Archived

Difference between revisions of "Vulnerable Extensions List"

From Joomla! Documentation

(Remove under investigation page link now deleted)
 
(843 intermediate revisions by 13 users not shown)
Line 1: Line 1:
{{RightTOC}}
+
 
 +
 
 +
{{notice|This document has now been replaced by the website at [http://vel.joomla.org/ vel.joomla.org from 1st May 2013]
 +
Please refer to there for the latest updates}}
 +
 
 +
<!-- ***all wiki editors*** - do NOT touch without notice  -->
 +
'''List prior to January 2011 ([[Archived vel|now archived]])''' Please check here also.
 +
<!-- if you have altered the above line then revert your changes and contact me  -->
 +
 
== Check and Report.  ==
 
== Check and Report.  ==
 
 
'''Please check with the extension publisher in case of any questions over the security of their product.'''
 
'''Please check with the extension publisher in case of any questions over the security of their product.'''
Report Vulnerable extensions either in the [[jforum:432]] security topic or the [http://forum.joomla.org/viewforum.php?f=470 extensions] topic clearly marked.
+
{{notice|small=yes|image=Stop hand nuvola.svg
 +
  |header=Procedure change|All reports are now to be made via vel.joomla.org}}
 +
Report Vulnerable extensions in the [http://vel.joomla.org vel website]
 +
*If you are seeing this page on any site other than [http://docs.joomla.org/Vulnerable_Extensions_List the Offical Joomla Documentation] you may be seeing an out of date version or experiencing [http://en.wikipedia.org/wiki/Plagiarism plagiary] and the links may not work properly
  
 
== How to use this list ==
 
== How to use this list ==
'''Items will be removed after a suitable period and not on resolution'''
+
'''Items will be removed after a suitable period and not on resolution.'''
All known vulnerable extensions are the listed in the first column. Any in <span style="background:red; color:white">a red box </span>are high where we have not been given a fix for. Alert Advisory details in the centre column (the date is in American format mm/dd/yyyy).
+
{{notice|This document has now been replaced by the website at [http://vel.joomla.org/ vel.joomla.org from 1st May 2013]
The link to the advisory notice.
+
Please refer to there for the latest updates}}
Finally a link to the notice about any <span style="background:#cef2e0; color:black">update with link</span> or <span style="background:red; color:white">'''Not Known''' </span> where none is known.
+
 
 +
All known vulnerable extensions are the listed in the first column "Extension". Any in a <span style="background:red; color:white">red box </span>are where we have not been given a fix. Any in a <span style="background:#cef2e0; color:black">turquoise box</span> contain a link to the notice about an <span style="background:#cef2e0; color:black">update with link.</span> Any that are in an uncolored box are a "Contact the Developer About This Extension".
 +
Alert Advisory details are in the center column.
 +
If the "Extension Update Link & Date Column has <span style="background:red; color:white">'''Not Known''' </span> then it is where no update is known.
 +
 
 +
'''This list is compiled from found information and may not be an up to date accurate list''' ''We do '''NOT''' promise to test or validate these reports. We do '''NOT''' guarantee the quality or effectiveness of any updates reported to us or listed here.''
 +
To sign up for the feed please [http://feeds.joomla.org/JoomlaSecurityVulnerableExtensions follow this link]
 +
* We do not list BETA products, or extensions for J1.0.x
 +
 
 +
== Developers - How to get yourself removed from the VEL ==
 +
 
 +
Resolved items will be removed after a suitable period and not on resolution
 +
 
 +
Please solve the issues and:
 +
 
 +
* '''If JED listed'''
 +
 
 +
To have your extension republished, please follow these steps:
 +
 
 +
1- Solve the issues.
 +
 
 +
2- Attach the new zip file at your actual JED listing.
 +
 
 +
3- Change the extension version at JED listing.
 +
 
 +
4- Make sure to include a notice in the JED description to the fact that the new release is a "Security Release" and those who use the extension should upgrade immediately.
 +
 
 +
5-complete the resolution form on the website at [http://vel.joomla.org/ vel.joomla.org from 1st May 2013]
 +
 
 +
6- Create a [http://bit.ly/velunlist JED listing owner ticket] to the JED with a notice and ask that your listing be republished. Include the full details of your new version number and security notice page
 +
 
 +
VEL email can be found above and the JED support link is in your notice of "unpublication" [http://extensions.joomla.org/component/maqmahelpdesk/ and here]
 +
 
 +
* '''If not JED listed.'''
 +
Inform us by '''email''' with a notice of resolution, the latest version number '''and''' a link to the security release statement on your website.
 +
 
 +
== January 2012 and onwards Reported Vulnerable Extensions ==
 +
<startFeed />
 +
{| class="wikitable sortable" border="1"
 +
|-
 +
!  '''Extension'''
 +
! class="unsortable"| '''Details'''
 +
!  '''Date Added'''
 +
! class="unsortable" |'''Extension Update Link & Date'''
 +
 
 +
|-
 +
|
 +
==  civic crm 422==
 +
|upload exploit /RFI
 +
|260413
 +
|developer http://civicrm.org/category/civicrm-blog-categories/civicrm-v43 release 4.3.1
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
==  alfcontact ==
 +
|xss
 +
|230413
 +
|developer release [http://www.alfsoft.com statement on ALFContact v2.0.8 for J!2.5 ALFContact v3.1.4 for J!3]
 +
 
 +
|-
 +
|
 +
==  aiContactSafe 2.0.19 ==
 +
|xss
 +
|160413
 +
|developer release statement  [http://www.algisinfo.com/en/home-bottom/41-xss-in-aicontactsafe.html for version 2.0.21]
 +
 
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  RSfiles==
 +
|SQL
 +
|180313
 +
|developer release statement  [http://www.rsjoomla.com/support/documentation/view-knowledgebase/141-changelog.html for version 12]
 +
 
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  Multiple Customfields Filter for Virtuemart  ==
 +
|SQLi
 +
|18212
 +
|developers [http://myext.eu/en/update/47-v1-66  1.6.8 update statement]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  Collector    ==
 +
|Various [steevo.fr]
 +
|230113
 +
|developer update [http://www.steevo.fr/en/component/content/article/41-release-051 statement to] 0.5.1
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  tz guestbook  ==
 +
|Various
 +
|100113
 +
|developer release statement [http://www.templaza.com/item/256-tz-guestbook-v1-1-2-security-release for 1.1.2]
 +
|-
 +
|
 +
 
 +
== extplorer    ==
 +
| 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 are vulnerable to an authentication bypass
 +
|251212
 +
|developer [http://extplorer.net/news/12  update to 2.1.3 statement]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  JooProperty    ==
 +
|SQLi
 +
|101212
 +
|developer release new version 1.13.1 -  [http://jooproperty.com/en/forum/last-jooproperty-release/277-important-security-fix-released-please-update.html#277 upgrade notice]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  Multiple Customfields Filter for Virtuemart  ==
 +
|SQLi
 +
|18212
 +
|developers [http://myext.eu/en/update/47-v1-66  update statement]
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
==  ag google analytic    ==
 +
|Various
 +
|061212
 +
|
 +
|-
 +
|
 +
 
 +
== sh404sef <3.7.0 ==
 +
|Undisclosed sh404SEF 3.4.x, 3.5.x, 3.6.x for Joomla 2.5
 +
|26112
 +
|developer [http://anything-digital.com/sh404sef/news/releases/sh404sef-3_7_0_1485-released.html statement]
 +
|-
 +
|style="background:#cef2e0; color:black" |
  
'''This list is compiled from found information and may not be an up to date accurate list''' ''We do '''NOT''' promise to test or validate these reports. We do '''NOT''' guarantee the quality or effectiveness of any updates reported to us or listed here.  
+
== Login Failed Log    ==
''
+
|23112
 +
|ID - information disclosure
 +
|developer [http://www.jm-experts.com/extensions-tools/login-failed-log release statement] to ver 1.5.4
 +
|-
 +
|
 +
 
 +
== jNews==
 +
|
 +
|131112
 +
|developer update [http://www.joobi.co/index.php?option=com_content&view=article&id=8560:security-release-update-to-jnews-79x&catid=93:jnews&Itemid=225 statement to version  7.9.1] 151112
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
 
 +
== Joombah Jobs    ==
 +
|Upload restriction issues
 +
|131112
 +
|developer update [http://www.joombah.com/home/item/joombah-jobs-security-release-update-now statement]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== commedia    ==
 +
|RFI
 +
|231012
 +
|developer update [http://www.ecolora.com/index.php/15-commedia-a-mp3browser-new/77-commedia-3-2-is-not-vulnerable#english statement to version 3.2] 271012
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
 
 +
==  Kunena ==
 +
|SQLi + ID
 +
|221012
 +
|Developer states [http://www.kunena.org/forum/announcement/id-52 current version not exploitable] by reported methods
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
 
 +
==  Icagenda  ==
 +
|SQLi
 +
|
 +
|Developer  [http://www.joomlic.com/en/extensions/icagenda  statement for 1.2.9]
 +
|-
 +
|style="background:red; color:white" |
 +
 
 +
==  JTag [joomlatag]  ==
 +
|SQLi
 +
|
 +
|
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
==  Freestyle Support  ==
 +
|SQLi
 +
|
 +
|developer update [http://freestyle-joomla.com/help/announcements?announceid=60 statement 251012]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  ACEFTP  ==
 +
|DT
 +
|011012
 +
|AceFTP 2.0.0 released. Developer [http://www.joomace.net/blog/aceftp/aceftp-200-has-been-released statement] 101012
 +
|-
 +
|
 +
 
 +
==  MijoFTP  ==
 +
|DT
 +
|011012
 +
|*''reported fixed prior to notification''*
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  spider calendar lite  ==
 +
|RFI
 +
|180912
 +
|developer release version 1.5 [http://web-dorado.com/products/joomla-calendar-module.html  version]
 +
|-
 +
|
 +
 
 +
==  RokModule  ==
 +
|SQLi
 +
|Rereported 180912
 +
|Developer states: no known exploits for our current versions [http://www.rockettheme.com/extensions-downloads/free/1012-rokmodule of RokModule Joomla 2.5 - v1.3 Joomla 1.5 - v1.4]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  ICagenda  ==
 +
| SQLi
 +
|developer [http://www.joomlic.com/en/extensions/icagenda security release] - v1.2.1
 +
|080912
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
 
 +
==  En Masse cart  ==
 +
|RFI
 +
|060812
 +
|Developer upgrade statement [http://www.matamko.com/news-update/14-en-masse-releases/142-announcement-for-security-release-enmasse-313.html  to 3.1.3]
 +
|-
 +
|
 +
 
 +
==  JCE (joomla content editor)  ==
 +
|Upload Restriction <2.2.4
 +
|050812
 +
|Developer states current version not exploitable
 +
|-
 +
|
 +
 
 +
==  RSGallery2  ==
 +
|SQLi XSS
 +
| 31 07 12
 +
|Devleoper statement versions 3.2.0 for Joomla 2.5 and version 2.3.0 for Joomla 1.5  [http://www.rsgallery2.nl/topicseen./announcements/rsgallery2_3.2.0_and_2.3.0_released_16845.msg44046.html released]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  osproperty  ==
 +
|Unrestricted uploads
 +
|160712
 +
|Developer release [http://joomservices.com/components/ossolution-property.html version  2.0.3] 180712
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== KSAdvertiser    ==
 +
| RFI
 +
|160712
 +
|The security update version 1.5.72 advise can be found here:
 +
[http://www.kiss-software.de/index.php?option=com_content&view=article&id=251:kiss-advertiser-sicherheitsupdate&catid=69&Itemid=361&lang=de German] [http://www.kiss-software.de/index.php?option=com_content&view=article&id=252:kiss-advertiser-security-update&catid=21&Itemid=362&lang=en English]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  Shipping by State for Virtuemart  ==
 +
|elevated permissions (http://web-expert.gr/en)
 +
|160612
 +
| [http://web-expert.gr/en/commersial/virtuemart-shipping-by-state-component Upgrade to v2.5 download] commercial product 300612
 +
|-
 +
|style="background:red; color:white" |
 +
 
 +
==  ownbiblio 1.5.3  ==
 +
|SQLi +
 +
|250512
 +
|
 +
|-
 +
|
 +
 
 +
==  Ninjaxplorer <=1.0.6  ==
 +
|developer notification
 +
|250412
 +
|developer statement [http://ninjaforge.com/blog/318-security-vulnerability-discovered-in-ninjaxplorer-upgrade-immediately upgrade to 1.0.7]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== Phoca Fav Icon    ==
 +
|Permissions Rewrite
 +
|150412
 +
| [http://www.phoca.cz/news/30-phoca-news/633-phoca-favicon-203-released developer update 2.0.3 statement]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  estateagent improved  ==
 +
|sqli (eaimproved.eu)
 +
|110412
 +
|developer states previous version, not current version
 +
|-
 +
|
 +
 
 +
==  bearleague  ==
 +
|110412
 +
|sql
 +
|(no longer maintained)
 +
|-
 +
|
 +
 
 +
==  JLive! Chat v4.3.1  ==
 +
|DT
 +
|060412
 +
|Developer reports [http://www.cmsfruit.com/security-measures.html  as unproven]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  virtuemart 2.0.2  ==
 +
|SQLi
 +
|050412
 +
|developers [http://virtuemart.net/news/list-all-news/417-happy-easter-new-virtuemart-204-released-security-update-sqli release statement]Current version 2.0.6 released
 +
|-
 +
|
 +
 
 +
==  JE testimonial    ==
 +
|SQLi
 +
|230312
 +
|Developer states '''malicious report.'''
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  JaggyBlog  ==
 +
|excessive file permission
 +
|090212
 +
|version 1.3.1 [http://www.jaggysnake.co.uk/products/jaggyblog released]
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
==  Quickl Form  ==
 +
|xss
 +
|260112
 +
|
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
==  com_advert  ==
 +
|sqli - unknown developer
 +
|240112
 +
|
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== Joomla Discussions Component    ==
 +
|sqli
 +
|180112
 +
|Discussions 1.4.1 released  [http://www.codingfish.com/news/38-joomla/101-discussions-141-released developer statement]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== HD Video Share (contushdvideoshare)  ==
 +
|sqli
 +
|180112
 +
|updated [http://www.hdvideoshare.net version 2.2]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== Simple File Upload 1.3  ==
 +
|RFI
 +
|010112
 +
| Developer update [http://wasen.net/index.php?option=com_content&view=article&id=64:simple-file-upload-download&catid=40:project-simple-file-upload&Itemid=59  statement] to 1.3.5
 +
|-
 +
|
 +
 
 +
==    ==
 +
|
 +
|
 +
|
 +
|}<endFeed />
  
== November 2009 Compiled Vulnerability Reports. ==
+
== January 2011 - Jan 2012  Reported Vulnerable Extensions ==
 
  
Items are not in any particular order.
 
