Joomla! SermonSpeaker Component "id" SQL Injection Vulnerabilities

SECUNIA ADVISORY ID:
SA39385

VERIFY ADVISORY:
http://secunia.com/advisories/39385/

DESCRIPTION:
Some vulnerabilities have been reported in the SermonSpeaker
component for Joomla!, which can be exploited by malicious people to
conduct SQL injection attacks.

Input passed via the "id" parameter to index.php (when "option" is
set to "com_sermonspeaker" and "task" is set to e.g. "latest_sermons"
or "speakerpopup") is not properly sanitised before being used in SQL
queries. This can be exploited to manipulate SQL queries by injecting
arbitrary SQL code.

NOTE: Other parameters may also be affected.

The vulnerabilities are reported in versions prior to 3.2.1.

SOLUTION:
Update to version 3.2.1.

PROVIDED AND/OR DISCOVERED BY:
The vendor credits Samara Hart.

ORIGINAL ADVISORY:
http://joomlacode.org/gf/project/sermon_speaker/news/?action=NewsThreadView&id=2549

DOWNLOAD
JOOMLA!


Download Joomla!

Joomla! 4.x Thai Translation Language Packs

Joomla! 3.x Thai Translation Language Packs

OUR NETWORK


CMSPlugin.com
Joomla Extensions, Joomla Templates

Joomla!® User Group Thailand
Joomla!® User Group Thailand


Marvelic Engine Co., Ltd. รับพัฒนาเว็บไซต์ด้วย Joomla! , รับอบรม Joomla , ผู้เชี่ยวชาญ จูมล่า
รับทำเว็บ Joomla, อบรบ Joomla