Joomla! News

Joomla Joovideo Component "id" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA29474

VERIFY ADVISORY:
http://secunia.com/advisories/29474/

CRITICAL:
Moderately critical

IMPACT:
Manipulation of data, Exposure of sensitive information

WHERE:
>From remote

SOFTWARE:
Joovideo 1.x (component for Joomla)
http://secunia.com/product/17997/

DESCRIPTION:
S@BUN has discovered a vulnerability in the Joovideo component for
Joomla!, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed to the "id" parameter in the Joomla! installation's
index.php script (when "option" is set to "com_joovideo" and "task"
to "detail") is not properly sanitised before being used in SQL
queries. This can be exploited to manipulate SQL queries by injecting
arbitrary SQL code.

Successful exploitation allows e.g. retrieving administrator
usernames and password hashes, but requires knowledge of the database
table prefix.

The vulnerability is confirmed in version 1.2.2 PRO. Other versions
may also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
S@BUN

ORIGINAL ADVISORY:
http://milw0rm.com/exploits/5277

Joomla Restaurante Component "id" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA29471

VERIFY ADVISORY:
http://secunia.com/advisories/29471/

CRITICAL:
Moderately critical

IMPACT:
Manipulation of data, Exposure of sensitive information

WHERE:
>From remote

SOFTWARE:
Restaurante 1.x (component for Joomla)
http://secunia.com/product/15703/

DESCRIPTION:
S@BUN has discovered a vulnerability in the Restaurante component for
Joomla!, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed to the "id" parameter in the Joomla! installation's
index.php script (when "option" is set to "com_restaurante" and
"task" to "detail") is not properly sanitised before being used in
SQL queries. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.

Successful exploitation allows e.g. retrieving administrator
usernames and password hashes, but requires knowledge of the database
table prefix.

This is related to:
SA29473

The vulnerability is confirmed in version 1.0. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
S@BUN

ORIGINAL ADVISORY:
http://milw0rm.com/exploits/5280

OTHER REFERENCES:
SA29473:
http://secunia.com/advisories/29473/

Joomla Acajoom PRO Component "mailingid" SQL Injection

SECUNIA ADVISORY ID:
SA29429

VERIFY ADVISORY:
http://secunia.com/advisories/29429/

CRITICAL:
Moderately critical

IMPACT:
Manipulation of data, Exposure of sensitive information

WHERE:
>From remote

SOFTWARE:
Acajoom PRO 1.x (component for Joomla)
http://secunia.com/product/17982/

DESCRIPTION:
fataku has reported a vulnerability in the Acajoom PRO component for
Joomla!, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed to the "mailingid" parameter in the Joomla!
installation's index.php script (when "option" is set to
"com_acajoom", "act" to "mailing", and "task" to "view") is not
properly sanitised before being used in SQL queries. This can be
exploited to manipulate SQL queries by injecting arbitrary SQL code.

Successful exploitation allows e.g. retrieving administrator
usernames and password hashes, but requires knowledge of the database
table prefix.

The vulnerability is reported in versions 1.2.5 and 1.1.5. Other
versions may also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
fataku

ORIGINAL ADVISORY:
http://milw0rm.com/exploits/5273

Joomla! eWriting Component "cat" SQL Injection

SECUNIA ADVISORY ID:
SA29292

VERIFY ADVISORY:
http://secunia.com/advisories/29292/

CRITICAL:
Moderately critical

IMPACT:
Manipulation of data, Exposure of sensitive information

WHERE:
>From remote

SOFTWARE:
eWriting 1.x (component for Joomla)
http://secunia.com/product/17919/

DESCRIPTION:
breaker_unit & Don have discovered a vulnerability in the eWriting
component for Joomla!, which can be exploited by malicious people to
conduct SQL injection attacks.

Input passed to the "cat" parameter in the Joomla! installation's
index.php script (when "option" is set to "com_ewriting" and "func"
to "selectcat") is not properly sanitised before being used in SQL
queries. This can be exploited to manipulate SQL queries by injecting
arbitrary SQL code.

Successful exploitation allows e.g. retrieving administrator
usernames and password hashes, but requires knowledge of the database
table prefix.

The vulnerability is confirmed in version 1.2.1. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
breaker_unit & Don

ORIGINAL ADVISORY:
http://milw0rm.com/exploits/5226

Joomla! Gary's Cookbook Component "id" SQL Injection

SECUNIA ADVISORY ID:
SA29090

VERIFY ADVISORY:
http://secunia.com/advisories/29090/

CRITICAL:
Moderately critical

IMPACT:
Manipulation of data

WHERE:
>From remote

SOFTWARE:
Gary's Cookbook 2.x (component for Joomla)
http://secunia.com/product/17763/

DESCRIPTION:
S@BUN has discovered a vulnerability in the Gary's Cookbook component
for Joomla!, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed to the "id" parameter in the Joomla! installation's
index.php script (when "option" is set to "com_garyscookbook" and
"func" to "detail") is not properly sanitised before being used in
SQL queries. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.

The vulnerability is confirmed in version 2.4.0. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
S@BUN

ORIGINAL ADVISORY:
http://milw0rm.com/exploits/5178

Joomla! "mosConfig_absolute_path" File Inclusion

SECUNIA ADVISORY ID:
SA29106

VERIFY ADVISORY:
http://secunia.com/advisories/29106/

CRITICAL:
Moderately critical

IMPACT:
System access

WHERE:
>From remote

SOFTWARE:
Joomla! 1.x
http://secunia.com/product/5788/

DESCRIPTION:
Hendrik-Jan Verheij has discovered a vulnerability in Joomla!, which
can be exploited by malicious people to compromise a vulnerable
system.

Input passed to the "mosConfig_absolute_path" parameter in index.php
is not properly verified before being used to include files. This can
be exploited to include arbitrary files from external resources.

Successful exploitation requires that RG_EMULATION is either switched
on or undefined.

NOTE: Both situations cause security warnings to be displayed in
Joomla!'s administration section.

The vulnerability is confirmed in Joomla! 1.0.x in versions 1.0.14
and 1.0.13. Prior versions may also be affected.

SOLUTION:
Joomla! 1.0.x:
Update to version 1.0.15.

PROVIDED AND/OR DISCOVERED BY:
Hendrik-Jan Verheij

ORIGINAL ADVISORY:
Joomla!:
http://www.joomla.org/content/view/4609/1/

Hendrik-Jan Verheij:
http://seclists.org/bugtraq/2008/Feb/0207.html

RECENT ARTICLE