  
 +
'''Please check with the extension publisher in case of any questions over the security of their product.'''
 +
Report Vulnerable extensions either in the [[jforum:432]] security topic clearly marked with the first word in the title being ''Vulnerable Report'' where the security moderators or JSST team will respond or via email to the VEL team. For a guide to the [http://docs.joomla.org/Vulnerable_Extensions_List#Codes_used codes]
 +
*If you are seeing this page on any site other than [http://docs.joomla.org/Vulnerable_Extensions_List the Offical Joomla Documentation] you may be seeing an out of date version or experiencing [http://en.wikipedia.org/wiki/Plagiarism plagiary] and the links may not work properly
  
 +
<startFeed />
 
{| class="wikitable sortable" border="1"
 
{| class="wikitable sortable" border="1"
 
|-
 
|-
 
!  '''Extension'''
 
!  '''Extension'''
 
! class="unsortable"| '''Details'''
 
! class="unsortable"| '''Details'''
!  '''Reference Link'''
+
!  '''Date Added'''
! '''Extension Update Link'''
+
! class="unsortable" |'''Extension Update Link & Date'''
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
== Simple File Upload 1.3  ==
 +
|RFI
 +
|010112
 +
| Developer update [http://wasen.net/index.php?option=com_content&view=article&id=64:simple-file-upload-download&catid=40:project-simple-file-upload&Itemid=59  statement] to 1.3.5
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
== Dshop    ==
 +
|sqli (possibly dhrusya.com)
 +
|201111
 +
|
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
==  QContacts 1.0.6  ==
 +
|sqli
 +
|131211
 +
|
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
==  Jobprofile  1.0 ==
 +
|  SQL Injection Vulnerability
 +
|051211
 +
|
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
==  JX Finder 2.0.1  ==
 +
| XSS Vulnerabilities
 +
|011211
 +
|
 +
 
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
==  wdbanners  ==
 +
|Unknown Exploit
 +
|301111
 +
|
 +
|-
 +
|
 +
==  JB Captify Content  J1.5 and J1.7    ==
 +
|Security checks missing -Versions prior to JB_mod_captifyContent_J1.5_J1.7_1.0.1.zip
 +
|141111
 +
|All extensions available on the [http://joomlabamboo.com site have been updated] and this potential security issue has been resolved.
 +
|-
 +
|
 +
 
 +
==  JB Microblog  ==
 +
|Security checks missing - J1.7 only. Versions prior to 1.10.3
 +
|14111
 +
|All extensions available on the [joomlabamboo.com site have been updated] and this potential security issue has been resolved.
 +
|-
 +
|
 +
 
 +
== JB Slideshow <3.5.1,  ==
 +
|Security checks missing
 +
|141111
 +
|All extensions available on the [joomlabamboo.com site have been updated] and this potential security issue has been resolved.
 +
|-
 +
|
 +
 
 +
== JB Bamboobox  ==
 +
|Security checks missing - J1.5 all versions prior to 1.2.2
 +
|141111
 +
|All extensions available on the [joomlabamboo.com site have been updated] and this potential security issue has been resolved.
 +
|-
 +
|
 +
==  RokModule    ==
 +
|SQLI - exploits    RokStock RokWeather RokNewspager
 +
|121111
 +
|developer release statement [http://www.rockettheme.com/blog/extensions/1300-important-security-vulnerability-fixed    RokModule v1.3 for Joomla 1.7  RokModule v1.4 for Joomla 1.5]
 +
 
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  hm community  ==
 +
|Multiple Vulnerabilities
 +
|011111
 +
|developer release [http://joomlaextensions.co.in/product/HM-Community 1.01]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  Alameda  ==
 +
|SQLi
 +
|01111
 +
|developer statement [http://www.blueflyingfish.com/alameda/index.php?option=com_content&view=category&id=5&Itemid=28 and Latest version number v1.0.1.]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  Techfolio 1.0    ==
 +
|Techfolio 1.0 SQLI
 +
|291011
 +
|
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  Barter Sites 1.3  ==
 +
|Barter Sites 1.3 SQL Injection & Persistent XSS vulnerabilities
 +
|291011
 +
|developer [http://my.barter-sites.com/index.php?option=com_content&view=article&id=6&Itemid=25 release 1.3.1]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  Jeema SMS 3.2  ==
 +
|Jeema SMS 3.2 Multiple Vulnerabilities
 +
|291011
 +
|developer resolution notice [http://jeema.net/about-us/securty-releases.html for 3.5.2]
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
==  Vik Real Estate 1.0  ==
 +
|Vik Real Estate 1.0  Multiple Blind SqlI
 +
|291011
 +
|
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== yj contact    ==
 +
|LFI (youjoomla contact)
 +
|241011
 +
|developer update statement [http://www.youjoomla.com/yj-contact-us-1.0.1-released.html 261011]
 +
 
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  NoNumber Framework  ==
 +
| Advanced Module Manager * AdminBar Docker * Add to Menu * Articles Anywhere * What? Nothing!* Tooltips* Tabber* Sourcerer* Slider* Timed Styles* Modules Anywhere* Modalizer* ReReplacer* Snippets* DB Replacer* CustoMenu* Content Templater* CDN for Joomla!* Cache Cleaner* Better Preview
 +
|181011
 +
|see http://feeds.feedburner.com/nonumber/news for updates of various extensions
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
== Time Returns    ==
 +
|SQLi takeaweb.it
 +
|151011
 +
|No longer developed. New version 2.0.1 for Joomla 1.6/1.7 (old version are no longer supported) http://www.takeaweb.it
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== Simple File Upload  ==
 +
|LFI
 +
|300811
 +
|developer advice [http://wasen.net/index.php?option=com_content&view=article&id=64&Itemid=59 page]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== Jumi    ==
 +
|LFI
 +
|300811
 +
|Developer states proper use of joomla administration/extension documentation reading
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== Joomla content editor    ==
 +
|JCE lfi/rfi vulnerability
 +
|
 +
|JCE 2.0.11 and JCE 1.5.7.14 [http://www.joomlacontenteditor.net/news/item/jce-2011-released have been released]
 +
 
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  Google Website Optimizer  ==
 +
|Numerous vulnerabilities. Website Optimizer, Pearl Group
 +
|290811
 +
|developer update [http://www.pearl-group.com/optimizer-changelog statement to ver. 1.4.0]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  Almond Classifieds  ==
 +
|777 Folder settings (all folders it uses are set to 777 including previously 755 locked folders)
 +
|260811
 +
|developer resolution [http://www.almondsoft.com/acj/ notice]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== joomtouch    ==
 +
|LFI/RFI
 +
|180811
 +
|developers [http://www.joomtouch.com/ultime/4-risolta-la-vulnerabilita-di-joomtouch.html resolution notice  1.0.3]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  RAXO All-mode PRO  ==
 +
|Timthumb  RFI
 +
|110811
 +
|[http://raxo.org/forum/viewtopic.php?f=2&t=60#p2056 developer upgrade 1.5.0 statement]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  V-portfolio  ==
 +
|DT - open folders
 +
|110811
 +
| [http://vsmart-extensions.com/index.php?option=com_content&view=article&id=61 developer resolution statement]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== obSuggest    ==
 +
|LFI
 +
|310711
 +
|developer [http://foobla.com/news/latest/obsuggest-1.8-security-release.html release statement]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== Simple Page    ==
 +
|LFI
 +
|230711
 +
|developer update [http://omar84.com/latest-news/65-simple-page-options-1517-security-release statement] v1.5.17 has been released
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  JE Story  ==
 +
|LFI
 +
|230711
 +
|[http://joomlaextensions.co.in/extensions/components/je-story-submit.html devloper security update] notice to ver 1.9
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  appointment booking pro  ==
 +
|LFI 22071
 +
|
 +
|[http://appointmentbookingpro.com/index.php?option=com_kunena&Itemid=66&func=view&catid=25&id=8129#8129 developer update security announcement] Current 2.0.1 and 1.4.x versions, are '''not''' vulnerable,
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
==  acajoom  ==
 +
|xss (admin permission required)
 +
|220711
 +
|updated to 5.20
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  gTranslate  ==
 +
|ID -
 +
|220711
 +
|[http://edo.webmaster.am/gtranslate-changelog developer security release] 1.5 x.25 and 1.6 x.26.
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
==  alpharegistration    ==
 +
|http://www.alphaplug.com/ Please contact the developer for any questions on this extension
 +
|170711 220711
 +
|
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== Jforce    ==
 +
|DT -
 +
|170711
 +
| [http://www.jforce.com/blog/270-jforce-security-release.html developer states The new version number v1.5r1362 resolves the problem]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  Flash Magazine Deluxe Joomla  ==
 +
|ID [http://www.joomplace.com/joomla-components/flash-magazine-deluxe-component.html multiple vulnerabilities]
 +
|170711
 +
|[http://www.joomplace.com/news-blog/flashmagazine-deluxe-2-1-4-security-release.html developer release] 2.1.4
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== AVreloaded    ==
 +
|SQLi - version 1.2.6
 +
|150711
 +
|[http://allvideos.fritz-elfert.de/ 1.2.7 released developer release statement 160711]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
==  Sobi  ==
 +
|SQLI -
 +
|130711
 +
|[http://www.sigsiu.net/changelog developer fix and update statement]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  fabrik  ==
 +
|sqli
 +
|120711
 +
|[http://fabrikar.com/downloads/details/36/89 Developers Update statement 2.1]
 +
|-
 +
|
 +
 
 +
==  xmap  ==
 +
|sqli 1.2.11
 +
|120711
 +
|upgrade to 1.2.12
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== Atomic Gallery    ==
 +
|Creates 777 folders [http://www.atomicon.nl/atomicongallery Atomic gallery]
 +
|110711
 +
|developer [http://www.atomicon.nl/atomicongallery#changelog release statement/changelog]
 +
|-
 +
|
 +
 
 +
==  myApi  ==
 +
|ID [http://extensions.joomla.org/component/mtree/social-web/facebook-integration/11624 Contains "Call-Home" function. Sends private user information to developer.]
 +
|020711
 +
|[http://www.myapi.co.uk/ Developer states Use version 1.3.4.1]
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
==  mdigg  ==
 +
|SQL I (not listed in JED)
 +
|020711
 +
|
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  Calc Builder  ==
 +
|sqli + ID
 +
|180611
 +
| [http://components.moonsoft.es/downloadcalcbuilder  dev security release 0.0.2]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== Cool Debate    ==
 +
|Cool Debate 1.03 LFI
 +
|
 +
| version [http://www.acoolsip.com/development/a-cool-debate.html 1.0.8 released.]
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
==    ==
 +
|
 +
|
 +
|
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  Scriptegrator Plugin 1.5.5==
 +
|LFI
 +
|140611
 +
| [http://www.greatjoomla.com/news/index.html  Update - Core Design Scriptegrator plugin 2.0.9 &] 1.5.6
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  Joomnik Gallery  ==
 +
|SQLi
 +
|
 +
|[http://joomlacode.org/gf/project/joomnik/ developer update to 0.9.1]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  JMS fileseller  ==
 +
|LFI
 +
|0611
 +
|[http://joommasters.com/commercial-extensions/components/jms-fileseller.html developer upgrade announcement to v1.1]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  sh404SEF  ==
 +
|low-level XSS security issue
 +
|300511
 +
|[http://dev.anything-digital.com/Forum/Announcements/11147-sh404SEF-2.2.6-now-available-for-Joomla-1.5/ Dev upgrade statement to 2.2.6]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  JE Story submit    ==
 +
|LFI/RFI
 +
|
 +
|[http://joomlaextensions.co.in/extensions/modules/je-content-menu.html?page=shop.product_details&flypage=flypage.tpl&product_id=77&category_id=13&vmcchk=1 developer states Version 1.8]
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
==  FCKeditor  ==
 +
|File Upload Vulnerability
 +
|230511
 +
|
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
== KeyCaptcha    ==
 +
|ID
 +
|190511
 +
|
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
==  Ask A Question AddOn v1.1  ==
 +
|SQLi
 +
|160511
 +
|
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== Global Flash Gallery    ==
 +
|flash-gallery.com xss
 +
|130511
 +
|[http://flash-gallery.com/help/joomla-extension/faq/security-update-0.5.0/ dev release 0.5.0 statement]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== com_google    ==
 +
|LFI [http://freejoomlacomponent.appspot.com/ com_google]
 +
|080511
 +
|[http://freejoomlacomponent.appspot.com/securityrelease.html devs update to 1.5.1]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  docman  ==
 +
|com-docman Input Validation Error
 +
|160511
 +
|[http://forum.joomla.org/viewtopic.php?p=2502904#p2502904 devs resolution statement, report for old version]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  Newsletter Subscriber    ==
 +
|XSS
 +
|120511
 +
|[http://mavrosxristoforos.com/joomla-extensions/free/newsletter-subscriber Deveopler update]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  Akeeba  ==
 +
|akkeba backup and joomlapack
 +
|170411
 +
|[https://www.akeebabackup.com/home/item/1091-akeeba-backup-3-2-7.html dev update to 3.2.7]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  Facebook Graph Connect  ==
 +
|SID. call home device with user credentials
 +
|120411
 +
|[http://www.sikkimonline.info/security-notice dev update notice]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== booklibrary    ==
 +
|SQLi ordasoft booklibrary
 +
|180311
 +
|[http://ordasoft.com/Book-Library/security-upgrade-instructions-for-book-library.html developer upgrade instructions]
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
== semantic    ==
 +
|com semantic http://www.scms.es/joomla creates hidden admin users
 +
|150311
 +
|
 +
|-
 +
|
 +
 
 +
==  JOMSOCIAL 2.0.x 2.1.x  ==
 +
|SID, open folders
 +
|120311
 +
|
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  flexicontent  ==
 +
|forced 777, malicious files
 +
|250311
 +
|[http://www.flexicontent.org/home/item/192-flexicontent-154-is-finally-out.html devs resolve statement], [http://www.flexicontent.org/downloads/latest-version.html Changelog]
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
== jLabs Google Analytics Counter    ==
 +
|jLabs Google Analytics Counter  SID
 +
|
 +
|
 
|-
 
|-
style="background:red; color:white"  | '''com_ajaxchat'''
+
|
| Summary: PHP remote file inclusion vulnerability in Fiji Web Design Ajax Chat ('''com_ajaxchat''') component 1.0 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[mosConfig_absolute_path] parameter to tests/ajcuser.php.
+
== xcloner  ==
Published: october 28 2009
+
|Unspecified
|  [[NIST:CVE-2009-3822|CVE-2009-3822]]
+
|260211
|  style="background:red; color:white"  | '''Not Known'''
+
|[http://www.xcloner.com/xcloner-news/important-security-upgrade/ dev announcement of security release]
 
|-
 
|-
| style="background:red; color:white" | '''com_booklibrary'''
+
|style="background:#cef2e0; color:black" |
| PHP remote file inclusion vulnerability in doc/releasenote.php in the BookLibrary ('''com_booklibrary''') component 1.0 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter, a different vector than [[NIST:CVE-2009-2637|CVE-2009-2637]]. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
+
 
