Joomla! News

Joomla JoomMail Component "controller" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA39417

VERIFY ADVISORY:
http://secunia.com/advisories/39417/

DESCRIPTION:
A vulnerability has been discovered in the JoomMail component for
Joomla, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed to the "controller" parameter in index.php (when
"option" is set to "com_joommail") is not properly verified before
being used to include files. This can be exploited to include
arbitrary files from local resources via directory traversal attacks
and URL-encoded NULL bytes.

The vulnerability is confirmed in version 1.0. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
AntiSecurity

Joomla Digital Diary Component "controller" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA39416

VERIFY ADVISORY:
http://secunia.com/advisories/39416/

DESCRIPTION:
A vulnerability has been discovered in the Digital Diary component
for Joomla, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed to the "controller" parameter in index.php (when
"option" is set to "com_diary") is not properly verified before being
used to include files. This can be exploited to include arbitrary
files from local resources via directory traversal attacks and
URL-encoded NULL bytes.

The vulnerability is confirmed in version 1.5.0. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
AntiSecurity

Joomla My Files Component "controller" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA39415

VERIFY ADVISORY:
http://secunia.com/advisories/39415/

DESCRIPTION:
A vulnerability has been discovered in the My Files component for
Joomla, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed to the "controller" parameter in index.php (when
"option" is set to "com_myfiles") is not properly verified before
being used to include files. This can be exploited to include
arbitrary files from local resources via directory traversal attacks
and URL-encoded NULL bytes.

The vulnerability is confirmed in version 1.0. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
AntiSecurity

Joomla Online Exam Component "controller" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA39414

VERIFY ADVISORY:
http://secunia.com/advisories/39414/

DESCRIPTION:
A vulnerability has been discovered in the Online Exam component for
Joomla, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed to the "controller" parameter in index.php (when
"option" is set to "com_onlineexam") is not properly verified before
being used to include files. This can be exploited to include
arbitrary files from local resources via directory traversal attacks
and URL-encoded NULL bytes.

The vulnerability is confirmed in version 1.5.0. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
AntiSecurity

Joomla! SermonSpeaker Component "id" SQL Injection Vulnerabilities

SECUNIA ADVISORY ID:
SA39385

VERIFY ADVISORY:
http://secunia.com/advisories/39385/

DESCRIPTION:
Some vulnerabilities have been reported in the SermonSpeaker
component for Joomla!, which can be exploited by malicious people to
conduct SQL injection attacks.

Input passed via the "id" parameter to index.php (when "option" is
set to "com_sermonspeaker" and "task" is set to e.g. "latest_sermons"
or "speakerpopup") is not properly sanitised before being used in SQL
queries. This can be exploited to manipulate SQL queries by injecting
arbitrary SQL code.

NOTE: Other parameters may also be affected.

The vulnerabilities are reported in versions prior to 3.2.1.

SOLUTION:
Update to version 3.2.1.

PROVIDED AND/OR DISCOVERED BY:
The vendor credits Samara Hart.

ORIGINAL ADVISORY:
http://joomlacode.org/gf/project/sermon_speaker/news/?action=NewsThreadView&id=2549

Joomla! Jvehicles Component "aid" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA39401

VERIFY ADVISORY:
http://secunia.com/advisories/39401/

DESCRIPTION:
Don Tukulesto has discovered a vulnerability in the Jvehicles
component for Joomla!, which can be exploited by malicious people to
conduct SQL injection attacks.

Input passed via the "aid" parameter to index.php (when "option" is
set to "com_jvehicles" and "task" is set to "agentlisting") is not
properly sanitised before being used in SQL queries. This can be
exploited to manipulate SQL queries by injecting arbitrary SQL code.

The vulnerability is confirmed in version 2.1111. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Don Tukulesto

ORIGINAL ADVISORY:
http://www.indonesiancoder.org/joomla-component-jvehicles-aid-sql-injection-vulnerability

RECENT ARTICLE