Joomla JGrid Component File Inclusion and SQL Injection Vulnerabilities

SECUNIA ADVISORY ID:
SA40987

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/40987/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=40987

RELEASE DATE:
2010-08-19
DESCRIPTION:
Two vulnerabilities have been reported in the JGrid component for
Joomla, which can be exploited by malicious people to disclose
potentially sensitive information and conduct SQL injection attacks.

1) Input passed to the "controller" parameter in index.php (when
"option" is set to "com_jgrid") is not properly verified before being
used to include files. This can be exploited to include arbitrary
files from local resources via directory traversal attacks and
URL-encoded NULL bytes.

2) Input passed via unspecified parameters is not properly sanitised
before being used in a SQL query. This can be exploited to manipulate
SQL queries by injecting arbitrary SQL code.

The vulnerabilities are reported in version 1.0. Other versions may
also be affected.

SOLUTION:
Update to version 1.1.

PROVIDED AND/OR DISCOVERED BY:
1) Salvatore Fresta aka Drosophila.
2) Reported by the vendor.

ORIGINAL ADVISORY:
Salvatore Fresta:
http://www.salvatorefresta.net/?opt=newsid&id=44

JGrid:
http://www.datagrids.clubsareus.org/index.php?view=article&catid=1:latest-news&id=45:jgrid-joomla-component-now-available