Joomla! Rapid Recipe Component Two SQL Injection Vulnerabilities

SECUNIA ADVISORY ID:
SA28883

VERIFY ADVISORY:
http://secunia.com/advisories/28883/

CRITICAL:
Moderately critical

IMPACT:
Manipulation of data, Exposure of sensitive information

WHERE:
>From remote

SOFTWARE:
Rapid Recipe 1.x (component for Joomla)
http://secunia.com/product/17541/

DESCRIPTION:
breaker_unit has discovered two vulnerabilities in the Rapid Recipe
component for Joomla!, which can be exploited by malicious people to
conduct SQL injection attacks.

Input passed to the "category_id" parameter (when "page" is set to
"viewcategorysrecipes") and "user_id" (when "page" is set to
"showuser") in the Joomla! installation's index.php script (when
"option" is set to "com_rapidrecipe") is not properly sanitised
before being used in SQL queries. This can be exploited to manipulate
SQL queries by injecting arbitrary SQL code.

Successful exploitation allows e.g. retrieving administrator
usernames and password hashes, but requires knowledge of the database
table prefix.

The vulnerabilities are confirmed in version 1.6.5. Other versions
may also be affected.

SOLUTION:
Filter malicious characters and character sequences using a web
proxy.

PROVIDED AND/OR DISCOVERED BY:
breaker_unit

RECENT ARTICLE

RECENT POST