Published: 10/28/2009
+
== smartformer    ==
CVSS Severity: 7.5 (HIGH)
+
|RFI
|  [[NIST:CVE-2009-3817|CVE-2009-3817]]
+
|230211 (repeat of 041110)
|  style="background:red; color:white"  | '''Not Known'''
+
|[http://www.itoris.com/joomla-form-builder-smartformer.html v2.4.1 security fix for Joomla 1.5.x]
 
|-
 
|-
| style="background:red; color:white" | '''com_foobla_suggestions'''
+
|style="background:#cef2e0; color:black" |
|  Summary: SQL injection vulnerability in the foobla Suggestions ('''com_foobla_suggestions''') component 1.5.11 for Joomla! allows remote attackers to execute arbitrary SQL commands via the idea_id parameter to index.php.
+
 
Published: 10/11/2009
+
== xmap 1.2.10    ==
CVSS Severity: 7.5 (HIGH)
+
|Malicious payload in zip
| [[NIST:CVE-2009-3669|CVE-2009-3669]]
+
|230211
|  style="background:red; color:white"  | '''Not Known'''
+
|[http://joomla.vargas.co.cr/en/news/4-xmap/95-security-notice developer resolution notic]e Clean version available from [http://joomlacode.org/gf/project/xmap/frs/ joomlacode]  
 
|-
 
|-
| style="background:red; color:white| '''com_djcatalog'''
+
|style="background:#cef2e0; color:black" |
| Summary: Multiple SQL injection vulnerabilities in the DJ-Catalog ('''com_djcatalog''') component for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) id parameter in a showItem action and (2) cid parameter in a show action to index.php.
+
 
Published: 10/11/2009
+
==  Frontend-User-Access 3.4.1 ==
CVSS Severity: 6.8 (MEDIUM)
+
|Frontend-User-Access 3.4.1 from http://www.pages-and-items.com LFI
| [[NIST:CVE-2009-3661|CVE-2009-3661]]
+
|030211
|  style="background:red; color:white"  | '''Not Known'''
+
|update to [http://extensions.joomla.org/extensions/access-a-security/frontend-access-control/6874 Frontend-User-Access 3.4.2]
 
|-
 
|-
| style="background:#cef2e0; color:black" | '''com_cbresumebuilder'''
+
|style="background:#cef2e0; color:black" |
| Summary: SQL injection vulnerability in the JoomlaCache CB Resume Builder (''''''com_cbresumebuilder''') component for Joomla! allows remote attackers to execute arbitrary SQL commands via the group_id parameter in a group_members action to index.php.
+
 
Published: 10/09/2009
+
== com properties 7134  ==
CVSS Severity: 7.5 ('''HIGH''')
+
| http://com-property.com/ malicious files in script
| [[NIST:CVE-2009-3645|CVE-2009-3645]]
+
|
| style="background:#cef2e0; color:white"  |'''[http://www.joomlacache.com/commercial-extensions/security-update.html Update]'''
+
|[http://joomlacode.org/gf/project/property/frs/?action=FrsReleaseBrowse&frs_package_id=5815 Dev update statement]
 +
 
 
|-
 
|-
| style="background:red; color:white"  |  '''com_soundset'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in the Soundset ('''com_soundset''') component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the cat_id parameter to index.php.
+
 
Published: 10/09/2009
+
== B2 Portfolio ==
CVSS Severity: 7.5 ('''HIGH''')
+
|B2 portfolio 1.0 SQLi pulseextensions.com
|  [[NIST:CVE-2009-3644|CVE-2009-3644]]
+
|250111
| style="background:red; color:white"  |  '''Not Known'''
+
|
 
|-
 
|-
| style="background:red; color:white|'''com_sportfusion'''
+
|style="background:#cef2e0; color:black" |
| Summary: SQL injection vulnerability in the Kinfusion SportFusion ('''com_sportfusion''') component 0.2.2 through 0.2.3 for Joomla! allows remote attackers to execute arbitrary SQL commands via the cid[0] parameter in a teamdetail action to index.php.
+
 
Published: 09/30/2009
+
== allcinevid  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|SQLI http://extensions.joomla.org/extensions/multimedia/multimedia-players/video-players-a-gallery/15367
| [[NIST:CVE-2009-3491|CVE-2009-3491]]
+
|220111
|  style="background:red; color:white"  |'''Not Known'''
+
|[http://www.joomtraders.com/our-blog/allcinevid-1.0-sql-injection.html Developers resolution notice]
 
|-
 
|-
| style="background:red; color:white"  | '''com_icrmbasic'''
+
|style="background:red; color:white"  |
| Summary: A certain interface in the iCRM Basic ('''com_icrmbasic''') component 1.4.2.31 for Joomla! does not require administrative authentication, which has unspecified impact and remote attack vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
+
 
Published: 09/30/2009
+
== People Component    ==
CVSS Severity: 7.5 ('''HIGH''')
+
|People component http://www.ptt-solution.com/vmchk/people-component.html sqli
| [[NIST:CVE-2009-3481|CVE-2009-3481]]
+
|150111
| style="background:red; color:white"  | '''Not Known'''
+
|
 
|-
 
|-
| style="background:red; color:white"  | '''com_mytube'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in the MyRemote Video Gallery ('''com_mytube''') component 1.0 Beta for Joomla! allows remote attackers to execute arbitrary SQL commands via the user_id parameter in a videos action to index.php.
+
 
Published: 09/28/2009
+
== Jimtawl    ==
CVSS Severity: 7.5 ('''HIGH''')
+
|Jimtawl LFI
| [[NIST:CVE-2009-3446|CVE-2009-3446]]
+
|251110
|  style="background:red; color:white"  | '''Not Known'''
+
|
 +
 
 
|-
 
|-
| style="background:red; color:white"  | '''com_fastball'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in the Fastball ('''com_fastball''') component 1.1.0 through 1.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the league parameter to index.php.
+
 
Published: 09/28/2009
+
==  Maian Media SILVER  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|Maian Media SQLi
|  [[NIST:CVE-2009-3443|CVE-2009-3443]]
+
|151110
|  style="background:red; color:white"  | '''Not Known'''
+
|Developer states unproven in free edition, paid/SILVER version is being upgraded. [http://www.aretimes.com/index.php?option=com_content&view=category&layout=blog&id=40&Itemid=113 dev article]
 
|-
 
|-
| style="background:red; color:white"  | '''com_facebook'''
+
|style="background:#cef2e0; color:black" |
| Summary: SQL injection vulnerability in the JoomlaFacebook ('''com_facebook''') component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a student action to index.php.
+
 
Published: 09/28/2009
+
== alfurqan  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|alfurqan 1.5 sqli
|  [[NIST:CVE-2009-3438|CVE-2009-3438]]
+
|151110
|  style="background:red; color:white"  | '''Not Known'''
+
|developer update [http://forums.islamis4u.com/index.php/topic%2c83.0.html statement]  
 
|-
 
|-
| style="background:red; color:white| '''com_tupinambis'''
+
|style="background:#cef2e0; color:black" |
| Summary: SQL injection vulnerability in the Tupinambis ('''com_tupinambis''') component 1.0 for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the proyecto parameter in a verproyecto action to index.php.
+
 
Published: 09/28/2009
+
== ccboard  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|[http://extensions.joomla.org/extensions/communication/forum/6823 ccboard XSS and SQLi]
| [[NIST:CVE-2009-3434|CVE-2009-3434]]
+
|131110
|  style="background:red; color:white"  | '''Not Known'''
+
| on my site at [http://codeclassic.org/component/content/article/1-latest-news/83-ccboard-13-released.html] Please find the respective update information
 +
 
 
|-
 
|-
| style="background:#cef2e0; color:black"  |'''com_idoblog'''
+
|style="background:red; color:white"  |
|  Summary: SQL injection vulnerability in the IDoBlog ('''com_idoblog''') component 1.1 build 30 for Joomla! allows remote attackers to execute arbitrary SQL commands via the userid parameter in a profile action to index.php, a different vector than [[NIST:CVE-2008-2627|CVE-2008-2627]].
+
 
Published: 09/25/2009
+
==  ProDesk v 1.5 ==
CVSS Severity: 7.5 ('''HIGH''')
+
|LFI
| [[NIST:CVE-2009-3417|CVE-2009-3417]]
+
|091110
| style="background:#cef2e0; color:white" |'''[http://idojoomla.com/download.html/ '''New Version v 1.1''' (build 32)]'''
+
|
 +
 
 +
 
 
|-
 
|-
| style="background:red; color:white| '''com_hbssearch'''
+
|style="background:#cef2e0; color:black" |
| Summary: Cross-site scripting ('''XSS''') vulnerability in the Hotel Booking Reservation System ('''aka HBS or com_hbssearch''') component for Joomla! allows remote attackers to inject arbitrary web script or HTML via the adult parameter in a showhoteldetails action to index.php.
+
 
Published: 09/24/2009
+
== sponsorwall  ==
CVSS Severity: 4.3 ('''MEDIUM''')
+
|SQL injection pulseextensions.com
|  [[NIST:CVE-2009-3368|CVE-2009-3368]]
+
|011110
|  style="background:red; color:white"  | '''Not Known'''
+
|developer [http://demo.pulseextensions.com/sponsor-wall.html resolution notice]
 
|-
 
|-
| style="background:red; color:white| '''com_hbssearch'''
+
|style="background:#cef2e0; color:black" |
| Summary: Multiple SQL injection vulnerabilities in the Hotel Booking Reservation System ('''aka HBS or com_hbssearch''') component for Joomla! allow remote attackers to execute arbitrary SQL commands via the ('''1''') h_id, ('''2''') id, and ('''3''') rid parameters to longDesc.php, and the h_id parameter to ('''4''') detail.php, ('''5''') detail1.php, ('''6''') detail2.php, ('''7''') detail3.php, ('''8''') detail4.php, ('''9''') detail5.php, ('''10''') detail6.php, ('''11''') detail7.php, and ('''12''') detail8.php, different vectors than [[NIST:CVE-2008-5865|CVE-2008-5865]], [[NIST:CVE-2008-5874|CVE-2008-5874]], and [[NIST:CVE-2008-5875|CVE-2008-5875]].
+
 
Published: 09/24/2009
+
 
CVSS Severity: 7.5 ('''HIGH''')
+
== Flip wall  ==
|  [[NIST:CVE-2009-3357|CVE-2009-3357]]
+
|SQL injection pulseextensions.com
|  style="background:red; color:white"  | '''Not Known'''
+
|011110
 +
| developer http://demo.pulseextensions.com/flip-wall.html update notice  [http://www.example.com link title]
 
|-
 
|-
| style="background:#cef2e0; color:black" |'''com_alphauserpoints'''
+
|style="background:#cef2e0; color:black" |
|  Summary: SQL injection vulnerability in frontend/assets/ajax/checkusername.php in the AlphaUserPoints ('''com_alphauserpoints''') component 1.5.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the username2points parameter.
+
 
Published: 09/24/2009
+
== Freestyle FAQ 1.5.6    ==
CVSS Severity: 7.5 ('''HIGH''')
+
|http://freestyle-joomla.com/fssdownloads/viewcategory/2 Freestyle FAQ 1.5.6 ‎SQL Injection
| [[NIST:CVE-2009-3342|CVE-2009-3342]]
+
|
| style="background:#cef2e0; color:white"  |'''[http://www.alphaplug.com/index.php/news/142-alphauserpoints-153-released.html 1.5.3]'''
+
|[http://freestyle-joomla.com/index.php?announceid=43 new version (1.9.0) is available which fixes] the security issues.
 +
 
 
|-
 
|-
| style="background:red; color:white"  | '''TurtuShout'''
+
|style="background:red; color:white"  |
|  Summary: SQL injection vulnerability in the TurtuShout component 0.11 for Joomla! allows remote attackers to execute arbitrary SQL commands via the Name field.
+
 
Published: 09/24/2009
+
==  iJoomla Magazine 3.0.1  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|iJoomla Magazine 3.0.1 RFI
| [[NIST:CVE-2009-3335|CVE-2009-3335]]
+
|090910
| style="background:red; color:white"  | '''Not Known'''
+
|
 
|-
 
|-
| style="background:red; color:white"  | '''com_jinc'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in the Lhacky! Extensions Cave Joomla! Integrated Newsletters Component ('''aka JINC or com_jinc''') component 0.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the newsid parameter in a messages action to index.php.
+
 
Published: 09/23/2009
+
==  Clantools  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|  
| [[NIST:CVE-2009-3334|CVE-2009-3334]]
+
|http://www.joomla-clantools.de/downloads/doc_download/7-clantools-123.html clantool sqli
| style="background:red; color:white"  | '''Not Known'''
+
|090910
 +
|
 
|-
 
|-
| style="background:red; color:white"  | '''com_jbudgetsmagic'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in the JBudgetsMagic ('''com_jbudgetsmagic''') component 0.3.2 through 0.4.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the bid parameter in a mybudget action to index.php.
+
 
Published: 09/23/2009
+
== jphone  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|jphone LFI
| [[NIST:CVE-2009-3332|CVE-2009-3332]]
+
|090910
|  style="background:red; color:white"  | '''Not Known'''
+
|
 +
 
 
|-
 
|-
| style="background:red; color:white| '''com_surveymanager'''
+
|style="background:#cef2e0; color:black" |
| Summary: SQL injection vulnerability in the Focusplus Developments Survey Manager ('''com_surveymanager''') component 1.5.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the stype parameter in an editsurvey action to index.php.
+
== PicSell    ==
Published: 09/23/2009
+
|[http://vm.xmlswf.com/index.php?option=com_content&view=article&id=104&Itemid=131Picsell LFD, 777]
CVSS Severity: 7.5 ('''HIGH''')
+
|020910
| [[NIST:CVE-2009-3325|CVE-2009-3325]]
+
|new version [http://vm.xmlswf.com/picsell released 150312] version number 11
|  style="background:red; color:white"  | '''Not Known'''
+
 
 
|-
 
|-
| style="background:red; color:white"  | '''com_album'''
+
|style="background:red; color:white"  |
|  Summary: Directory traversal vulnerability in the Roland Breedveld Album ('''com_album''') component 1.14 for Joomla! allows remote attackers to access arbitrary directories and have unspecified other impact via a .. ('''dot dot''') in the target parameter to index.php.
+
 
