Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 113574 - www-apps/joomla SQL Injection and Cross-Site Scripting Vulnerabilities
Summary: www-apps/joomla SQL Injection and Cross-Site Scripting Vulnerabilities
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/17675/
Whiteboard: ~4 [noglsa] jaervosz
Keywords:
Depends on:
Blocks:
 
Reported: 2005-11-25 11:23 UTC by Peter
Modified: 2005-11-27 09:55 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Peter 2005-11-25 11:23:17 UTC
http://developer.joomla.org/sf/frs/do/viewRelease/projects.joomla/frs.joomla_1_0.1_0_4

Reproducible: Always
Steps to Reproduce:
1.
2.
3.
Comment 1 Jakub Moc (RETIRED) gentoo-dev 2005-11-25 11:54:24 UTC
Joomla! SQL Injection and Cross-Site Scripting Vulnerabilities

Secunia Advisory:	SA17675	Print Advisory  
Release Date:	2005-11-22

Critical:	
Moderately critical
Impact:	Cross Site Scripting
Manipulation of data
Where:	From remote
Solution Status:	Vendor Patch

Software:	Joomla! 1.x

	Select a product and view a complete list of all Patched/Unpatched Secunia
advisories affecting it.

Description:
Some vulnerabilities have been reported in Joomla!, which can be exploited by
malicious people to conduct SQL injection or cross-site scripting attacks.

1) Certain unspecified input is not properly sanitised before being returned to
the user. This can be exploited to execute arbitrary HTML and script code in a
user's browser session in context of a vulnerable site.

2) Input passed to the "Itemid" parameter in the "mod_poll" module is not
sanitised properly before being used in a SQL query. This can potentially be
exploited to manipulate SQL queries by injecting arbitrary SQL code.

3) Certain unspecified input passed to several methods in the "mosDBTable" class
is not sanitised properly before being used in a SQL query. This can potentially
be exploited to manipulate SQL queries by injecting arbitrary SQL code.

Note: An error that potentially allows the misuse of the Media component file
management functions has also been fixed.

Solution:
Update to version 1.0.4.
http://developer.joomla.org/sf/go/projects.joomla/frs.joomla_1_0
Comment 2 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-11-25 12:59:01 UTC
web-apps please provide an updated ebuild. 
Comment 3 Renat Lumpau (RETIRED) gentoo-dev 2005-11-27 06:36:39 UTC
In CVS, unstable on all arches.
Comment 4 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-11-27 09:55:07 UTC
Thx Renat. Since this was ~ on all arches I'll close with NO GLSA.