Joomla! Clantools Component Two SQL Injection Vulnerabilities

SECUNIA ADVISORY ID:
SA41322

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/41322/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=41322

RELEASE DATE:
2010-09-06
DESCRIPTION:
Two vulnerabilities have been discovered in the Clantools component
for Joomla!, which can be exploited by malicious people to conduct
SQL injection attacks.

1) Input passed via the "squad" parameter in index.php (when "option"
is set to "com_clantools") is not properly sanitised before being used
in SQL queries. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.

2) Input passed via the "showgame" parameter to index.php (when
"option" is set to "com_clantools" and "task" is set to "clanwar") is
not properly sanitised before being used in SQL queries. This can be
exploited to manipulate SQL queries by injecting arbitrary SQL code.

The vulnerabilities are confirmed in version 1.2.3. Other versions
may also be affected.

SOLUTION:
Update to version 1.2.4.

PROVIDED AND/OR DISCOVERED BY:
Stephan Sattler // Solidmedia

ORIGINAL ADVISORY:
Clantools:
http://joomla-clantools.de/downloads/doc_details/29-update-auf-124.html


RECENT ARTICLE

RECENT POST