Joomla! JooProperty Component Cross-Site Scripting and SQL Injection Vulnerabilities

SECUNIA ADVISORY ID:
SA51512

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/51512/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=51512

RELEASE DATE:
2012-12-11
DESCRIPTION:
Two vulnerabilities have been reported in the JooProperty component
for Joomla!, which can be exploited by malicious people to conduct
cross-site scripting and SQL injection attacks.

1) Input passed to the "product_id" parameter in index.php (when
"option" is set to "com_jooproperty", "view" is set to "booking", and
"layout" is set to "modal") is not properly sanitised before being
returned to the user. This can be exploited to execute arbitrary HTML
and script code in a user's browser session in context of an affected
site.

2) Input passed via the "product_id" parameter to index.php (when
"option" is set to "com_jooproperty", "view" is set to "booking", and
"layout" is set to "modal") is not properly sanitised before being
used in a SQL query. This can be exploited to manipulate SQL queries
by injecting arbitrary SQL code.

The vulnerabilities are reported in version 1.13.0. Other versions
may also be affected.

SOLUTION:
No official solution is currently available.

PROVIDED AND/OR DISCOVERED BY:
Daniel Barragan "D4NB4R"

ORIGINAL ADVISORY:
http://packetstormsecurity.org/files/118741/Joomla-Jooproperty-SQL-Injection-Cross-Site-Scripting.html

RECENT ARTICLE

RECENT POST