SECUNIA ADVISORY ID:
Customer Area (Credentials Required)
Valentin Hoebel has reported some vulnerabilities in the JSupport
component for Joomla!, which can be exploited by malicious users to
conduct script insertion and SQL injection attacks.
1) Input passed via the "subject" parameter to index2.php (when
"option" is set to "com_jsupport" and "task" is set to "saveTicket")
is not properly sanitised before being displayed to the user. This
can be exploited to insert arbitrary HTML and script code, which will
be executed in a user's browser session in context of an affected site
when the malicious data is being viewed.
2) Input passed via the "alpha" parameter to administrator/index.php
(when "option" is set to "com_jsupport" and "task" is set to
"listTickets" or "listFaqs") is not properly sanitised before being
used in SQL queries. This can be exploited to manipulate SQL queries
by injecting arbitrary SQL code.
Successful exploitation of this vulnerability requires "Public
The vulnerabilities are reported in version 1.5.6. Other versions may
also be affected.
Edit the source code to ensure that input is properly sanitised.
PROVIDED AND/OR DISCOVERED BY: