น้อมสำนึกในพระมหากรุณาธิคุณเป็นล้นพ้นอันหาที่สุดมิได้

Joomla! News

Joomla Event Manager Compoment "id" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA37687

VERIFY ADVISORY:
http://secunia.com/advisories/37687/

DESCRIPTION:
A vulnerability has been reported in the Event Manager component for
Joomla, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed via the "id" parameter to index.php (if "option" is set
to "com_content" and "view" is set to "article") is not properly
sanitised before being used in SQL queries. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.

The vulnerability is reported in version 1.5. Other versions may also
be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Fl0riX

Joomla JoomPortfolio Component "secid" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA37838

VERIFY ADVISORY:
http://secunia.com/advisories/37838/

DESCRIPTION:
Fl0riX has reported a vulnerability in the JoomPortfolio component
for Joomla, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed via the "secid" parameter to index.php (when "option" is
set to "com_joomportfolio" and "task" is set to "showcat") is not
properly sanitised before being used in a SQL query. This can be
exploited to manipulate SQL queries by injecting arbitrary SQL code.

The vulnerability is reported in version 1.0.0. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Fl0riX

ORIGINAL ADVISORY:
http://packetstormsecurity.org/0912-exploits/joomlaportfolio-sql.txt

Joomla JPhoto Component "id" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA37676

VERIFY ADVISORY:
http://secunia.com/advisories/37676/

DESCRIPTION:
kaMtiEz has reported a vulnerability in the JPhoto component for
Joomla, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed via the "id" parameter to index.php (when "option" is
set to "com_jphoto" and "view" is set to "category") is not properly
sanitised before being used in a SQL query. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.

The vulnerability is reported in version 1.0. Other versions may also
be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
kaMtiEz

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/10367

Joomla You!Hostit! Template Cross-Site Scripting Vulnerability

SECUNIA ADVISORY ID:
SA37601

VERIFY ADVISORY:
http://secunia.com/advisories/37601/

DESCRIPTION:
andresg888 has reported a vulnerability in the You!Hostit! template
for Joomla, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Input passed to the "created_by_alias" parameter in index.php is not
properly sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's
browser session in context of an affected site.

The vulnerability is reported in version 1.0.1. Other versions may
also be vulnerable.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
andresg888

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/10301

Joomla YOOtheme Template Cross-Site Scripting Vulnerability

SECUNIA ADVISORY ID:
SA37518

VERIFY ADVISORY:
http://secunia.com/advisories/37518/

DESCRIPTION:
andresg888 has reported a vulnerability in the YOOtheme template for
Joomla, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Input passed to the "yt_color" parameter in index.php is not properly
sanitised before being returned to the user. This can be exploited to
execute arbitrary HTML and script code in a user's browser session in
context of an affected site.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
andresg888

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/10318

Joomla YJ Whois Module Cross-Site Scripting Vulnerability

SECUNIA ADVISORY ID:
SA37525

VERIFY ADVISORY:
http://secunia.com/advisories/37525/

DESCRIPTION:
andresg888 has discovered a vulnerability in YJ Whois module for
Joomla, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Input passed in a HTTP POST request via the "domain" form field to
index.php (when form field "top_com" is set to "on" and "submitBtn"
is set to "Check") is not properly sanitised before being returned to
the user. This can be exploited to execute arbitrary HTML and script
code in a user's browser session in context of an affected site.

The vulnerability is confirmed in version 1.0. Prior versions may
also be affected.

SOLUTION:
Update to version 1.1.

PROVIDED AND/OR DISCOVERED BY:
andresg888

ORIGINAL ADVISORY:
Joomla YJ:
http://extensions.joomla.org/extensions/external-contents/domain-search/5774

RECENT ARTICLE