Joomla! News

Joomla DigiStore Component "pid[]" and "cid[]" SQL Injection Vulnerabilities

SECUNIA ADVISORY ID:
SA37756

VERIFY ADVISORY:
http://secunia.com/advisories/37756/

DESCRIPTION:
Some vulnerabilities have been reported in Joomla DigiStore
Component, which can be exploited by malicious people to conduct SQL
injection attacks.

1) Input passed to the "cid[]" parameter in index.php (when "option"
is set to "com_digistore", "controller" is set to
"digistoreProducts", and "task" is set to "list") is not properly
sanitised before being used in SQL queries. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.

2) Input passed to the "pid[]" parameter in index.php (when "option"
is set to "com_digistore", "controller" is set to
"digistoreProducts", and "task" is set to "view") is not properly
sanitised before being used in SQL queries. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.

SOLUTION:
Filter malicious characters and character sequences using a proxy.

PROVIDED AND/OR DISCOVERED BY:
1) Fl0riX
2) Gaspode

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/10546

Joomla Event Manager Compoment "id" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA37687

VERIFY ADVISORY:
http://secunia.com/advisories/37687/

DESCRIPTION:
A vulnerability has been reported in the Event Manager component for
Joomla, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed via the "id" parameter to index.php (if "option" is set
to "com_content" and "view" is set to "article") is not properly
sanitised before being used in SQL queries. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.

The vulnerability is reported in version 1.5. Other versions may also
be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Fl0riX

Joomla JoomPortfolio Component "secid" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA37838

VERIFY ADVISORY:
http://secunia.com/advisories/37838/

DESCRIPTION:
Fl0riX has reported a vulnerability in the JoomPortfolio component
for Joomla, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed via the "secid" parameter to index.php (when "option" is
set to "com_joomportfolio" and "task" is set to "showcat") is not
properly sanitised before being used in a SQL query. This can be
exploited to manipulate SQL queries by injecting arbitrary SQL code.

The vulnerability is reported in version 1.0.0. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Fl0riX

ORIGINAL ADVISORY:
http://packetstormsecurity.org/0912-exploits/joomlaportfolio-sql.txt

Joomla JPhoto Component "id" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA37676

VERIFY ADVISORY:
http://secunia.com/advisories/37676/

DESCRIPTION:
kaMtiEz has reported a vulnerability in the JPhoto component for
Joomla, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed via the "id" parameter to index.php (when "option" is
set to "com_jphoto" and "view" is set to "category") is not properly
sanitised before being used in a SQL query. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.

The vulnerability is reported in version 1.0. Other versions may also
be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
kaMtiEz

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/10367

Joomla You!Hostit! Template Cross-Site Scripting Vulnerability

SECUNIA ADVISORY ID:
SA37601

VERIFY ADVISORY:
http://secunia.com/advisories/37601/

DESCRIPTION:
andresg888 has reported a vulnerability in the You!Hostit! template
for Joomla, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Input passed to the "created_by_alias" parameter in index.php is not
properly sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's
browser session in context of an affected site.

The vulnerability is reported in version 1.0.1. Other versions may
also be vulnerable.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
andresg888

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/10301

Joomla YOOtheme Template Cross-Site Scripting Vulnerability

SECUNIA ADVISORY ID:
SA37518

VERIFY ADVISORY:
http://secunia.com/advisories/37518/

DESCRIPTION:
andresg888 has reported a vulnerability in the YOOtheme template for
Joomla, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Input passed to the "yt_color" parameter in index.php is not properly
sanitised before being returned to the user. This can be exploited to
execute arbitrary HTML and script code in a user's browser session in
context of an affected site.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
andresg888

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/10318

RECENT ARTICLE