น้อมสำนึกในพระมหากรุณาธิคุณเป็นล้นพ้นอันหาที่สุดมิได้

Joomla! News

Joomla! Joomulus Module "tagcloud" Cross-Site Scripting Vulnerability

SECUNIA ADVISORY ID:
SA37994

VERIFY ADVISORY:
http://secunia.com/advisories/37994/

DESCRIPTION:
MustLive has discovered a vulnerability in the Joomulus module for
Joomla!, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Input passed via the "tagcloug" parameter to tagcloud_ell.swf,
tagcloud_eng.swf, tagcloud_por.swf, tagcloud_rus.swf, and potentially
tagcloud_jpn.swf in modules/mod_joomulus/ (when "mode" is set to
"tags") is not properly sanitised before being returned to the user.
This can be exploited to execute arbitrary HTML and script code in a
user's browser session in context of an affected site.

The vulnerability is confirmed in version 2.0. Other versions may
also be affected.

SOLUTION:
Filter malicious characters and character sequences using a proxy.

PROVIDED AND/OR DISCOVERED BY:
MustLive

ORIGINAL ADVISORY:
http://websecurity.com.ua/3789/

Joomla! Q-Personel Component "personel_sira" Cross-Site Scripting Vulnerability

SECUNIA ADVISORY ID:
SA37897

VERIFY ADVISORY:
http://secunia.com/advisories/37897/

DESCRIPTION:
A vulnerability has been discovered in the Q-Personel component for
Joomla!, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Input passed to the "personel_sira" parameter in index.php (if
"option" is set to "com_qpersonel" and "task" is set to "sirala") is
not properly sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's
browser session in context of an affected site.

The vulnerability is confirmed in version 1.0.2 (RC2). Other versions
may also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Pyske

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/10738

Joomla! BeeHeard Component "category_id" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA37872

VERIFY ADVISORY:
http://secunia.com/advisories/37872/

DESCRIPTION:
A vulnerability has been reported in the BeeHeard component for
Joomla!, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed to the "category_id" parameter in index.php (if "option"
is set to "com_beeheard", "controller" is set to "suggestions", "view"
is set to "suggestions", and "layout" is set to "list") is not
properly sanitised before being used in SQL queries. This can be
exploited to manipulate SQL queries by injecting arbitrary SQL code.

SOLUTION:
Filter malicious characters and character sequences using a proxy.

PROVIDED AND/OR DISCOVERED BY:
FL0RiX

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/10734

Joomla Car Manager Component "msg" Cross-Site Scripting Vulnerability

SECUNIA ADVISORY ID:
SA37882

VERIFY ADVISORY:
http://secunia.com/advisories/37882/

DESCRIPTION:
Fl0riX has reported a vulnerability in the Car Manager component for
Joomla, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Input passed to the "msg" parameter in index.php (when "option" is
set to "com_carman") is not properly sanitised before being returned
to the user. This can be exploited to execute arbitrary HTML and
script code in a user's browser session in context of an affected
site.

The vulnerability is reported in version 2.0.5. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Fl0riX

ORIGINAL ADVISORY:
http://packetstormsecurity.org/0912-exploits/joomlacarman-xss.txt

Joomla JEEMA Article Collection Component "catid" SQL Injection

SECUNIA ADVISORY ID:
SA37865

VERIFY ADVISORY:
http://secunia.com/advisories/37865/

DESCRIPTION:
Fl0riX has discovered a vulnerability in the JEEMA Article Collection
component for Joomla, which can be exploited by malicious people to
conduct SQL injection attacks.

Input passed via the "catid" parameter to index.php (when "option" is
set to "com_jeemaarticlecollection" and "view" is set to "longlook")
is not properly sanitised before being used in a SQL query. This can
be exploited to manipulate SQL queries by injecting arbitrary SQL
code.

The vulnerability is confirmed in version 1.0.0.1. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Fl0riX

ORIGINAL ADVISORY:
http://packetstormsecurity.org/0912-exploits/joomlajeemaac-sql.txt

Joomla DigiStore Component "pid[]" and "cid[]" SQL Injection Vulnerabilities

SECUNIA ADVISORY ID:
SA37756

VERIFY ADVISORY:
http://secunia.com/advisories/37756/

DESCRIPTION:
Some vulnerabilities have been reported in Joomla DigiStore
Component, which can be exploited by malicious people to conduct SQL
injection attacks.

1) Input passed to the "cid[]" parameter in index.php (when "option"
is set to "com_digistore", "controller" is set to
"digistoreProducts", and "task" is set to "list") is not properly
sanitised before being used in SQL queries. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.

2) Input passed to the "pid[]" parameter in index.php (when "option"
is set to "com_digistore", "controller" is set to
"digistoreProducts", and "task" is set to "view") is not properly
sanitised before being used in SQL queries. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.

SOLUTION:
Filter malicious characters and character sequences using a proxy.

PROVIDED AND/OR DISCOVERED BY:
1) Fl0riX
2) Gaspode

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/10546

RECENT ARTICLE