DESCRIPTION: KKR has discovered a vulnerability in the IDoBlog component for Joomla, which can be exploited by malicious people to conduct SQL injection attacks.
Input passed to the "userid" parameter in the Joomla! installation's index.php script (when "option" is set to "com_idoblog" and "task" to "profile") is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The vulnerability is confirmed in version 1.1. Other versions may also be affected.
SOLUTION: Edit the source code to ensure that input is properly sanitised.
DESCRIPTION: A weakness has been reported in Joomla!, which can be exploited by malicious people to bypass certain restrictions.
The weakness is caused due to an error in the handling of timeouts in the "com_mailto" component and can be exploited to send emails via the component without timeout restrictions.
The weakness is reported in versions prior to 1.5.14.
SOLUTION: Update to version 1.5.14.
PROVIDED AND/OR DISCOVERED BY: The vendor credits WHK and Gergo Erdosi