Published: 09/23/2009
+
==  Zoom Portfolio  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|SID
| [[NIST:CVE-2009-3318|CVE-2009-3318]]
+
|020910
| style="background:red; color:white"  | '''Not Known'''
+
|
 
|-
 
|-
| style="background:red; color:white"  | '''com_jreservation'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in the JReservation ('''com_jreservation''') component 1.0 and 1.5 for Joomla! allows remote attackers to execute arbitrary SQL commands via the pid parameter in a propertycpanel action to index.php.
+
 
Published: 09/23/2009
+
==  zina  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|[http://www.pancake.org/zina/ SQL Injection]
| [[NIST:CVE-2009-3316|CVE-2009-3316]]
+
|020910
| style="background:red; color:white"  | '''Not Known'''
+
|
 
|-
 
|-
| style="background:red; color:white"  | '''IXXO Cart Standalone'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in IXXO Cart Standalone before 3.9.6.1, and the IXXO Cart component for Joomla! 1.0.x, allows remote attackers to execute arbitrary SQL commands via the parent parameter.
+
 
Published: 09/16/2009
+
==  Team's  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|[http://www.joomlamo.com Teams extension] SQL Injection
|  [[NIST:CVE-2009-3215|CVE-2009-3215]]
+
|120810
| style="background:red; color:white"  | '''Not Known'''
+
|
 
|-
 
|-
| style="background:red; color:white"  | '''com_digifolio'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in the DigiFolio ('''com_digifolio''') component 1.52 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a project action to index.php.
+
 
Published: 09/15/2009
+
==  Amblog    ==
CVSS Severity: 7.5 ('''HIGH''')
+
|[http://robitbt.hu/jm/index.php?option=com_amdownloader&task=showfiles&pathid=8 Amblog] SQLi
|  [[NIST:CVE-2009-3193|CVE-2009-3193]]
+
|120810
| style="background:red; color:white"  | '''Not Known'''
+
|
 
|-
 
|-
| style="background:red; color:white"  | '''com_aclassf'''
+
|style="background:red; color:white"  |
|  Summary: Cross-site scripting ('''XSS''') vulnerability in '''gmap.php''' in the Almond Classifieds ('''com_aclassf''') component 7.5 for Joomla! allows remote attackers to inject arbitrary web script or HTML via the addr parameter.
+
 
Published: 09/10/2009
+
==    ==
CVSS Severity: 4.3 ('''MEDIUM''')
+
|
| [[NIST:CVE-2009-3155|CVE-2009-3155]]
+
|
| style="background:red; color:white"  | '''Not Known'''
+
|
 
|-
 
|-
| style="background:red; color:white"  | '''com_aclassf'''
+
|
| Summary: SQL injection vulnerability in the Almond Classifieds ('''com_aclassf''') component 7.5 for Joomla! allows remote attackers to execute arbitrary SQL commands via the replid parameter in a manw_repl add_form action to index.php, a different vector than [[NIST:CVE-2009-2567|CVE-2009-2567]].
+
==    ==
Published: 09/10/2009
+
|
CVSS Severity: 7.5 ('''HIGH''')
+
|
| [[NIST:CVE-2009-3154|CVE-2009-3154]]
+
|
| style="background:red; color:white"  | '''Not Known'''
 
 
|-
 
|-
| style="background:red; color:white"  | '''com_jabode'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in Jabode horoscope extension ('''com_jabode''') for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a sign task to index.php.
+
 
Published: 09/08/2009
+
==  wmtpic  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|www.webmaster-tips.net various
 +
|010710
 +
|
 +
 
  
|  [[NIST:CVE-2008-7169|CVE-2008-7169]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
 
|-
 
|-
| style="background:red; color:white"  | '''com_gameserver'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in the Game Server ('''com_gameserver''') component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a gamepanel action to index.php.
+
 
Published: 09/03/2009
+
== Jomtube    ==
CVSS Severity: 7.5 ('''HIGH''')
+
|http://www.jomtube.com/ SID
| [[NIST:CVE-2009-3063|CVE-2009-3063]]
+
|220710
| style="background:red; color:white"  | '''Not Known'''
+
|
 +
|
 
|-
 
|-
| style="background:red; color:white"  | '''com_artportal'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in the Artetics.com Art Portal ('''com_artportal''') component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the portalid parameter to index.php.
+
 
Published: 09/03/2009
+
== Rapid Recipe    ==
CVSS Severity: 7.5 ('''HIGH''')
+
|http://www.rapid-source.com Persistent XSS Vulnerability last known fix version 1.7.2
| [[NIST:CVE-2009-3054|CVE-2009-3054]]
+
|july 10,2010
| style="background:red; color:white"  | '''Not Known'''
+
|
 
|-
 
|-
| style="background:#cef2e0; color:black" | '''com_agora'''
+
|style="background:red; color:white" |
| Summary: Directory traversal vulnerability in the Agora ('''com_agora''') component 3.0.0b for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the action parameter to the avatars page, reachable through index.php.
+
 
Published: 09/03/2009
+
==  Health & Fitness Stats  ==
CVSS Severity: 6.8 ('''MEDIUM''')
+
|http://joomla-extensions.instantiate.co.uk/jcomponents/healthstats Persistent XSS Vulnerability july 10,2010
| [[NIST:CVE-2009-3053|CVE-2009-3053]]
+
|
| style="background:#cef2e0; color:white" |'''[http://jvitals.com/index.php?option=com_rokdownloads&view=file&Itemid=108&id=282:agora-3-0 3.0.7]'''
+
|
 
|-
 
|-
| style="background:red; color:white"  | '''com_simpleshop'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in the Simple Shop Galore ('''com_simpleshop''') component for Joomla! allows remote attackers to execute arbitrary SQL commands via the section parameter in a section action to index.php, a different vulnerability than [[NIST:CVE-2008-2568|CVE-2008-2568]]. NOTE: this issue was disclosed by an unreliable researcher, so the details might be incorrect.
+
 
Published: 08/24/2009
+
 
CVSS Severity: 7.5 ('''HIGH''')
+
==  staticxt  ==
|  [[NIST:CVE-2008-7033|CVE-2008-7033]]
+
|http://extensions.joomla.org/extensions/edition/custom-code-in-content/2184  no version number provided
| style="background:red; color:white"  | '''Not Known'''
+
|
 +
|
 +
 
 +
 
 
|-
 
|-
| style="background:red; color:white"  | '''com_groups'''
+
|style="background:red; color:white"  |
|  Summary: SQL injection vulnerability in the Permis ('''com_groups''') component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a list action to index.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
 
Published: 08/17/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-2789|CVE-2009-2789]]
 
style="background:red; color:white"  | '''Not Known'''
 
  
 +
==  quickfaq  ==
 +
|http://www.schlu.net sqli
 +
|090710
 +
|
 
|-
 
|-
| style="background:#cef2e0; color:black" | '''com_content'''
+
|style="background:red; color:white" |
| Summary: SQL injection vulnerability in the content component ('''com_content''') 1.0.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the Itemid parameter in a blogcategory action to index.php.
+
 
Published: 08/10/2009
+
==    Minify4Joomla ==
CVSS Severity: 7.5 ('''HIGH''')
+
|http://waltercedric.com/ LFI and xss
| [[NIST:CVE-2008-6923|CVE-2008-6923]]
+
|090710
| style="background:#cef2e0; color:white"  |'''[http://developer.joomla.org/security/news/305-20091103-core-front-end-editor-issue-.html Resolution]'''
+
|No longer available to download
 
|-
 
|-
| style="background:red; color:white" | '''com_livechat'''
+
|style="background:#cef2e0; color:black" |
| Summary: SQL injection vulnerability in the Live Chat ('''com_livechat''') component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the last parameter to getChatRoom.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
+
 
Published: 07/30/2009
+
==  IXXO Cart  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|http://www.php-shop-system.com/ SQLi LFI XSS Vulnerability
| [[NIST:CVE-2008-6883|CVE-2008-6883]]
+
|
|  style="background:red; color:white"  | '''Not Known'''
+
|developer resolution [http://support.ixxoglobal.com/index.php?/News/NewsItem/View/22/ixxo-cart-new-release-v41190 notice]  
 +
 
 
|-
 
|-
| style="background:red; color:white"  | '''com_livechat'''
+
|style="background:red; color:white"  |
| Summary: Live Chat ('''com_livechat''') component 1.0 for Joomla! allows remote attackers to use the xmlhttp.php script as an open HTTP proxy to hide network scanning activities or scan internal networks via a GET request with a full URL in the query string.
+
 
Published: 07/30/2009
+
==  PaymentsPlus  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|http://paymentsplus.com.au/ 2.1.5 Blind SQL Injection Vulnerability
| [[NIST:CVE-2008-6882|CVE-2008-6882]]
+
|090710
| style="background:red; color:white"  | '''Not Known'''
+
|current version 2.20, 2.1.5 not listed on dev site
 
|-
 
|-
| style="background:red; color:white"  | '''com_livechat'''
+
|style="background:red; color:white"  |
| Summary: Multiple SQL injection vulnerabilities in the Live Chat ('''com_livechat''') component 1.0 for Joomla! allow remote attackers to execute arbitrary SQL commands via the last parameter to ('''1''') getChat.php, ('''2''') getChatRoom.php, and ('''3''') getSavedChatRooms.php.
+
 
Published: 07/30/2009
+
==  ArtForms  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|http://joomlacode.org/gf/project/jartforms/ ArtForms 2.1b7.2 RC2 Multiple Remote Vulnerabilities
| [[NIST:CVE-2008-6881|CVE-2008-6881]]
+
|090710
|  style="background:red; color:white"  | '''Not Known'''
+
| Old beta extension
 +
 
 
|-
 
|-
| style="background:#cef2e0; color:black"  |'''JUMI'''
+
|style="background:red; color:white"  |
| There is a backdoor in JUMI that installs itself when JUMI is installed on your web site. It sends your credentials to a website, and sets up a back door for remote code execution.
+
 
Please remove JUMI2.0.5 from the download page immediately to stop people falling victim to this.
+
== autartimonial  ==
It will be simple enough to remove the compromised code from this download, but you need to do
+
|autartica.be Sqli Vulnerability
a full security audit on your site as well as you have been compromised. Added November 2009
+
|060710
| [http://code.google.com/p/jumi/updates/list Report]
+
|
|  style="background:#cef2e0; color:white"  |[http://code.google.com/p/jumi/updates/list Jumi Update]
+
 
 +
 
 +
 
 +
 
 
|-
 
|-
| style="background:#cef2e0; color:black"  |'''com_photoblog'''
+
|style="background:red; color:white"  |
|  Input Validation Error Added November 2009
+
 
| [http://www.securityfocus.com/bid/36809/ 36809]
+
== eventcal 1.6.4    ==
|  style="background:#cef2e0; color:white"  |[http://webguerilla.net/downloads/3-components-for-joomla-1 webguerilla Photoblog alpha 3b]
+
|http://joomlacode.org/gf/project/eventcal/frs/ SQL I  last update 2006-12-31 on joomlacode
 +
|040710
 +
|
 +
 
 +
 
 +
 
 +
 
 
|-
 
|-
| style="background:red; color:white"  | '''com_jshop'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in the JShop ('''com_jshop''') component for Joomla! allows remote attackers to execute arbitrary SQL commands via the pid parameter in a product action to index.php.
+
 
Published: 11/02/2009
+
== date converter    ==
CVSS Severity: 7.5 '''(HIGH)'''
+
|http://sourceforge.net/projects/date-converter/ sqli
| [[NIST:CVE-2009-3835|CVE-2009-3835]]
+
|010710
|  style="background:red; color:white"  | '''Not Known'''
+
|
 +
 
 +
 
 
|-
 
|-
| style="background:#cef2e0; color:black" |'''BF Survey Pro'''
+
|style="background:red; color:white" |
|  Summary: SQL injection vulnerability in the '''BF Survey Pro''' v1.2.5 or lower  (fixed in version 1.2.6). '''BF Survey Basic v1.0''' (fixed in version 1.1). '''BF Quiz v1.1.1''' (fixed in version 1.2 or greater) Added November 2009
+
 
| [http://www.tamlyncreative.com.au/software/forum/index.php?topic=357.0 tamlyncreative.com.au]
+
== real estate    ==
| style="background:#cef2e0; color:white"  |[http://www.tamlyncreative.com.au/software/forum/index.php?topic=357.0 update]
+
|http://www.opensourcetechnologies.com/demos/real-estate.html RFI
 +
|210610
 +
|
 +
 
