Joomla! News

Joomla MyBlog Component "task" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA38777

VERIFY ADVISORY:
http://secunia.com/advisories/38777/

DESCRIPTION:
A vulnerability has been reported in the MyBlog component for Joomla,
which can be exploited by malicious people to disclose potentially
sensitive information.

Input passed to the "task" parameter in index.php (when "option" is
set to "com_myblog") is not properly sanitised before being used to
include files. This can be exploited to include arbitrary files from
local resources via directory traversal attacks and URL-encoded NULL
bytes.

The vulnerability is reported in version 3.0.329. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
DevilZ TM

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/11625

Joomla YaNC Component "listid" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA38780

VERIFY ADVISORY:
http://secunia.com/advisories/38780/

DESCRIPTION:
A vulnerability has been reported in the YaNC component for Joomla,
which can be exploited by malicious people to conduct SQL injection
attacks.

Input passed via the "listid" parameter to index.php (when "option"
is set to "com_yanc") is not properly sanitised before being used in
a SQL query. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
His0k4

ORIGINAL ADVISORY:
http://packetstormsecurity.org/0806-exploits/joomlayanc-sql.txt

Joomla HD FLV Player Component "id" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA38691

VERIFY ADVISORY:
http://secunia.com/advisories/38691/

DESCRIPTION:
A vulnerability has been discovered in the HD FLV Player component
for Joomla, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed via the "id" parameter to index.php (when "option" is
set to "com_hdflvplayer") is not properly sanitised before being used
in a SQL query. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.

The vulnerability is confirmed in version 1.3. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
kaMtiEz

JUG ครั้งที่ 7 On Tour เชียงใหม่ 28 ก.พ. บ่าย 3

Joomla User Groupขอเชิญเพื่อนๆ สมาชิก Joomla! User Group หรือผู้สนใจ พบปะพูดคุยกัน แบบกันเอง สบายๆ เกี่ยวกับ Joomla! ในวันที่ 28 กุมภาพันธ์ 2553 ที่ร้านแมคโดนัลด์ สาขาหน้าประตูท่าแพ ชั้น 2? (ขอบคุณ @AjBomb ประสานงานเรื่องสถานที่ครับ)? นอกจากจะมีคุณอัครวุฒิ ตำราเรียง หัวหน้าทีมลายไทย ซึ่งเพิ่งได้รับเลือกให้เป็นกรรมการของ Opensource Matters วาระ 2 ปี มาหมาดๆ ยังมีคุณศิระ ( @Hunt ผู้เชี่ยวชาญเรื่อง Drupal) ไปร่วมด้วย งานเดียวได้เจอผู้เชี่ยวชาญจาก 2 CMS แถมเป็นงานฟรี โอกาสแบบนี้หาไม่ได้ง่ายๆ ครับ เพราะทั้งเวลาว่างและค่าเดินทางจากกรุงเทพมาพบปะเพื่อนๆ ครับ ใครสนใจ ก็ไปลงชื่อได้ในเว็บในเว็บ JUG ได้เลยครับ http://www.joomla.or.th/event/jug-meeting/36-jug-on-tour-28-feb-2010

Joomla SQL Reports Component "user_id" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA38678

VERIFY ADVISORY:
http://secunia.com/advisories/38678/

DESCRIPTION:
A vulnerability has been discovered in the SQL Reports component for
Joomla, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed via the "user_id" parameter to
administrator/components/com_sqlreport/ajax/print.php is not properly
sanitised before being used in a SQL query. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.

The vulnerability is confirmed in version 1.1. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Snakespc

Joomla RWCards Component "controller" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA38638

VERIFY ADVISORY:
http://secunia.com/advisories/38638/

DESCRIPTION:
A vulnerability has been discovered in the RWCards component for
Joomla, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed to the "controller" parameter in index.php (when
"option" is set to "com_rwcards") is not properly sanitised before
being used to include files. This can be exploited to include
arbitrary files from local resources via directory traversal attacks
and URL-encoded NULL bytes.

The vulnerability is confirmed in version 3.0.18. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
ByEge

ORIGINAL ADVISORY:
http://packetstormsecurity.org/1002-exploits/joomlarwcards-lfi.txt

RECENT ARTICLE