Joomla! News

Joomla GAnalytics Component "controller" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA38953

VERIFY ADVISORY:
http://secunia.com/advisories/38953/

DESCRIPTION:
A vulnerability has been discovered in the GAnalytics component for
Joomla, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed to the "controller" parameter in index.php (when
"option" is set to "com_ganalytics") is not properly sanitised before
being used to include files. This can be exploited to include
arbitrary files from local resources via directory traversal attacks
and URL-encoded NULL bytes.

The vulnerability is confirmed in version 0.6.1. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
AtT4CKxT3rR0r1ST

Joomla JA News Component "controller" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA38952

VERIFY ADVISORY:
http://secunia.com/advisories/38952/

DESCRIPTION:
A vulnerability has been reported in the JA News component for
Joomla, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed to the "controller" parameter in index.php (when
"option" is set to "com_janews") is not properly sanitised before
being used to include files. This can be exploited to include
arbitrary files from local resources via directory traversal attacks
and URL-encoded NULL bytes.

The vulnerability is reported in version 1.0. Other versions may also
be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
AtT4CKxT3rR0r1ST

Joomla JuliaPortfolio Component "controller" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA38959

VERIFY ADVISORY:
http://secunia.com/advisories/38959/

DESCRIPTION:
A vulnerability has been reported in the JuliaPortfolio component for
Joomla, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed to the "controller" parameter in index.php (when
"option" is set to "com_juliaportfolio") is not properly sanitised
before being used to include files. This can be exploited to include
arbitrary files from local resources via directory traversal attacks
and URL-encoded NULL bytes.

The vulnerability is reported in version 1.3.3. Other versions may
also be affected.

SOLUTION:
Update to version 2.1 or later.

PROVIDED AND/OR DISCOVERED BY:
DevilZ TM

Joomla Ulti RPX Component "controller" Local File Inclusion

SECUNIA ADVISORY ID:
SA38934

VERIFY ADVISORY:
http://secunia.com/advisories/38934/

DESCRIPTION:
A vulnerability has been discovered in the Ulti RPX component for
Joomla, which can be exploited by malicious people to disclose
sensitive information.

Input passed via the "controller" parameter to index.php (when
"option" is set to "com_rpx") is not properly verified before being
used to include files. This can be exploited to include arbitrary
files from local resources via directory traversal attacks.

The vulnerability is confirmed in version 2.1.0. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
jdc

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/11743

Joomla GCalendar Component "controller" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA38925

VERIFY ADVISORY:
http://secunia.com/advisories/38925/

DESCRIPTION:
A vulnerability has been discovered in the GCalendar component for
Joomla, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed to the "controller" parameter in index.php (when
"option" is set to "com_gcalendar") is not properly sanitised before
being used to include files. This can be exploited to include
arbitrary files from local resources via directory traversal attacks
and URL-encoded NULL bytes.

The vulnerability is confirmed in version 2.1.5. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
jdc

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/11738

Joomla Ninja RSS Syndicator File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA38914

VERIFY ADVISORY:
http://secunia.com/advisories/38914/

DESCRIPTION:
A vulnerability has been discovered in the Ninja RSS Syndicator
component for Joomla, which can be exploited by malicious people to
disclose potentially sensitive information.

Input passed to the "controller" parameter in
components/com_ninjarsssyndicator/ninjarsssyndicator.php is not
properly verified before being used to include files. This can be
exploited to include local files via directory traversal attacks.

The vulnerability is confirmed in version 1.0.8. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
jdc

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/11740

RECENT ARTICLE