Joomla! News

Joomla redTWITTER Component "view" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA39342

VERIFY ADVISORY:
http://secunia.com/advisories/39342/

DESCRIPTION:
NoGe has discovered a vulnerability in the redTWITTER component for
Joomla, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed to the "view" parameter in index.php (when "option" is
set to "com_redtwitter") is not properly sanitised before being used
to include files. This can be exploited to include arbitrary files
from local resources via directory traversal attacks and URL-encoded
NULL bytes.

The vulnerability is confirmed in version 1.0b11. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
NoGe

ORIGINAL ADVISORY:
http://evilc0de.blogspot.com/2010/04/joomla-component-redtwitter-lfi-vuln.html

Joomla! JP Jobs Component "id" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA39325

VERIFY ADVISORY:
http://secunia.com/advisories/39325/

DESCRIPTION:
Valentin has discovered a vulnerability in the JP Jobs component for
Joomla!, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed via the "id" parameter to index.php (when "option" is
set to "com_jp_jobs" and "view" is set to "detail") is not properly
sanitised before being used in SQL queries. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.

The vulnerability is confirmed in version 1.4.2. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Valentin

ORIGINAL ADVISORY:
http://www.xenuser.org/documents/security/joomla_com_jp_jobs_sql.txt

Joomla DW Graph Component "controller" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA39200

VERIFY ADVISORY:
http://secunia.com/advisories/39200/

DESCRIPTION:
A vulnerability has been reported in the DW Graph component for
Joomla, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed to the "controller" parameter in index.php (when
"option" is set to "com_dwgraphs") is not properly sanitised before
being used to include files. This can be exploited to include
arbitrary files from local resources via directory traversal attacks
and URL-encoded NULL bytes.

The vulnerability is reported in version 1.0. Other versions may also
be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Chip D3 Bi0s

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/11978

Joomla! dcsFlashGames Component "catid" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA39161

VERIFY ADVISORY:
http://secunia.com/advisories/39161/

DESCRIPTION:
A vulnerability has been reported in the dcsFlashGames component for
Joomla!, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed via the "catid" parameter to index.php (when "option" is
set to "com_dcs_flashgames" and "Itemid" is set) is not properly
sanitised before being used in SQL queries. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.

SOLUTION:
Filter malicious characters and character sequences using a proxy.

PROVIDED AND/OR DISCOVERED BY:
kaMtiEz

Joomla J!Research Component "controller" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA39079

VERIFY ADVISORY:
http://secunia.com/advisories/39079/

DESCRIPTION:
A vulnerability has been reported in the J!Research component for
Joomla, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed to the "controller" parameter in index.php (when
"option" is set to "com_jresearch") is not properly sanitised before
being used to include files. This can be exploited to include
arbitrary files from local resources via directory traversal attacks
and URL-encoded NULL bytes.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Chip D3 Bi0s

ORIGINAL ADVISORY:
http://packetstormsecurity.org/1003-exploits/joomlajresearch-lfi.txt

Joomla Real Estate Property Component "controller" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA39074

VERIFY ADVISORY:
http://secunia.com/advisories/39074/

DESCRIPTION:
A vulnerability has been discovered in the Real Estate Property
component for Joomla, which can be exploited by malicious people to
disclose potentially sensitive information.

Input passed to the "controller" parameter in index.php (when
"option" is set to "com_properties") is not properly sanitised before
being used to include files. This can be exploited to include
arbitrary files from local resources via directory traversal attacks
and URL-encoded NULL bytes.

The vulnerability is confirmed in version 3.1.22-03. Other versions
may also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Chip D3 Bi0s

RECENT ARTICLE