Joomla! News

Joomla S5 Clan Roster Component Two File Inclusion Vulnerabilities

SECUNIA ADVISORY ID:
SA39468

VERIFY ADVISORY:
http://secunia.com/advisories/39468/

DESCRIPTION:
Two vulnerabilities have been reported in the S5 Clan Roster
component for Joomla, which can be exploited by malicious people to
disclose potentially sensitive information.

Input passed to the "controller" and "view" parameters in index.php
(when "option" is set to "com_s5clanroster") is not properly verified
before being used to include files. This can be exploited to include
arbitrary files from local resources via directory traversal attacks
and URL-encoded NULL bytes.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
AntiSecurity

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/12231

Joomla MT Fire Eagle Component "controller" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA39470

VERIFY ADVISORY:
http://secunia.com/advisories/39470/

DESCRIPTION:
A vulnerability has been discovered in the MT Fire Eagle component
for Joomla, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed to the "controller" parameter in index.php (when
"option" is set to "com_mtfireeagle") is not properly verified before
being used to include files. This can be exploited to include
arbitrary files from local resources via directory traversal attacks
and URL-encoded NULL bytes.

The vulnerability is confirmed in version 1.2. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
AntiSecurity

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/12233

Joomla wgPicasa Component "controller" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA39467

VERIFY ADVISORY:
http://secunia.com/advisories/39467/

DESCRIPTION:
A vulnerability has been discovered in the wgPicasa component for
Joomla, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed to the "controller" parameter in index.php (when
"option" is set to "com_wgpicasa") is not properly verified before
being used to include files. This can be exploited to include
arbitrary files from local resources via directory traversal attacks
and URL-encoded NULL bytes.

The vulnerability is confirmed in version 1.0.5. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
AntiSecurity

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/12230

Joomla JA JobBoard Component Two File Inclusion Vulnerabilities

SECUNIA ADVISORY ID:
SA39219

VERIFY ADVISORY:
http://secunia.com/advisories/39219/

DESCRIPTION:
Two vulnerabilities have been reported in the JA JobBoard component
for Joomla, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed to the "controller" and "view" parameters in index.php
(when "option" is set to "com_jajobboard") is not properly verified
before being used to include files. This can be exploited to include
arbitrary files from local resources via directory traversal attacks
and URL-encoded NULL bytes.

The vulnerabilities are reported in version 1.4.4. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
AntiSecurity

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/12144

Joomla Memory Book Component "controller" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA39408

VERIFY ADVISORY:
http://secunia.com/advisories/39408/

DESCRIPTION:
A vulnerability has been discovered in the Memory Book component for
Joomla, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed to the "controller" parameter in index.php (when
"option" is set to "com_memory") is not properly verified before
being used to include files. This can be exploited to include
arbitrary files from local resources via directory traversal attacks
and URL-encoded NULL bytes.

The vulnerability is confirmed in version 1.5.0. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
AntiSecurity

Joomla Daily Horoscope Component "controller" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA39406

VERIFY ADVISORY:
http://secunia.com/advisories/39406/

DESCRIPTION:
A vulnerability has been discovered in the Daily Horoscope component
for Joomla, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed to the "controller" parameter in index.php (when
"option" is set to "com_horoscope") is not properly verified before
being used to include files. This can be exploited to include
arbitrary files from local resources via directory traversal attacks
and URL-encoded NULL bytes.

The vulnerability is confirmed in version 1.5.0. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
AntiSecurity

RECENT ARTICLE