Joomla Multiple SQL Injection Vulnerabilities

SECUNIA ADVISORY ID:
SA42133

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/42133/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=42133

RELEASE DATE:
2010-11-05
DESCRIPTION:
Multiple vulnerabilities have been discovered in Joomla, which can be
exploited by malicious people to conduct SQL injection attacks.

Input passed via the "filter_order" and "filter_order_Dir" parameters
to index.php (e.g. when "option" is set to "com_weblinks",
"com_contact", or "com_messages") is not properly verified before
being used in a SQL query. This can be exploited to manipulate SQL
queries by injecting limited SQL code, which may result in e.g.
information disclosure via database errors.

The vulnerabilities are reported in versions prior to 1.5.22.

SOLUTION:
Update to version 1.5.22.

PROVIDED AND/OR DISCOVERED BY:
YGN Ethical Hacker Group

ORIGINAL ADVISORY:
Joomla:
http://developer.joomla.org/security/news/9-security/10-core-security/323-20101101-core-sqli-info-disclosurevulnerabilities.html

RECENT ARTICLE

RECENT POST