 +
 
 
|-
 
|-
| style="background:#cef2e0; color:black" |'''Joo!BB 0.9.1 '''
+
|style="background:red; color:white" |
| Summary: Persistent XSS/MySQL Injection vulnerabilities in Joo!BB 0.9.1 Added November 2009
+
 
| [http://www.joobb.org/community/board/topic/700-MultipleXSSSQLInjectionVulnerabilities.html joob.org]
+
== cinema  ==
| style="background:#cef2e0; color:white" |[http://www.joobb.org/downloads/components.html update]
+
|SQL injection
 +
|190610
 +
|
 
|-
 
|-
| style="background:#cef2e0; color:black"  |'''sh404sef '''
+
|style="background:red; color:white"  |
| Summary: sh404sef URI XSS Vulnerability  Added November 2009
+
 
| [http://jeffchannell.com/Joomla/sh404sef-uri-xss-vulnerability.html jeffchannell.com]
+
==  Jreservation ==
| style="background:#cef2e0; color:white"  |[http://extensions.siliana.com/en/2009060876/sh404SEF-and-url-rewriting/Interim-release-of-sh404sef-for-Joomla-1.5.x.html update]
+
|http://jforjoomla.com/ SQLi Vulnerability
 +
|190610
 +
|
 +
 
 
|-
 
|-
| style="background:red; color:white"  | '''AWD Wall 1.5'''
+
|style="background:red; color:white"  |
| Summary '''AWD Wall 1.5''' Blind SQL Injection Vulnerability.The Joomla component AWD Wall 1.5 suffers from an SQL Injection vulnerability in its handling of the 'cbuser' parameter.Added November 2009
+
 
| [http://jeffchannell.com/Joomla/awd-wall-15-blind-sql-injection-vulnerability.html Notice]
+
==  joomdocs ==
|style="background:red; color:white"  | '''  Not Known'''
+
|http://joomclan.com/index.php/JoomDocs/ xss vulnerability
 +
|190610
 +
|
 +
 
 
|-
 
|-
| style="background:red; color:white"  | '''EasyBook 2.0.0rc4'''
+
|style="background:red; color:white"  |
|  Summary: The Joomla component '''EasyBook 2.0.0rc4''' suffers from multiple persistent XSS vulnerabilities. One seems fairly critical, while the others would take some incredible creativity to actively exploit. Added November 2009
+
 
| [http://jeffchannell.com/Joomla/easybook-200rc4-multiple-xss-vulnerabilities.html Alert]
+
==  Live Chat    ==
| style="background:red; color:white"  | '''  Not Known'''
+
|http://www.joompolitan.com/livechat.html Multiple Remote Vulnerabilities
 +
|190610
 +
|
 
|-
 
|-
| style="background:red; color:white"  | '''F!BB 1.5.96'''
+
|style="background:red; color:white"  |
|  Summary: The Joomla component '''F!BB 1.5.96 RC''' suffers from multiple persistent XSS vulnerabilities, as well SQL Injection in its user search feature. Added November 2009
+
 
| [http://jeffchannell.com/Joomla/fbb-1596-rc-multiple-vulnerabilities.html Alert]
+
== Turtushout 0.11    ==
| style="background:red; color:white"  | '''  Not Known'''
+
| http://www.turtus.org.ua/files?func=fileinfo&id=13 SQL Injection (again)
 +
|190610
 +
|
 
|-
 
|-
| style="background:red; color:white"  | '''Testimonial Ku 2.0 Admin Panel'''
+
|style="background:red; color:white"  |
| Summary: The Joomla component '''Testimonial Ku 2.0''' is vulnerable to persistent XSS in the administrator panel. A malicious user can submit a testimonial containing <script> tags with absolutely no quotes and inject that script into the administrator panel through any of the available inputs except "email". Added November 2009
+
 
| [http://jeffchannell.com/Joomla/testimonial-ku-20-admin-panel-persistent-xss.html Alert]
+
== BF Survey Pro Free  ==
| style="background:red; color:white"  | '''  Not Known'''
+
|BF Survey Pro Free SQL Injection Exploit
 +
|190610
 +
|Product marker as retired by the developer
 
|-
 
|-
| style="background:red; color:white"  | '''MS Comment 0.8.0b'''
+
|style="background:red; color:white"  |
| Summary '''MS Comment 0.8.0b for Joomla''', a commenting plugin, suffers from an multiple vulnerabilities. Added November 2009
+
 
| [http://jeffchannell.com/Joomla/ms-comment-080b-multiple-vulnerabilities.html Alert]
+
== MisterEstate  ==
| style="background:red; color:white"  | '''  Not Known'''
+
|http://www.misterestate.com/ Blind SQL Injection Exploit
 +
|190610
 +
|
 
|-
 
|-
| style="background:red; color:white"  |  '''!JoomlaComment 4.0 beta1'''
+
|style="background:red; color:white"  |
Summary: '''!JoomlaComment 4.0 beta1''', a commenting plugin, suffers from multiple XSS vulnerabilities. Added November 2009
+
 
[http://jeffchannell.com/Joomla/joomlacomment-40-beta1-multiple-xss-vulnerabilities.html Alert]
+
== RSMonials    ==
| style="background:red; color:white"  | '''  Not Known'''
+
|http://www.rswebsols.com/downloads/category/14-download-rsmonials-all?download=23%3Adownload-rsmonials-component XSS Exploit
 +
|190610
 +
|Believed to be 1.5.1 version
 +
 
 +
 
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
== Answers v2.3beta  ==
 +
|Multiple Vulnerabilities http://extensions.joomla.org/extensions/communication/forum/12652
 +
|180610
 +
|
 +
|-
 +
|style="background:red; color:white" |
 +
 
 +
==  Gallery XML 1.1  ==
 +
|Multiple Vulnerabilities
 +
http://extensions.joomla.org/extensions/photos-a-images/photo-gallery/12504
 +
|180610
 +
|
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
==  JFaq 1.2  ==
 +
|JFaq 1.2 Multiple Vulnerabilities
 +
|180610
 +
|
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
==  Listbingo 1.3  ==
 +
|Multiple Vulnerabilities
 +
http://extensions.joomla.org/extensions/ads-a-affiliates/classified-ads/12062
 +
|180610
 +
|
 +
 
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
== Alpha User Points    ==
 +
|www.alphaplug.com LFI
 +
|180610
 +
|
 +
 
 
|-
 
|-
| style="background:red; color:white"  | '''WebAmoeba Ticket System 3.0.0'''
+
|style="background:red; color:white"  |
| Summary:  '''WebAmoeba Ticket System 3.0.0''', a Joomla help desk component. The vulnerability is with the BBCode library used to parse BBCode tags, as it does not strip javascript: urls from [url] tags. Added November 2009
+
 
| [http://jeffchannell.com/Joomla/webamoeba-ticket-system-300-bbcode-xss.html Alert]
+
==  recruitmentmanager ==
| style="background:red; color:white"  | '''  Not Known'''
+
|http://recruitment.focusdev.co.uk Upload Vulnerability
 +
|130610
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black" |'''Kunena 1.5.x'''
+
|style="background:red; color:white" |
|Summary: This is an important security release and users are urged to update immediately. Five security issues and an Internet Explorer 8 table bug have been resolved in this release. This release also contains many other important bug fixes. Added 18 November 2009
+
 
|[http://www.kunena.com/blog/19-developer-blog/51-kunena-157-security-release-now-available Advisory]
+
==  Info Line (MT_ILine)    ==
|style="background:#cef2e0; color:white"  |[http://www.kunena.com/blog/19-developer-blog/52-kunena-158-service-release-now-available Latest 1.5.8 Version]
+
|http://extensions.joomla.org/extensions/news-display/news-tickers-a-scrollers/8425 reports of shell scripts in download file
 +
|120610
 +
|
 +
 
 +
 
 +
 
 
|-
 
|-
| style="background:red; color:white"  | '''com_siirler'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in the '''Q-Proje Siirler Bileseni (com_siirler)''' component 1.2 RC for Joomla! allows remote attackers to execute arbitrary SQL commands via the sid parameter in an sdetay action to index.php. Added 18 November 2009
+
 
| [[NIST:CVE-2009-3972 | CVE-2009-3972]]
+
==  Ads manager  Annonce  ==
| style="background:red; color:white"  | '''  Not Known'''
+
|http://joomla.clubnautiquemarine.fr/
 +
Upload Vulnerability
 +
| 05/06/10
 +
|
 
|-
 
|-
| style="background:red; color:white"  | '''jTips (com_jtips)'''
+
|style="background:red; color:white"  |
|SUmmary:SQL injection vulnerability in the '''jTips (com_jtips)''' component 1.0.7 and 1.0.9 for Joomla! allows remote attackers to execute arbitrary SQL commands via the season parameter in a ladder action to index.php. Added 18 November 2009
+
 
| [[NIST:CVE-2009-3971 |CVE-2009-3971]]
+
==  lead article    ==
|style="background:red; color:white"  | '''  Not Known'''
+
|http://www.leadya.co.il/ SQLi
 +
|050610
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black"  |'''NinjaMonials'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in the '''NinjaMonials (com_ninjacentral)''' component 1.1.0 for '''Joomla 1.0.x''' ! allows remote attackers to execute arbitrary SQL commands via the testimID parameter in a display action to index.php. Added 18 November 2009
+
 
| [[NIST:CVE-2009-3964 | CVE-2009-3964]]
+
== djartgallery  ==
|style="background:#cef2e0; color:white"  |'''  [http://ninjaforge.com/index.php?option=com_ninjacentral&page=show_package&id=14&Itemid=235 developer patch Ver 1.2]'''
+
|http://www.design-joomla.eu Multiple Vul
 +
|05/06/10
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black"   | '''webee 1.1.1 &1.2'''
+
|style="background:red; color:white" |
|Summary: '''webee 1.1.1,''' a Joomla commenting plugin, suffers from multiple vulnerabilities. '''webee has been updated to 1.2''' as of 12 November 2009 and''' still suffers''' from SQL Injection. XSS was not tested in 1.2. Added 19 November 2009
+
 
| [http://jeffchannell.com/Joomla/webee-111-multiple-vulnerabilities.html jeffchannell.com]
+
== Gallery 2 Bridge    ==
|style="background:#cef2e0; color:white" | ''' [http://extensions.joomla.org/extensions/contacts-and-feedback/articles-comments/10155 developer update ver2.0]'''
+
|[http://trac.4theweb.nl/g2bridge g2bridge] LFI vulnerability
 +
|
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black"  |'''iF Portfolio Nexus'''
+
|style="background:red; color:white"  |
|Summary: The '''iF Portfolio Nexus component for Joomla!''' is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements using the id parameter, which could allow the attacker to view, add, modify or delete information in the back-end database. Nov 18, 2009
 
|[http://secunia.com/advisories/37408/ secunia.com 37408/]
 
|style="background:#cef2e0; color:white" |[http://www.inertialfate.za.net/help/forums/topic?id=10&p=3#p172 iF Portfolio Nexus v1.1.1 released]
 
  
 +
==  jsjobs  ==
 +
|[http://www.joomsky.com jsjobs] SQL Injection Vulnerability
 +
|
 +
|
 
|-
 
|-
|style="background:red; color:white"  | '''JoomClip'''
+
|
|Summary: The '''JoomClip component for Joomla!''' is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements to the index.php script using the cat parameter, which could allow the attacker to view, add, modify or delete information in the back-end database.  Nov 18, 2009
+
 
|[http://secunia.com/advisories/37400/ secunia.com 37400/]
+
==    ==
|style="background:red; color:white"  | '''  Not Known'''
+
|
 +
|
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black"  |'''Joomla XML'''
+
|style="background:red; color:white"  |
|Summary: Joomla! before 1.5.15 allows remote attackers to read an extension's XML file, and thereby obtain the extension's version number, via a direct request.
+
 
Published: 11/16/2009
+
==  JE Poll ==
|[[NIST:CVE-2009-3946 | CVE-2009-3946]]
+
|http://slideshow.joomlaextensions.co.in/ SQL Injection Vulnerability
|style="background:#cef2e0; color:white" |'''[http://developer.joomla.org/security/news/306-20091103-core-xml-file-read-issue.html Resolution]'''
+
|
 +
|
 +
 
 
|-
 
|-
|style="background:red; color:white"  | '''Mygallery Remote SQL Injection Vulnerability'''
+
|style="background:red; color:white"  |
|Summary: Joomla Component mygallery ( farbinform_krell) Remote SQL Injection Vulnerability Added 27 Nov 2009 {{JVer|1.5}} NB: This could be an error in our database as the only one we could find was for wordpress.If anyone know of one for joomla please let us know..(poss joomlicious.com CM)
+
 
|[http://www.exploit-db.com]
+
==  MediQnA  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|MediQnA LFI vulnerability version : v1.1
 +
|
 +
|
 
|-
 
|-
|style="background:red; color:white"  | '''Extreme Google Calendar'''
+
|style="background:red; color:white"  |
|Summary: '''com_gcalendar 1.1.2''' (gcid) Remote SQL Injection Vulnerability
+
 
Remote SQL Injection were identified in Google Calendar Component [http://extensions.joomla.org/extensions/calendars-a-events/calendars/4188 Extension Link] Added 27 Nov 2009
+
==  JE Job  ==
|[http://www.exploit-db.com reference]
+
|http://joomlaextensions.co.in/ LFI SQLi
|style="background:red; color:white"  | '''  Not Known'''
+
|
 +
|
 +
 
 
|-
 
|-
|style="background:red; color:white"  | '''LyftenBloggie'''
+
|
| Summary: [http://www.lyften.com/products/lyftenbloggie.html LyftenBloggie] Component "author" SQL Injection Vulnerability LyftenBloggie 1.x Added 27 Nov 2009
+
 
|[http://secunia.com/advisories/product/28005/ SA37499]
+
==     ==
| [http://jeffchannell.com/Joomla/lyften-bloggie-sql-injection-fix.html Un official fix]. Developer fix not release at 30 Nov 09 '''  Not Known'''
+
|
 +
|
 +
|
 +
 
 
|-
 
|-
|style="background:#cef2e0; color:black"  |'''Sermon speaker'''
+
|style="background:red; color:white"  |
|Summary: [http://joomlacode.org/gf/project/sermon_speaker sermon speaker] sql vulnerability and password reset vulnerability version 3.2 and below
+
 
 +
==  SectionEx  ==
 +
|Stack Ideas section Ex LFI
 +
|
 
|
 
|
|style="background:#cef2e0; color:white"  |[http://joomlacode.org/gf/project/sermon_speaker/forum/?action=ForumBrowse&forum_id=7897&_forum_action=ForumMessageBrowse&thread_id=15219 Developer fix] 30 Nov 2009
 
 
|-
 
|-
|style="background:#cef2e0; color:white"  | [http://joomlacode.org/gf/project/musicgallery/ MusicGallery]
+
|style="background:red; color:white"  |
|Summary: [http://joomlacode.org/gf/project/musicgallery/ Component MusicGallery] SQL Injection Vulnerability 30 November {{JVer|1.5}}
 
|[[NIST:CVE-2009-4217 | CVE-2009-4217]]
 
|[http://joomlacode.org/gf/project/musicgallery/ developer]
 
|}
 
  
----
+
==  ActiveHelper LiveHelp    ==
 +
|XSS in [http://extensions.joomla.org/extensions/communication/chat/12492 LiveHelp]
 +
|200510
 +
|
  
== December 2009 Compiled Reports ==
 
{| class="wikitable sortable" border="1"
 
 
|-
 
|-
!  '''Extension'''
+
|style="background:#cef2e0; color:black" |
! class="unsortable"| '''Details'''
+
==  JE Quotation Form  ==
! '''Reference Link'''
+
|http://joomlaextensions.co.in/free-download/doc_download/11-je-quotation-form.html LFI
! '''Extension Update Link'''
+
|
 +
|developers statement of [http://joomlaextensions.co.in/extensions/joomla-components/product/JE-Quote-Form resolution] '''note''', now known as [http://joomlaextensions.co.in/extensions/joomla-components/product/JE-Quote-Form JE Quote Form]
 
|-
 
|-
|style="background:red; color:white"  | '''Omilen Photo Gallery'''
+
|style="background:red; color:white"  |
|Summary: Directory traversal vulnerability in the [http://extensions.joomla.org/extensions/photos-&-images/photo-flash-gallery/6373/details Omilen Photo Gallery] (com_omphotogallery) component Beta 0.5 for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the controller parameter to index.php.
+
 
