Joomla InstantPhp Jobs Component "detailed_results" SQL Injection

SECUNIA ADVISORY ID:
SA40559

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/40559/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=40559

RELEASE DATE:
2010-07-14
DESCRIPTION:
A vulnerability has been reported in the InstantPhp Jobs component
for Joomla, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed via the "detailed_results" parameter to index.php (when
"option" is set to "com_jobs", "task" is set to "search_jobs", and
"search_word" is set to any value) is not properly sanitised before
being used in a SQL query. This can be exploited to manipulate SQL
queries by injecting arbitrary SQL code.

The vulnerability is reported in version 1.3.2. Other versions may
also be affected.

SOLUTION:
Update to version 1.3.3.

PROVIDED AND/OR DISCOVERED BY:
Sid3^effects


RECENT ARTICLE

RECENT POST