการทดลอง และประเมินผลเท่านั้น

ตั้งแต่ Joomla 1.6 beta 7 ถูกปล่อยออกมาเมื่อวันที่ 9 สิงหาคม ทางทีมได้ทำการแก้ไขไปแล้ว 90 ปัญหาจากที่ได้มีการรายงานเข้ามา ดังนั้นความก้าวหน้าในรุ่นนี้ จะเกี่ยวข้องกับการแก้ไขให้ทำงานได้ดียิ่งขึ้นจากความพยายามของทีม Joomla! Bug Squad ดังนั้นเราขอบคุณสำหรับการทำงานหนักของทีม ซึ่งทำให้การทำงานของระบบมั่นคงขึ้น!

คุณสามารถดูรายละเอียดของการเปลี่ยนแปลงในรุ่นนี้จากในไฟล์ CHANGELOG.php

ถัดจากนี้ไป จะมีอะไร?

Read more ...

Joomla! JPodium Component Cross-Site Request Forgery Vulnerability

SECUNIA ADVISORY ID:
SA41059

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/41059/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=41059

RELEASE DATE:
2010-08-23
DESCRIPTION:
A vulnerability has been reported in the JPodium component for
Joomla!, which can be exploited by malicious people to conduct
cross-site request forgery attacks.

The application allows users to perform certain actions via HTTP
requests without performing any validity checks to verify the
requests. This can be exploited to e.g. delete races or delete
athletes by tricking a logged in administrative user into visiting a
malicious web site.

The vulnerability is reported in versions prior to 0.9.016.

SOLUTION:
Update to version 0.9.016.

PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.

ORIGINAL ADVISORY:
http://www.jpodium.de/index.php/learn-more/revision-history


Joomla JGrid Component File Inclusion and SQL Injection Vulnerabilities

SECUNIA ADVISORY ID:
SA40987

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/40987/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=40987

RELEASE DATE:
2010-08-19
DESCRIPTION:
Two vulnerabilities have been reported in the JGrid component for
Joomla, which can be exploited by malicious people to disclose
potentially sensitive information and conduct SQL injection attacks.

1) Input passed to the "controller" parameter in index.php (when
"option" is set to "com_jgrid") is not properly verified before being
used to include files. This can be exploited to include arbitrary
files from local resources via directory traversal attacks and
URL-encoded NULL bytes.

2) Input passed via unspecified parameters is not properly sanitised
before being used in a SQL query. This can be exploited to manipulate
SQL queries by injecting arbitrary SQL code.

The vulnerabilities are reported in version 1.0. Other versions may
also be affected.

SOLUTION:
Update to version 1.1.

PROVIDED AND/OR DISCOVERED BY:
1) Salvatore Fresta aka Drosophila.
2) Reported by the vendor.

ORIGINAL ADVISORY:
Salvatore Fresta:
http://www.salvatorefresta.net/?opt=newsid&id=44

JGrid:
http://www.datagrids.clubsareus.org/index.php?view=article&catid=1:latest-news&id=45:jgrid-joomla-component-now-available


RECENT ARTICLE