Published: 12/04/2009
+
==  konsultasi  ==
|[[NIST:CVE-2009-4202 | CVE-2009-4202]]
+
|SQL Injection Vulnerability
|style="background:red; color:white"  | '''  Not Known'''
+
|
 +
|
 +
 
 
|-
 
|-
|style="background:red; color:white"  | '''Seminar'''
+
|style="background:red; color:white"  |
|Summary: SQL injection vulnerability in the [http://seminar.vollmar.ws/ Seminar] (com_seminar) component 1.28 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a View_seminar action to index.php.
+
 
Published: 12/04/2009
+
==  Seber Cart    ==
|[[NIST:CVE-2009-4200 | CVE-2009-4200]]
+
|Local File Disclosure Vulnerability
|style="background:red; color:white"  | '''  Not Known'''
+
|
 +
|[http://www.sebercart.com/index.php?option=com_content&view=article&id=158 Developer Update 140510]
 +
 
 
|-
 
|-
|style="background:#cef2e0; color:black| '''Mambo Resident'''
+
|style="background:red; color:white"   |
|Summary: Multiple SQL injection vulnerabilities in the Mambo Resident (aka Mos Res or com_mosres) component 1.0f for Mambo and Joomla!, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) property_uid parameter in a viewproperty action to index.php and the (2) regID parameter in a showregion action to index.php. Mambo Resident component for v4.5.2 '''may only be for 1.0.xx versions of J!'''
+
 
Published: 12/04/2009
+
== Camp26 Visitor    ==
|[[NIST:CVE-2009-4199 | CVE-2009-4199]]
+
|RFI www.camp26.biz
|style="background:#cef2e0; color:white" |[http://www.jomres.net/ Replacement Extension 08 dec 09]
+
|
 +
|
 +
 
 +
 
 +
 
 
|-
 
|-
|style="background:red; color:white"  | '''ProofReader'''
+
|style="background:red; color:white"   |
|Summary: Multiple cross-site scripting (XSS) vulnerabilities in index.php in the ProofReader (com_proofreader) component 1.0 RC9 and earlier for Joomla! allow remote attackers to inject arbitrary web script or HTML via the URI, which is not properly handled in (1) 404 or (2) error pages. Published: 12/02/2009 CVSS Severity: 4.3 (MEDIUM)
+
 
| [[NIST:CVE-2009-4157 | CVE-2009-4157]]
+
==  JE Property ==
|style="background:red; color:white"  | '''  Not Known'''
+
|JE Property Finder Upload Vulnerability
 +
|
 +
|
 
|-
 
|-
|style="background:red; color:white"  | '''Laoneo Google Calendar GCalendar'''
+
|style="background:red; color:white"   |
|Summary: SQL injection vulnerability in the [http://g4j.laoneo.net/content/extensions/download/cat_view/20-joomla-15x/21-gcalendar.html Google Calendar GCalendar] (com_gcalendar) component 1.1.2, 2.1.4, and possibly earlier versions for Joomla! allows remote attackers to execute arbitrary SQL commands via the gcid parameter. NOTE: some of these details are obtained from third party information. Published: 11/29/2009 CVSS Severity: 7.5 (HIGH) Note: There is already a listing for GCalendar 1.1.2
+
 
|[[NIST:CVE-2009-4099 | CVE-2009-4099]]
+
==  Noticeboard ==
|style="background:red; color:white"  | '''  Not Known'''
+
|Noticeboard for Joomla "controller" Local File Inclusion Vulnerability
 +
|
 +
|
 
|-
 
|-
|style="background:red; color:white" | '''D4J eZine'''
+
|style="background:red; color:white"   |
|Summary: PHP remote file inclusion vulnerability in class/php/d4m_ajax_pagenav.php in the D4J eZine (com_ezine) component 2.1 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS mosConfig_absolute_path parameter. Published: 11/29/2009 CVSS Severity: 7.5 (HIGH)
+
 
|[[NIST:CVE-2009-4094 | CVE-2009-4094]]
+
==SmartSite    ==
|style="background:red; color:white"  | '''  Not Known'''
+
|SmartSite com_smartsite Local File Inclusion Vulnerability
 +
|
 +
|
 +
 
 
|-
 
|-
| style="background:red; color:white"  | '''Quick News'''
+
|style="background:red; color:white"   |
| Summary: The Joomla [http://joomlacode.org/gf/project/quicknews/ Quick News component] suffers from a remote SQL injection vulnerability. added 1st Dec 09
+
 
|[http://www.exploit-db.com Reference]
+
== htmlcoderhelper graphics  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|htmlcoderhelper graphics v1.0.6 LFI Vulnerability
 +
|
 +
|
 
|-
 
|-
|style="background:red; color:white" | '''Joaktree component'''
+
|style="background:red; color:white"   |
|Summary: [http://extensions.joomla.org/extensions/miscellaneous/genealogy/9842 Joaktree] Vulnerability : SQL injection/ added 1st Dec 09
+
 
|[http://securityreason.com/exploitalert/7508 7508]
+
== Ultimate Portfolio    ==
|style="background:red; color:white" | '''  Not Known'''
+
|Ultimate Portfolio  Local File Inclusion Vulnerability
 +
|
 +
|
 +
 
 
|-
 
|-
|style="background:red; color:white"  | '''mojoblog'''
+
|style="background:red; color:white"   |
|Summary [http://www.joomlify.com/files/mojoblog/ MojoBlog] Multiple Remote File Include Vulnerability added 1st Dec 09 {{JVer|1.5}}
+
 
|[http://securityreason.com/exploitalert/7509 7509]
+
== Archery Scores  ==
|style="background:red; color:white"  | '''  Not Known'''
+
| [http://lispeltuut.org/ Archery Scores (com_archeryscores) v1.0.6 LFI Vulnerability]
 +
 
 +
|210410
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black| '''YJ Whois'''
+
|style="background:red; color:white"   |
|Summary: [http://extensions.joomla.org/extensions/external-contents/domain-search/5774 YJ Whois] '''Low security risk''',and fixesMalicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable application to fool a user in order to gather data from them. An attacker can steal the session cookie and take over the account. Files affected is , modules/mod_yj_whois.php added 3 December 09
+
 
|[http://www.exploit-db.com Reference]
+
== ZiMB Manager  ==
|style="background:#cef2e0; color:white" |[http://www.youjoomla.com/xss-security-patch-for-yj-whois.html Developer Notice and fix 03 dec 09]
+
|Joomla Component ZiMB Manager Local File Inclusion Vulnerability
 +
|210410
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black" | '''yt_color YOOOtheme'''
+
|style="background:red; color:white"   |
|Summary: [http://www.yootheme.com/ YT_color yootheme] Malicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable application to fool a user in order to gather data from them. An attacker can steal the session cookie and take over the account. added 5 dec 09
+
 
|[http://www.exploit-db.com Reference]
+
==  Matamko  ==
|style="background:#cef2e0; color:white" | '''  [http://www.yootheme.com/member-area/downloads/item/templates-15/xss-and-php-53-patches All members without an active membership can download the template patches here].'''
+
|Matamko Local File Inclusion Vulnerability
 +
|210410
 +
|
 
|-
 
|-
|style="background:red; color:white" '''TP Whois'''
+
|style="background:red; color:white"   |
|summary: [http://www.templateplazza.com/view-details/tpwhois/183-component-tp-whois-for-joomla-1.5.x.html TP Whois ] Malicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable application to fool a user in order to gather data from them. An attacker can steal the session cookie and take over the account. Added 3 december {{JVer|1.5}}
+
 
|[http://www.exploit-db.com Refrence]
+
== Multiple Root  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|Multiple Root Local File Inclusion Vulnerability http://joomlacomponent.inetlanka.com/
 +
|
 +
|
 
|-
 
|-
|style="background:red; color:white" | '''com_job'''
+
|style="background:red; color:white"   |
|Summary: [http://extensions.joomla.org/extensions/ads-a-affiliates/jobs-a-recruitment/8319 Component com_job] ( showMoreUse) SQL injection vulnerability Added 9th Dec
+
 
|[http://xforce.iss.net/xforce/xfdb/54626 Reference]
+
== Multiple Map  ==
| style="background:red; color:white"  | '''  Not Known'''
+
|Multiple Map Local File Inclusion Vulnerability joomlacomponent.inetlanka.com
 +
|
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black" '''JQuarks'''
+
|style="background:red; color:white"   |
|Summary: [http://extensions.joomla.org/extensions/contacts-and-feedback/quiz-a-surveys/10590 JQuarks] SQL injection vulnerability {{JVer|1.5}} added 8th dec 09
+
 
|[http://www.exploit-db.com Reference]
+
==  Contact Us Draw Root Map ==
|style="background:#cef2e0; color:white" | [http://www.iptechinside.com/labs/projects/list_files/jquarks Developer Update ]
+
|Draw Root Map Local File Inclusion Vulnerability joomlacomponent.inetlanka.com
 +
|
 +
|
 
|-
 
|-
|style="background:red; color:white" | '''Mamboleto Component 2.0 RC3'''
+
|style="background:red; color:white"   |
|Summary: [http://www.fernandosoares.com.br/index.php?option=com_docman&task=cat_view&gid=28&Itemid=28 Mamboleto Component 2.0 RC3]SQL injection vulnerability {{JVer|1.5}} added 12 December
+
 
|[http://www.exploit-db.com Reference]
+
== iF surfALERT  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|[http://www.inertialfate.za.net/ iF surfALERT] Local File Inclusion Vulnerability
 +
|
 +
|
 
|-
 
|-
| style="background:#cef2e0; color:black" | ''' JS JOBS'''
+
|style="background:red; color:white"   |
|Summary [http://www.joomshark.com/index.php?option=com_content&view=article&id=4&Itemid=8 JS JOBS] Joomla Component com_jsjobs 1.0.5.6 SQL Injection Vulnerabilities {{JVer|1.5}} added 12 December
+
 
|[http://www.exploit-db.com Reference]
+
==   GBU FACEBOOK  ==
|style="background:#cef2e0; color:white"  | '''  [http://www.joomsky.com/index.php?option=com_rokdownloads&view=folder&Itemid=3&id=2:components Developer update 1.0.5.7]'''
+
|GBU FACEBOOK SQL injection vulnerability http://www.gbugrafici.nl/gbufacebook/
 +
|
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black" '''corePHP JPhoto'''
+
|style="background:red; color:white"   |
|Summary: [http://extensions.joomla.org/extensions/photos-a-images/photo-gallery/10365 'corePHP' JPhoto]SQL injection vulnerability {{JVer|1.5}} added 12 December
+
 
|[http://secunia.com/advisories/37676/ Reference]
+
==  jnewspaper ==
|style="background:#cef2e0; color:white"  | '''  [http://www.corephp.com/blog/uber-fast-jphoto-security-release/ Developer Upgrade]'''
+
|jnewspaper (cid) SQL Injection Vulnerability
 +
|
 +
|
 +
 
 +
 
 +
 
 +
 
 +
 
 
|-
 
|-
|style="background:#cef2e0; color:black"    | '''com_virtuemart'''
+
|
|Summary: "com_virtuemart" http://virtuemart.net/  '''Version : 1.0''' Vulnerability : SQL injection added Date : 07-12-09 {{JVer|1.5}}
+
 
|[http://www.exploit-db.com Reference]
+
==    ==
|style="background:#cef2e0; color:white"  |[http://virtuemart.net/ latest version]
+
|
 +
|
 +
|
 
|-
 
|-
|style="background:red; color:white" | ''' Kide Shoutbox'''
+
|style="background:red; color:white"   |
 +
== MT Fire Eagle ==
 +
 
 +
|LFI http://joomlacode.org/gf/project/jfireeagle/frs/ http://www.moto-treks.com
 +
| 190410
 +
| product considered retired and to be replaced by dev
  
|Summary: The Kide Shoutbox (com_kide) component 0.4.6 for Joomla! does not properly perform authentication, which allows remote attackers to post messages with an arbitrary account name via an insertar action to index.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Added: December 08
 
|[[NIST:CVE-2009-4232 | CVE-2009-4232]]
 
|style="background:red; color:white"  | '''  Not Known'''
 
 
|-
 
|-
|style="background:red; color:white" | ''' JoomPortfolio Component'''
+
|style="background:red; color:white"|
|Summary: [http://www.joomplace.com/joomportfolio/joomportfolio.html JoomPortfolio] Input passed via the "secid" parameter to index.php (when "option" is set to "com_joomportfolio" and "task" is set to "showcat") is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.The vulnerability is reported in version 1.0.0. Other versions may also be affected. Added: December 18 {{JVer|1.5}}
+
 
|[http://secunia.com/advisories/37838/ Reporting Site]
+
==  Sweetykeeper  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|Sweetykeeper Local File Inclusion Vulnerability  http://www.joomlacorner.com/
 +
|120410
 +
|
 
|-
 
|-
|style="background:red; color:white"  | '''City Portal (templates?)'''
+
|style="background:red; color:white"|
|Summary:  City Portal Blind SQL Injection Vulnerability added: 2009-12-18
+
 
|[http://www.exploit-db.com Reference] Possibly this [http://www.youjoomla.com/jclick-city-portal-joomla-template.html tempate]
+
== jvehicles  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|SQL Injection http://jvehicles.com
 +
|120410
 +
|
 
|-
 
|-
|style="background:red; color:white" | '''Event Manager'''
+
|style="background:red; color:white"|
|Summary:  [http://www.jforjoomla.com/Joomla-Components/event-manager-15-component.html Event Manager] Blind SQL Injection Vulnerability EDB-ID: 10549
+
 
added: 2009-12-18
+
==  worldrates  ==
|[http://www.exploit-db.com Reference]
+
|http://dev.pucit.edu.pk/
|style="background:red; color:white"  | '''  Not Known'''
+
|120410
 +
|
 
|-
 
|-
|style="background:red; color:white" | com_zcalendar
+
|style="background:red; color:white"|
|Summary: com_zcalendar Blind SQL-injection Vulnerability
+
 
