Joomla! AWDwall Components SQL Injection and Local File Inclusion Vulnerabilities

SECUNIA ADVISORY ID:
SA39553

VERIFY ADVISORY:
http://secunia.com/advisories/39553/

DESCRIPTION:
Some vulnerabilities have been reported in the AWDwall component for
Joomla!, which can be exploited by malicious people to disclose
sensitive information and conduct SQL injection attacks.

1) Input passed via the "cbuser" parameter to index.php (if "option"
is set to "com_awdwall" and "view" is set to "awdwall") is not
properly sanitised before being used in SQL queries. This can be
exploited to manipulate SQL queries by injecting arbitrary SQL code.

2) Input passed via the "controller" parameter to index.php (if
"option" is set to "com_awdwall") is not properly verified before
being used to include files. This can be exploited to include
arbitrary file from local resources via directory traversal sequences
and URL-encoded NULL bytes.

The vulnerabilities are reported in versions prior to 1.5.5.

SOLUTION:
Update to version 1.5.5.

PROVIDED AND/OR DISCOVERED BY:
1) Jeff Channell
2) AntiSecurity

CHANGELOG:
AWDwall:
http://www.awdwall.com/index.php/awdwall-updates-logs-

Jeff Channell:
http://jeffchannell.com/Joomla/awd-wall-15-blind-sql-injection-vulnerability.html