Joomla! JSupport Component Script Insertion and SQL Injection Vulnerabilities

SECUNIA ADVISORY ID:
SA42262

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/42262/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=42262

RELEASE DATE:
2010-11-16
DESCRIPTION:
Valentin Hoebel has reported some vulnerabilities in the JSupport
component for Joomla!, which can be exploited by malicious users to
conduct script insertion and SQL injection attacks.

1) Input passed via the "subject" parameter to index2.php (when
"option" is set to "com_jsupport" and "task" is set to "saveTicket")
is not properly sanitised before being displayed to the user. This
can be exploited to insert arbitrary HTML and script code, which will
be executed in a user's browser session in context of an affected site
when the malicious data is being viewed.

2) Input passed via the "alpha" parameter to administrator/index.php
(when "option" is set to "com_jsupport" and "task" is set to
"listTickets" or "listFaqs") is not properly sanitised before being
used in SQL queries. This can be exploited to manipulate SQL queries
by injecting arbitrary SQL code.

Successful exploitation of this vulnerability requires "Public
Back-end" permissions.

The vulnerabilities are reported in version 1.5.6. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Valentin Hoebel

ORIGINAL ADVISORY:
Valentin Hoebel:
http://www.xenuser.org/documents/security/Joomla_com_jsupport_XSS.txt
http://www.xenuser.org/documents/security/Joomla_com_jsupport_SQLi.txt

RECENT ARTICLE

RECENT POST