EDB-ID: 10548 added: 2009-12-18
+
== cvmaker  ==
|[http://www.exploit-db.com Reference]
+
|http://dev.pucit.edu.pk/
|style="background:red; color:white"  | '''  Not Known'''
+
|
 +
|
 
|-
 
|-
|style="background:red; color:white" | '''com_acmisc'''
+
|style="background:red; color:white"|
|Summary: com_acmisc SQL injection added: 2009-12-18
+
 
|[http://www.exploit-db.com Reference]
+
== advertising  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|http://dev.pucit.edu.pk/
 +
|
 +
|
 
|-
 
|-
|style="background:red; color:white" | '''com_digistore'''
+
|style="background:red; color:white"|
|Summary: com_digistore SQL injection EDB-ID: 10546 added: 2009-12-18  {{JVer|1.5}}
+
 
|[http://www.exploit-db.com Reference]
+
==  horoscope ==
|style="background:red; color:white"  | '''  New Release on Monday Dec. 21'''
+
|http://dev.pucit.edu.pk/
 +
|120410
 +
|
 
|-
 
|-
|style="background:red; color:white" | '''com_jbook'''
+
|style="background:red; color:white"|
|Summary:   com_jbook Blind SQL-injection EDB-ID: 10545 added: 2009-12-18 {{JVer|1.0}}
+
 
|[http://www.exploit-db.com Reference]
+
==   webtv  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|http://dev.pucit.edu.pk/
 +
|120410
 +
|
 
|-
 
|-
|style="background:red; color:white" |  '''com_personel'''
+
|style="background:red; color:white"|
|Summary: com_personel component for Joomla! is vulnerable to SQL injection.
+
 
|[http://xforce.iss.net/xforce/xfdb/54903 iss.net reference]
+
== diary  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|http://dev.pucit.edu.pk/
 +
|120410
 +
|
 +
 
 
|-
 
|-
 +
|style="background:red; color:white"|
 +
 +
==  Memory Book  ==
 +
|http://dev.pucit.edu.pk/
 +
|120410
 
|
 
|
 +
|-
 +
|style="background:red; color:white"|
 +
 +
==  JprojectMan  ==
 +
|LFI http://extensions.joomla.org/extensions/communities-a-groupware/project-a-task-management/5676
 +
|110410
 
|
 
|
 +
 +
|-
 +
|style="background:red; color:white"|
 +
 +
==  econtentsite  ==
 +
|LFI
 +
|040410
 
|
 
|
 +
|-
 +
|style="background:red; color:white"|
 +
 +
==    Jvehicles ==
 +
|ID
 +
|040410
 
|
 
|
 
|-
 
|-
 
|
 
|
 +
 +
==    ==
 
|
 
|
 
|
 
|
 
|-
 
|-
 +
|style="background:red; color:white"|
 +
 +
==    gigcalender  ==
 +
 +
|SQLi [http://extensions.joomla.org/extensions/calendars-a-events/events/97)http://extensions.joomla.org/extensions/calendars-a-events/events/97 gigcalender]
 +
|13 march 2010
 +
|
 +
|-
 +
|style="background:red; color:white"|
 +
 +
==    heza content  ==
 +
|SQLi [http://extensions.joomla.org/extensions/structure-a-navigation/sections-a-categories/10427)http://extensions.joomla.org/extensions/structure-a-navigation/sections-a-categories/10427  heza content]
 +
|13 march 2010
 +
|
 +
 +
 +
|-
 +
|style="background:red; color:white" |
 +
 +
==  SqlReport  ==
 +
|Sqlreport has a sql/RFI exploit. awaiting confirmation on exact developer.
 +
|Feb 20
 +
|'''Not Known'''
 +
 +
|-
 +
|style="background:red; color:white" |
 +
 +
== Yelp ==
 +
| SQLi - Unable to locate developer. Possibly a custom extension.
 +
|Feb 01
 +
|style="background:red; color:white" | '''  Not Known'''
 +
|-
 +
 +
|-
 +
|
 +
 +
==    ==
 
|
 
|
 
|
 
|
 
|
 
|
|}
+
|}<endFeed />
 +
 
 +
''This list is change protected, for updates or additions [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=28000 Mandville] or [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=87230 lafrance] or [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=67439 PhilD]
 +
''
 +
 
 +
== Codes used ==
 +
SQLi - SQL injection [http://en.wikipedia.org/wiki/Code_injection#SQL_injection wikipedia]
 +
 
 +
LFI - Local File Inclusion [http://www.scribd.com/doc/6498408/Remote-and-Local-File-Inclusion-Explained scribd]
 +
 
 +
RFI - Remote file inclusion [http://en.wikipedia.org/wiki/Remote_File_Inclusion wikipedia]
 +
 
 +
DT - Directory Traversal [http://en.wikipedia.org/wiki/Directory_traversal wikipedia] (incl 777 folders)
 +
 
 +
ID = Information Disclosure: account information or sensitive information publicly viewable, or passed to 3rd party without knowledge
 +
 
 +
== Future Actions & WIP ==
 +
 
 +
[http://feeds.joomla.org/JoomlaSecurityVulnerableExtensions RSS feed] completed
 +
 
 +
 
 +
to feed VEL direct to twitter
  
 
== Notes ==
 
== Notes ==
 +
The RSS feed is currently fed by item entry order and not by date fixed.
 
List as discussed in  [[jtopic:455746]] by [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=67439 PhilD] editing by [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=28000 Mandville]
 
List as discussed in  [[jtopic:455746]] by [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=67439 PhilD] editing by [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=28000 Mandville]
Exploits under investigation are held on this [http://docs.joomla.org/Investigation_of_exploits exploit''' investigation''' list]
 
----
 
[[Category:Security]]
 
[[Category:Security_FAQ]]
 
  
 
----
 
----
 +
__NOINDEX__
 +
[[Category:Archived pages]]

Latest revision as of 17:39, 8 April 2020

This page has been archived. This page contains information for an unsupported Joomla! version or is no longer relevant. It exists only as a historical reference, it will not be improved and its content may be incomplete and/or contain broken links.


Info non-talk.png
General Information

This document has now been replaced by the website at vel.joomla.org from 1st May 2013 Please refer to there for the latest updates

List prior to January 2011 (now archived) Please check here also.

Check and Report.[edit]

Please check with the extension publisher in case of any questions over the security of their product.

Info non-talk.png
General Information

All reports are now to be made via vel.joomla.org

Report Vulnerable extensions in the vel website

How to use this list[edit]

Items will be removed after a suitable period and not on resolution.

Info non-talk.png
General Information

This document has now been replaced by the website at vel.joomla.org from 1st May 2013 Please refer to there for the latest updates

All known vulnerable extensions are the listed in the first column "Extension". Any in a red box are where we have not been given a fix. Any in a turquoise box contain a link to the notice about an update with link. Any that are in an uncolored box are a "Contact the Developer About This Extension". Alert Advisory details are in the center column. If the "Extension Update Link & Date Column has Not Known then it is where no update is known.

This list is compiled from found information and may not be an up to date accurate list We do NOT promise to test or validate these reports. We do NOT guarantee the quality or effectiveness of any updates reported to us or listed here. To sign up for the feed please follow this link

  • We do not list BETA products, or extensions for J1.0.x

Developers - How to get yourself removed from the VEL[edit]

Resolved items will be removed after a suitable period and not on resolution

Please solve the issues and:

  • If JED listed

To have your extension republished, please follow these steps:

1- Solve the issues.

2- Attach the new zip file at your actual JED listing.

3- Change the extension version at JED listing.

4- Make sure to include a notice in the JED description to the fact that the new release is a "Security Release" and those who use the extension should upgrade immediately.

5-complete the resolution form on the website at vel.joomla.org from 1st May 2013

6- Create a JED listing owner ticket to the JED with a notice and ask that your listing be republished. Include the full details of your new version number and security notice page

VEL email can be found above and the JED support link is in your notice of "unpublication" and here

  • If not JED listed.

Inform us by email with a notice of resolution, the latest version number and a link to the security release statement on your website.

January 2012 and onwards Reported Vulnerable Extensions[edit]

<startFeed />

Extension Details Date Added Extension Update Link & Date

civic crm 422[edit]

upload exploit /RFI 260413 developer http://civicrm.org/category/civicrm-blog-categories/civicrm-v43 release 4.3.1

alfcontact[edit]

xss 230413 developer release statement on ALFContact v2.0.8 for J!2.5 ALFContact v3.1.4 for J!3

aiContactSafe 2.0.19[edit]

xss 160413 developer release statement for version 2.0.21

RSfiles[edit]

SQL 180313 developer release statement for version 12

Multiple Customfields Filter for Virtuemart[edit]

SQLi 18212 developers 1.6.8 update statement

Collector[edit]

Various [steevo.fr] 230113 developer update statement to 0.5.1

tz guestbook[edit]

Various 100113 developer release statement for 1.1.2

extplorer[edit]

2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 are vulnerable to an authentication bypass 251212 developer update to 2.1.3 statement

JooProperty[edit]

SQLi 101212 developer release new version 1.13.1 - upgrade notice

Multiple Customfields Filter for Virtuemart[edit]

SQLi 18212 developers update statement

ag google analytic[edit]

Various 061212

sh404sef <3.7.0[edit]

Undisclosed sh404SEF 3.4.x, 3.5.x, 3.6.x for Joomla 2.5 26112 developer statement

Login Failed Log[edit]

23112 ID - information disclosure developer release statement to ver 1.5.4

jNews[edit]

131112 developer update statement to version 7.9.1 151112


Joombah Jobs[edit]

Upload restriction issues 131112 developer update statement

commedia[edit]

RFI 231012 developer update statement to version 3.2 271012


Kunena[edit]

SQLi + ID 221012 Developer states current version not exploitable by reported methods


Icagenda[edit]

SQLi Developer statement for 1.2.9

JTag [joomlatag][edit]

SQLi

Freestyle Support[edit]

SQLi developer update statement 251012

ACEFTP[edit]

DT 011012 AceFTP 2.0.0 released. Developer statement 101012

MijoFTP[edit]

DT 011012 *reported fixed prior to notification*

spider calendar lite[edit]

RFI 180912 developer release version 1.5 version

RokModule[edit]

SQLi Rereported 180912 Developer states: no known exploits for our current versions of RokModule Joomla 2.5 - v1.3 Joomla 1.5 - v1.4

ICagenda[edit]

SQLi developer security release - v1.2.1 080912


En Masse cart[edit]

RFI 060812 Developer upgrade statement to 3.1.3

JCE (joomla content editor)[edit]

Upload Restriction <2.2.4 050812 Developer states current version not exploitable

RSGallery2[edit]

SQLi XSS 31 07 12 Devleoper statement versions 3.2.0 for Joomla 2.5 and version 2.3.0 for Joomla 1.5 released

osproperty[edit]

Unrestricted uploads 160712 Developer release version 2.0.3 180712

KSAdvertiser[edit]

RFI 160712 The security update version 1.5.72 advise can be found here:

German English

Shipping by State for Virtuemart[edit]

elevated permissions (http://web-expert.gr/en) 160612 Upgrade to v2.5 download commercial product 300612

ownbiblio 1.5.3[edit]

SQLi + 250512

Ninjaxplorer <=1.0.6[edit]

developer notification 250412 developer statement upgrade to 1.0.7

Phoca Fav Icon[edit]

Permissions Rewrite 150412 developer update 2.0.3 statement

estateagent improved[edit]

sqli (eaimproved.eu) 110412 developer states previous version, not current version

bearleague[edit]

110412 sql (no longer maintained)

JLive! Chat v4.3.1[edit]

DT 060412 Developer reports as unproven

virtuemart 2.0.2[edit]

SQLi 050412 developers release statementCurrent version 2.0.6 released

JE testimonial[edit]

SQLi 230312 Developer states malicious report.

JaggyBlog[edit]

excessive file permission 090212 version 1.3.1 released

Quickl Form[edit]

xss 260112

com_advert[edit]

sqli - unknown developer 240112

Joomla Discussions Component[edit]

sqli 180112 Discussions 1.4.1 released developer statement

HD Video Share (contushdvideoshare)[edit]

sqli 180112 updated version 2.2

Simple File Upload 1.3[edit]

RFI 010112 Developer update statement to 1.3.5

[edit]

<endFeed />

January 2011 - Jan 2012 Reported Vulnerable Extensions[edit]

Please check with the extension publisher in case of any questions over the security of their product. Report Vulnerable extensions either in the jforum:432 security topic clearly marked with the first word in the title being Vulnerable Report where the security moderators or JSST team will respond or via email to the VEL team. For a guide to the codes

<startFeed />

Extension Details Date Added Extension Update Link & Date

Simple File Upload 1.3[edit]

RFI 010112 Developer update statement to 1.3.5

Dshop[edit]

sqli (possibly dhrusya.com) 201111

QContacts 1.0.6[edit]

sqli 131211

Jobprofile 1.0[edit]

SQL Injection Vulnerability 051211

JX Finder 2.0.1[edit]

XSS Vulnerabilities 011211

wdbanners[edit]

Unknown Exploit 301111

JB Captify Content J1.5 and J1.7[edit]

Security checks missing -Versions prior to JB_mod_captifyContent_J1.5_J1.7_1.0.1.zip 141111 All extensions available on the site have been updated and this potential security issue has been resolved.

JB Microblog[edit]

Security checks missing - J1.7 only. Versions prior to 1.10.3 14111 All extensions available on the [joomlabamboo.com site have been updated] and this potential security issue has been resolved.

JB Slideshow <3.5.1,[edit]

Security checks missing 141111 All extensions available on the [joomlabamboo.com site have been updated] and this potential security issue has been resolved.

JB Bamboobox[edit]

Security checks missing - J1.5 all versions prior to 1.2.2 141111 All extensions available on the [joomlabamboo.com site have been updated] and this potential security issue has been resolved.

RokModule[edit]

SQLI - exploits RokStock RokWeather RokNewspager 121111 developer release statement RokModule v1.3 for Joomla 1.7 RokModule v1.4 for Joomla 1.5

hm community[edit]

Multiple Vulnerabilities 011111 developer release 1.01

Alameda[edit]

SQLi 01111 developer statement and Latest version number v1.0.1.

