Joomla! News

Joomla Ninja RSS Syndicator File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA38914

VERIFY ADVISORY:
http://secunia.com/advisories/38914/

DESCRIPTION:
A vulnerability has been discovered in the Ninja RSS Syndicator
component for Joomla, which can be exploited by malicious people to
disclose potentially sensitive information.

Input passed to the "controller" parameter in
components/com_ninjarsssyndicator/ninjarsssyndicator.php is not
properly verified before being used to include files. This can be
exploited to include local files via directory traversal attacks.

The vulnerability is confirmed in version 1.0.8. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
jdc

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/11740

Joomla MyBlog Component "task" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA38777

VERIFY ADVISORY:
http://secunia.com/advisories/38777/

DESCRIPTION:
A vulnerability has been reported in the MyBlog component for Joomla,
which can be exploited by malicious people to disclose potentially
sensitive information.

Input passed to the "task" parameter in index.php (when "option" is
set to "com_myblog") is not properly sanitised before being used to
include files. This can be exploited to include arbitrary files from
local resources via directory traversal attacks and URL-encoded NULL
bytes.

The vulnerability is reported in version 3.0.329. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
DevilZ TM

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/11625

Joomla YaNC Component "listid" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA38780

VERIFY ADVISORY:
http://secunia.com/advisories/38780/

DESCRIPTION:
A vulnerability has been reported in the YaNC component for Joomla,
which can be exploited by malicious people to conduct SQL injection
attacks.

Input passed via the "listid" parameter to index.php (when "option"
is set to "com_yanc") is not properly sanitised before being used in
a SQL query. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
His0k4

ORIGINAL ADVISORY:
http://packetstormsecurity.org/0806-exploits/joomlayanc-sql.txt

Joomla HD FLV Player Component "id" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA38691

VERIFY ADVISORY:
http://secunia.com/advisories/38691/

DESCRIPTION:
A vulnerability has been discovered in the HD FLV Player component
for Joomla, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed via the "id" parameter to index.php (when "option" is
set to "com_hdflvplayer") is not properly sanitised before being used
in a SQL query. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.

The vulnerability is confirmed in version 1.3. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
kaMtiEz

JUG ครั้งที่ 7 On Tour เชียงใหม่ 28 ก.พ. บ่าย 3

Joomla User Groupขอเชิญเพื่อนๆ สมาชิก Joomla! User Group หรือผู้สนใจ พบปะพูดคุยกัน แบบกันเอง สบายๆ เกี่ยวกับ Joomla! ในวันที่ 28 กุมภาพันธ์ 2553 ที่ร้านแมคโดนัลด์ สาขาหน้าประตูท่าแพ ชั้น 2? (ขอบคุณ @AjBomb ประสานงานเรื่องสถานที่ครับ)? นอกจากจะมีคุณอัครวุฒิ ตำราเรียง หัวหน้าทีมลายไทย ซึ่งเพิ่งได้รับเลือกให้เป็นกรรมการของ Opensource Matters วาระ 2 ปี มาหมาดๆ ยังมีคุณศิระ ( @Hunt ผู้เชี่ยวชาญเรื่อง Drupal) ไปร่วมด้วย งานเดียวได้เจอผู้เชี่ยวชาญจาก 2 CMS แถมเป็นงานฟรี โอกาสแบบนี้หาไม่ได้ง่ายๆ ครับ เพราะทั้งเวลาว่างและค่าเดินทางจากกรุงเทพมาพบปะเพื่อนๆ ครับ ใครสนใจ ก็ไปลงชื่อได้ในเว็บในเว็บ JUG ได้เลยครับ http://www.joomla.or.th/event/jug-meeting/36-jug-on-tour-28-feb-2010

Joomla SQL Reports Component "user_id" SQL Injection Vulnerability

SECUNIA ADVISORY ID:
SA38678

VERIFY ADVISORY:
http://secunia.com/advisories/38678/

DESCRIPTION:
A vulnerability has been discovered in the SQL Reports component for
Joomla, which can be exploited by malicious people to conduct SQL
injection attacks.

Input passed via the "user_id" parameter to
administrator/components/com_sqlreport/ajax/print.php is not properly
sanitised before being used in a SQL query. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.

The vulnerability is confirmed in version 1.1. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Snakespc

RECENT ARTICLE