Joomla! News

Joomla iF Portfolio Nexus Component "controller" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA37760

VERIFY ADVISORY:
http://secunia.com/advisories/37760/

DESCRIPTION:
A vulnerability has been discovered in the iF Portfolio Nexus
component for Joomla, which can be exploited by malicious people to
disclose potentially sensitive information.

Input passed to the "controller" parameter in index.php (if "option"
is set to "com_if_nexus") is not properly verified before being used
to include files. This can be exploited to include arbitrary files
from local resources via directory traversal attacks.

The vulnerability is confirmed in version 1.5. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
Fl0riX

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/10754

Joomla! Joomulus Module "tagcloud" Cross-Site Scripting Vulnerability

SECUNIA ADVISORY ID:
SA37994

VERIFY ADVISORY:
http://secunia.com/advisories/37994/

DESCRIPTION:
MustLive has discovered a vulnerability in the Joomulus module for
Joomla!, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Input passed via the "tagcloug" parameter to tagcloud_ell.swf,
tagcloud_eng.swf, tagcloud_por.swf, tagcloud_rus.swf, and potentially
tagcloud_jpn.swf in modules/mod_joomulus/ (when "mode" is set to
"tags") is not properly sanitised before being returned to the user.
This can be exploited to execute arbitrary HTML and script code in a
user's browser session in context of an affected site.

The vulnerability is confirmed in version 2.0. Other versions may
also be affected.

SOLUTION:
Filter malicious characters and character sequences using a proxy.

PROVIDED AND/OR DISCOVERED BY:
MustLive

ORIGINAL ADVISORY:
http://websecurity.com.ua/3789/

Joomla! Q-Personel Component "personel_sira" Cross-Site Scripting Vulnerability

SECUNIA ADVISORY ID:
SA37897

VERIFY ADVISORY:
http://secunia.com/advisories/37897/

DESCRIPTION:
A vulnerability has been discovered in the Q-Personel component for
Joomla!, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Input passed to the "personel_sira" parameter in index.php (if
"option" is set to "com_qpersonel" and "task" is set to "sirala") is
not properly sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's
browser session in context of an affected site.

The vulnerability is confirmed in version 1.0.2 (RC2). Other versions
may also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Pyske

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/10738

Joomla! BeeHeard Component "category_id" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA37872

VERIFY ADVISORY:
http://secunia.com/advisories/37872/

DESCRIPTION:
A vulnerability has been reported in the BeeHeard component for
Joomla!, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed to the "category_id" parameter in index.php (if "option"
is set to "com_beeheard", "controller" is set to "suggestions", "view"
is set to "suggestions", and "layout" is set to "list") is not
properly sanitised before being used in SQL queries. This can be
exploited to manipulate SQL queries by injecting arbitrary SQL code.

SOLUTION:
Filter malicious characters and character sequences using a proxy.

PROVIDED AND/OR DISCOVERED BY:
FL0RiX

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/10734

Joomla Car Manager Component "msg" Cross-Site Scripting Vulnerability

SECUNIA ADVISORY ID:
SA37882

VERIFY ADVISORY:
http://secunia.com/advisories/37882/

DESCRIPTION:
Fl0riX has reported a vulnerability in the Car Manager component for
Joomla, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Input passed to the "msg" parameter in index.php (when "option" is
set to "com_carman") is not properly sanitised before being returned
to the user. This can be exploited to execute arbitrary HTML and
script code in a user's browser session in context of an affected
site.

The vulnerability is reported in version 2.0.5. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Fl0riX

ORIGINAL ADVISORY:
http://packetstormsecurity.org/0912-exploits/joomlacarman-xss.txt

Joomla JEEMA Article Collection Component "catid" SQL Injection

SECUNIA ADVISORY ID:
SA37865

VERIFY ADVISORY:
http://secunia.com/advisories/37865/

DESCRIPTION:
Fl0riX has discovered a vulnerability in the JEEMA Article Collection
component for Joomla, which can be exploited by malicious people to
conduct SQL injection attacks.

Input passed via the "catid" parameter to index.php (when "option" is
set to "com_jeemaarticlecollection" and "view" is set to "longlook")
is not properly sanitised before being used in a SQL query. This can
be exploited to manipulate SQL queries by injecting arbitrary SQL
code.

The vulnerability is confirmed in version 1.0.0.1. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Fl0riX

ORIGINAL ADVISORY:
http://packetstormsecurity.org/0912-exploits/joomlajeemaac-sql.txt

RECENT ARTICLE