Joomla! News

Joomla! TPJobs Component "id_c[]" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA38001

VERIFY ADVISORY:
http://secunia.com/advisories/38001/

DESCRIPTION:
A vulnerability has been reported in the TPJobs component for
Joomla!, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed to the "id_c[]" parameter in index.php (if "option" is
set to "com_tpjobs" and "task" is set to "resadvsearch") is not
properly sanitised before being used in SQL queries. This can be
exploited to manipulate SQL queries by injecting arbitrary SQL code.

SOLUTION:
Filter malicious characters and character sequences using a proxy.

PROVIDED AND/OR DISCOVERED BY:
FL0RiX

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/10950

ขอเชิญร่วมเสนอชื่อบุคคลเพื่อรับเลือกเป็นกรรมการ OSM

ขอเชิญร่วมเสนอรายชื่อ บุคคล เพื่อรับการคัดเลือกเป็น กรรมการบริหาร Open Source Matters?? ซึ่งเป็นองค์กรที่ดูแลโครงการ? Joomla!? และเป็นเจ้าของเครื่องหมายการค้า?

โดยสมาชิกทุกท่านสามารถร่วมเสนอรายชื่อบุคคล ที่ท่านคิดว่าสมควรเข้าไปมีส่วนร่วมในการ บริหารจัดการโครงการ? ให้กับ? CoC? (Community Oversight Committee)? เพื่อคัดเลือก? โดยจะต้องเสนอรายชื่อ? ภายในวันที่?? 12 มกราคม 2553? นี้? เหลือเวลาอีกไม่มากแล้วครับ สมาชิกแต่ละคนสามารถเสนอบุคคลได้มากกว่า 1 คน โดยกรอกแยก รายชื่อละ 1 แบบฟอร์ม? ผู้ที่จะเสนอชื่อและผู้ที่ถูกเสนอชื่อ จะต้องมีชื่อผู้ใช้งานใน forum ของเว็บไซต์? joomla.org ด้วยครับ


เสนอรายชื่อ ผ่านทางแบบฟอร์มออนไลน์? นี้??? == ปิดรับการ เสนอชื่อ ==

Joomla! Component Ozio Gallery "writeToFile.php" File Manipulation Vulnerability

SECUNIA ADVISORY ID:
SA37974

VERIFY ADVISORY:
http://secunia.com/advisories/37974/

DESCRIPTION:
A vulnerability has been reported in the Ozio Gallery component for
Joomla!, which can be exploited by malicious people to manipulate
certain data.

The vulnerability is caused due to the use of vulnerable IMAGIN
source code.

For more information:
SA38115

The vulnerability is reported in versions prior to 2.3.

SOLUTION:
Update to version 2.3.
http://www.joomla.it/download/oziogallery.html

PROVIDED AND/OR DISCOVERED BY:
Ubik and er

ORIGINAL ADVISORY:
http://oziogallery.joomla.it/index.php?option=com_content&view=article&id=62%3Anuova-ozio-gallery-23-aggiornamento-di-sicurezza&catid=2%3Anotizie&Itemid=13&lang=en

http://www.exploit-db.com/exploits/10979

OTHER REFERENCES:
SA38115:
http://secunia.com/advisories/38115/

Joomla Bible Study Component "controller" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA37896

VERIFY ADVISORY:
http://secunia.com/advisories/37896/

DESCRIPTION:
A vulnerability has been discovered in the Bible Study component for
Joomla, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed to the "controller" parameter in index.php (if "option"
is set to "com_biblestudy" and "view" is set to "studieslist") is not
properly verified before being used to include files. This can be
exploited to include arbitrary files from local resources via
directory traversal attacks.

The vulnerability is confirmed in version 6.1. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
FL0RiX

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/10943

Joomla Abbreviations Manager Component "controller" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA37834

VERIFY ADVISORY:
http://secunia.com/advisories/37834/

DESCRIPTION:
A vulnerability has been discovered in the Abbreviations Manager
component for Joomla, which can be exploited by malicious people to
disclose potentially sensitive information.

Input passed to the "controller" parameter in index.php (if "option"
is set to "com_abbrev") is not properly verified before being used to
include files. This can be exploited to include arbitrary files from
local resources via directory traversal attacks.

The vulnerability is confirmed in version 1.1. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
FL0RiX

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/10948

Joomla BF Survey Pro Component "catid" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA37868

VERIFY ADVISORY:
http://secunia.com/advisories/37868/

DESCRIPTION:
A vulnerability has been discovered in the BF Survey Pro component
for Joomla, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed via the "catid" parameter to index.php (when "option" is
set to "com_bfsurvey_profree" and "view" is set to "bfsurveyprofree")
is not properly sanitised before being used in an SQL query. This can
be exploited to manipulate SQL queries by injecting arbitrary SQL
code.

The vulnerability is confirmed in BF Survey Pro Free version 1.2.6.
Other versions may also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
FL0RiX

CHANGELOG:
2010-01-04: Updated the title.

RECENT ARTICLE