Techfolio 1.0[edit]

Techfolio 1.0 SQLI 291011

Barter Sites 1.3[edit]

Barter Sites 1.3 SQL Injection & Persistent XSS vulnerabilities 291011 developer release 1.3.1

Jeema SMS 3.2[edit]

Jeema SMS 3.2 Multiple Vulnerabilities 291011 developer resolution notice for 3.5.2

Vik Real Estate 1.0[edit]

Vik Real Estate 1.0 Multiple Blind SqlI 291011

yj contact[edit]

LFI (youjoomla contact) 241011 developer update statement 261011

NoNumber Framework[edit]

Advanced Module Manager * AdminBar Docker * Add to Menu * Articles Anywhere * What? Nothing!* Tooltips* Tabber* Sourcerer* Slider* Timed Styles* Modules Anywhere* Modalizer* ReReplacer* Snippets* DB Replacer* CustoMenu* Content Templater* CDN for Joomla!* Cache Cleaner* Better Preview 181011 see http://feeds.feedburner.com/nonumber/news for updates of various extensions

Time Returns[edit]

SQLi takeaweb.it 151011 No longer developed. New version 2.0.1 for Joomla 1.6/1.7 (old version are no longer supported) http://www.takeaweb.it

Simple File Upload[edit]

LFI 300811 developer advice page

Jumi[edit]

LFI 300811 Developer states proper use of joomla administration/extension documentation reading

Joomla content editor[edit]

JCE lfi/rfi vulnerability JCE 2.0.11 and JCE 1.5.7.14 have been released

Google Website Optimizer[edit]

Numerous vulnerabilities. Website Optimizer, Pearl Group 290811 developer update statement to ver. 1.4.0

Almond Classifieds[edit]

777 Folder settings (all folders it uses are set to 777 including previously 755 locked folders) 260811 developer resolution notice

joomtouch[edit]

LFI/RFI 180811 developers resolution notice 1.0.3

RAXO All-mode PRO[edit]

Timthumb RFI 110811 developer upgrade 1.5.0 statement

V-portfolio[edit]

DT - open folders 110811 developer resolution statement

obSuggest[edit]

LFI 310711 developer release statement

Simple Page[edit]

LFI 230711 developer update statement v1.5.17 has been released

JE Story[edit]

LFI 230711 devloper security update notice to ver 1.9

appointment booking pro[edit]

LFI 22071 developer update security announcement Current 2.0.1 and 1.4.x versions, are not vulnerable,

acajoom[edit]

xss (admin permission required) 220711 updated to 5.20

gTranslate[edit]

ID - 220711 developer security release 1.5 x.25 and 1.6 x.26.

alpharegistration[edit]

http://www.alphaplug.com/ Please contact the developer for any questions on this extension 170711 220711

Jforce[edit]

DT - 170711 developer states The new version number v1.5r1362 resolves the problem

Flash Magazine Deluxe Joomla[edit]

ID multiple vulnerabilities 170711 developer release 2.1.4

AVreloaded[edit]

SQLi - version 1.2.6 150711 1.2.7 released developer release statement 160711

Sobi[edit]

SQLI - 130711 developer fix and update statement

fabrik[edit]

sqli 120711 Developers Update statement 2.1

xmap[edit]

sqli 1.2.11 120711 upgrade to 1.2.12

Atomic Gallery[edit]

Creates 777 folders Atomic gallery 110711 developer release statement/changelog

myApi[edit]

ID Contains "Call-Home" function. Sends private user information to developer. 020711 Developer states Use version 1.3.4.1

mdigg[edit]

SQL I (not listed in JED) 020711

Calc Builder[edit]

sqli + ID 180611 dev security release 0.0.2

Cool Debate[edit]

Cool Debate 1.03 LFI version 1.0.8 released.

[edit]

Scriptegrator Plugin 1.5.5[edit]

LFI 140611 Update - Core Design Scriptegrator plugin 2.0.9 & 1.5.6

Joomnik Gallery[edit]

SQLi developer update to 0.9.1

JMS fileseller[edit]

LFI 0611 developer upgrade announcement to v1.1

sh404SEF[edit]

low-level XSS security issue 300511 Dev upgrade statement to 2.2.6

JE Story submit[edit]

LFI/RFI developer states Version 1.8

FCKeditor[edit]

File Upload Vulnerability 230511

KeyCaptcha[edit]

ID 190511

Ask A Question AddOn v1.1[edit]

SQLi 160511

Global Flash Gallery[edit]

flash-gallery.com xss 130511 dev release 0.5.0 statement

com_google[edit]

LFI com_google 080511 devs update to 1.5.1

docman[edit]

com-docman Input Validation Error 160511 devs resolution statement, report for old version

Newsletter Subscriber[edit]

XSS 120511 Deveopler update

Akeeba[edit]

akkeba backup and joomlapack 170411 dev update to 3.2.7

Facebook Graph Connect[edit]

SID. call home device with user credentials 120411 dev update notice

booklibrary[edit]

SQLi ordasoft booklibrary 180311 developer upgrade instructions

semantic[edit]

com semantic http://www.scms.es/joomla creates hidden admin users 150311

JOMSOCIAL 2.0.x 2.1.x[edit]

SID, open folders 120311

flexicontent[edit]

forced 777, malicious files 250311 devs resolve statement, Changelog

jLabs Google Analytics Counter[edit]

jLabs Google Analytics Counter SID

xcloner[edit]

Unspecified 260211 dev announcement of security release

smartformer[edit]

RFI 230211 (repeat of 041110) v2.4.1 security fix for Joomla 1.5.x

xmap 1.2.10[edit]

Malicious payload in zip 230211 developer resolution notice Clean version available from joomlacode

Frontend-User-Access 3.4.1[edit]

Frontend-User-Access 3.4.1 from http://www.pages-and-items.com LFI 030211 update to Frontend-User-Access 3.4.2

com properties 7134[edit]

http://com-property.com/ malicious files in script Dev update statement

B2 Portfolio[edit]

B2 portfolio 1.0 SQLi pulseextensions.com 250111

allcinevid[edit]

SQLI http://extensions.joomla.org/extensions/multimedia/multimedia-players/video-players-a-gallery/15367 220111 Developers resolution notice

People Component[edit]

People component http://www.ptt-solution.com/vmchk/people-component.html sqli 150111

Jimtawl[edit]

Jimtawl LFI 251110

Maian Media SILVER[edit]

Maian Media SQLi 151110 Developer states unproven in free edition, paid/SILVER version is being upgraded. dev article

alfurqan[edit]

alfurqan 1.5 sqli 151110 developer update statement

ccboard[edit]

ccboard XSS and SQLi 131110 on my site at [1] Please find the respective update information

ProDesk v 1.5[edit]

LFI 091110


sponsorwall[edit]

SQL injection pulseextensions.com 011110 developer resolution notice


Flip wall[edit]

SQL injection pulseextensions.com 011110 developer http://demo.pulseextensions.com/flip-wall.html update notice link title

Freestyle FAQ 1.5.6[edit]

http://freestyle-joomla.com/fssdownloads/viewcategory/2 Freestyle FAQ 1.5.6 ‎SQL Injection new version (1.9.0) is available which fixes the security issues.

iJoomla Magazine 3.0.1[edit]

iJoomla Magazine 3.0.1 RFI 090910

Clantools[edit]

http://www.joomla-clantools.de/downloads/doc_download/7-clantools-123.html clantool sqli 090910

jphone[edit]

jphone LFI 090910

PicSell[edit]

LFD, 777 020910 new version released 150312 version number 11

Zoom Portfolio[edit]

SID 020910

zina[edit]

SQL Injection 020910

Team's[edit]

Teams extension SQL Injection 120810

Amblog[edit]

Amblog SQLi 120810

[edit]

[edit]

wmtpic[edit]

www.webmaster-tips.net various 010710


Jomtube[edit]

http://www.jomtube.com/ SID 220710

Rapid Recipe[edit]

http://www.rapid-source.com Persistent XSS Vulnerability last known fix version 1.7.2 july 10,2010

Health & Fitness Stats[edit]

http://joomla-extensions.instantiate.co.uk/jcomponents/healthstats Persistent XSS Vulnerability july 10,2010


staticxt[edit]

http://extensions.joomla.org/extensions/edition/custom-code-in-content/2184 no version number provided


quickfaq[edit]

http://www.schlu.net sqli 090710

Minify4Joomla[edit]

http://waltercedric.com/ LFI and xss 090710 No longer available to download

IXXO Cart[edit]

http://www.php-shop-system.com/ SQLi LFI XSS Vulnerability developer resolution notice

PaymentsPlus[edit]

http://paymentsplus.com.au/ 2.1.5 Blind SQL Injection Vulnerability 090710 current version 2.20, 2.1.5 not listed on dev site

ArtForms[edit]

http://joomlacode.org/gf/project/jartforms/ ArtForms 2.1b7.2 RC2 Multiple Remote Vulnerabilities 090710 Old beta extension

autartimonial[edit]

autartica.be Sqli Vulnerability 060710



eventcal 1.6.4[edit]

http://joomlacode.org/gf/project/eventcal/frs/ SQL I last update 2006-12-31 on joomlacode 040710



date converter[edit]

http://sourceforge.net/projects/date-converter/ sqli 010710


real estate[edit]

http://www.opensourcetechnologies.com/demos/real-estate.html RFI 210610


cinema[edit]

SQL injection 190610

Jreservation[edit]

http://jforjoomla.com/ SQLi Vulnerability 190610

joomdocs[edit]

http://joomclan.com/index.php/JoomDocs/ xss vulnerability 190610

Live Chat[edit]

http://www.joompolitan.com/livechat.html Multiple Remote Vulnerabilities 190610

Turtushout 0.11[edit]

http://www.turtus.org.ua/files?func=fileinfo&id=13 SQL Injection (again) 190610

BF Survey Pro Free[edit]

BF Survey Pro Free SQL Injection Exploit 190610 Product marker as retired by the developer

MisterEstate[edit]

http://www.misterestate.com/ Blind SQL Injection Exploit 190610

RSMonials[edit]

http://www.rswebsols.com/downloads/category/14-download-rsmonials-all?download=23%3Adownload-rsmonials-component XSS Exploit 190610 Believed to be 1.5.1 version


Answers v2.3beta[edit]

Multiple Vulnerabilities http://extensions.joomla.org/extensions/communication/forum/12652 180610

Gallery XML 1.1[edit]

Multiple Vulnerabilities

http://extensions.joomla.org/extensions/photos-a-images/photo-gallery/12504

180610

JFaq 1.2[edit]

JFaq 1.2 Multiple Vulnerabilities 180610

Listbingo 1.3[edit]

Multiple Vulnerabilities

http://extensions.joomla.org/extensions/ads-a-affiliates/classified-ads/12062

180610

Alpha User Points[edit]

www.alphaplug.com LFI 180610

recruitmentmanager[edit]

http://recruitment.focusdev.co.uk Upload Vulnerability 130610

Info Line (MT_ILine)[edit]

http://extensions.joomla.org/extensions/news-display/news-tickers-a-scrollers/8425 reports of shell scripts in download file 120610


Ads manager Annonce[edit]

http://joomla.clubnautiquemarine.fr/

Upload Vulnerability

05/06/10

lead article[edit]

http://www.leadya.co.il/ SQLi 050610

djartgallery[edit]

http://www.design-joomla.eu Multiple Vul 05/06/10

Gallery 2 Bridge[edit]

g2bridge LFI vulnerability

jsjobs[edit]

jsjobs SQL Injection Vulnerability

[edit]

JE Poll[edit]

http://slideshow.joomlaextensions.co.in/ SQL Injection Vulnerability

MediQnA[edit]

MediQnA LFI vulnerability version : v1.1

JE Job[edit]

http://joomlaextensions.co.in/ LFI SQLi

[edit]

SectionEx[edit]

Stack Ideas section Ex LFI

ActiveHelper LiveHelp[edit]

XSS in LiveHelp 200510

JE Quotation Form[edit]

http://joomlaextensions.co.in/free-download/doc_download/11-je-quotation-form.html LFI developers statement of resolution note, now known as JE Quote Form

konsultasi[edit]

SQL Injection Vulnerability

Seber Cart[edit]

Local File Disclosure Vulnerability Developer Update 140510

Camp26 Visitor[edit]

RFI www.camp26.biz


JE Property[edit]

JE Property Finder Upload Vulnerability

Noticeboard[edit]

Noticeboard for Joomla "controller" Local File Inclusion Vulnerability

SmartSite[edit]

SmartSite com_smartsite Local File Inclusion Vulnerability

htmlcoderhelper graphics[edit]

htmlcoderhelper graphics v1.0.6 LFI Vulnerability

Ultimate Portfolio[edit]

Ultimate Portfolio Local File Inclusion Vulnerability

Archery Scores[edit]

Archery Scores (com_archeryscores) v1.0.6 LFI Vulnerability 210410

ZiMB Manager[edit]

Joomla Component ZiMB Manager Local File Inclusion Vulnerability 210410

Matamko[edit]

Matamko Local File Inclusion Vulnerability 210410

Multiple Root[edit]

Multiple Root Local File Inclusion Vulnerability http://joomlacomponent.inetlanka.com/

Multiple Map[edit]

Multiple Map Local File Inclusion Vulnerability joomlacomponent.inetlanka.com

Contact Us Draw Root Map[edit]

Draw Root Map Local File Inclusion Vulnerability joomlacomponent.inetlanka.com

iF surfALERT[edit]

iF surfALERT Local File Inclusion Vulnerability

GBU FACEBOOK[edit]

GBU FACEBOOK SQL injection vulnerability http://www.gbugrafici.nl/gbufacebook/

jnewspaper[edit]

jnewspaper (cid) SQL Injection Vulnerability



[edit]

MT Fire Eagle[edit]

LFI http://joomlacode.org/gf/project/jfireeagle/frs/ http://www.moto-treks.com 190410 product considered retired and to be replaced by dev

Sweetykeeper[edit]

Sweetykeeper Local File Inclusion Vulnerability http://www.joomlacorner.com/ 120410

jvehicles[edit]

SQL Injection http://jvehicles.com 120410

worldrates[edit]

http://dev.pucit.edu.pk/ 120410

cvmaker[edit]

http://dev.pucit.edu.pk/

advertising[edit]

http://dev.pucit.edu.pk/

horoscope[edit]

http://dev.pucit.edu.pk/ 120410

webtv[edit]

http://dev.pucit.edu.pk/ 120410

diary[edit]

http://dev.pucit.edu.pk/ 120410

Memory Book[edit]

http://dev.pucit.edu.pk/ 120410

JprojectMan[edit]

LFI http://extensions.joomla.org/extensions/communities-a-groupware/project-a-task-management/5676 110410

econtentsite[edit]

LFI 040410

Jvehicles[edit]

ID 040410

[edit]

gigcalender[edit]

SQLi gigcalender 13 march 2010

heza content[edit]

SQLi heza content 13 march 2010


SqlReport[edit]

Sqlreport has a sql/RFI exploit. awaiting confirmation on exact developer. Feb 20 Not Known

Yelp[edit]

SQLi - Unable to locate developer. Possibly a custom extension. Feb 01 Not Known

[edit]

<endFeed />

This list is change protected, for updates or additions Mandville or lafrance or PhilD

Codes used[edit]

SQLi - SQL injection wikipedia

LFI - Local File Inclusion scribd

RFI - Remote file inclusion wikipedia

DT - Directory Traversal wikipedia (incl 777 folders)

ID = Information Disclosure: account information or sensitive information publicly viewable, or passed to 3rd party without knowledge

Future Actions & WIP[edit]

RSS feed completed


to feed VEL direct to twitter

Notes[edit]

The RSS feed is currently fed by item entry order and not by date fixed. List as discussed in jtopic:455746 by PhilD editing by Mandville