Actions

Archived

Difference between revisions of "Vulnerable Extensions List"

From Joomla! Documentation

(December 2009 Compiled Reports)
(December 2009 Compiled Reports)
Line 1: Line 1:
{{RightTOC}}
 
== Check and Report.  ==
 
 
'''Please check with the extension publisher in case of any questions over the security of their product.'''
 
Report Vulnerable extensions either in the [[jforum:432]] security topic or the [http://forum.joomla.org/viewforum.php?f=470 extensions] topic clearly marked.
 
 
== How to use this list ==
 
'''Items will be removed after a suitable period and not on resolution'''
 
All known vulnerable extensions are the listed in the first column. Any in <span style="background:red; color:white">a red box </span>are high where we have not been given a fix for. Alert Advisory details in the centre column (the date is in American format mm/dd/yyyy).
 
The link to the advisory notice.
 
Finally a link to the notice about any <span style="background:#cef2e0; color:black">update with link</span> or <span style="background:red; color:white">'''Not Known''' </span> where none is known.
 
 
'''This list is compiled from found information and may not be an up to date accurate list''' ''We do '''NOT''' promise to test or validate these reports. We do '''NOT''' guarantee the quality or effectiveness of any updates reported to us or listed here.
 
''
 
 
== November 2009 Compiled Vulnerability Reports. ==
 
 
 
Items are not in any particular order.
 
 
 
{| class="wikitable sortable" border="1"
 
|-
 
!  '''Extension'''
 
! class="unsortable"| '''Details'''
 
!  '''Reference Link'''
 
!  '''Extension Update Link'''
 
|-
 
|  style="background:red; color:white"  | '''com_ajaxchat'''
 
|  Summary: PHP remote file inclusion vulnerability in Fiji Web Design Ajax Chat ('''com_ajaxchat''') component 1.0 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[mosConfig_absolute_path] parameter to tests/ajcuser.php.
 
Published: october 28 2009
 
|  [[NIST:CVE-2009-3822|CVE-2009-3822]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_booklibrary'''
 
|  PHP remote file inclusion vulnerability in doc/releasenote.php in the BookLibrary ('''com_booklibrary''') component 1.0 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter, a different vector than [[NIST:CVE-2009-2637|CVE-2009-2637]]. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
 
Published: 10/28/2009
 
CVSS Severity: 7.5 (HIGH)
 
|  [[NIST:CVE-2009-3817|CVE-2009-3817]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_foobla_suggestions'''
 
|  Summary: SQL injection vulnerability in the foobla Suggestions ('''com_foobla_suggestions''') component 1.5.11 for Joomla! allows remote attackers to execute arbitrary SQL commands via the idea_id parameter to index.php.
 
Published: 10/11/2009
 
CVSS Severity: 7.5 (HIGH)
 
|  [[NIST:CVE-2009-3669|CVE-2009-3669]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_djcatalog'''
 
|  Summary: Multiple SQL injection vulnerabilities in the DJ-Catalog ('''com_djcatalog''') component for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) id parameter in a showItem action and (2) cid parameter in a show action to index.php.
 
Published: 10/11/2009
 
CVSS Severity: 6.8 (MEDIUM)
 
|  [[NIST:CVE-2009-3661|CVE-2009-3661]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:#cef2e0; color:black"  | '''com_cbresumebuilder'''
 
|  Summary: SQL injection vulnerability in the JoomlaCache CB Resume Builder (''''''com_cbresumebuilder''') component for Joomla! allows remote attackers to execute arbitrary SQL commands via the group_id parameter in a group_members action to index.php.
 
Published: 10/09/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3645|CVE-2009-3645]]
 
|  style="background:#cef2e0; color:white"  |'''[http://www.joomlacache.com/commercial-extensions/security-update.html Update]'''
 
|-
 
| style="background:red; color:white"  |  '''com_soundset'''
 
|  Summary: SQL injection vulnerability in the Soundset ('''com_soundset''') component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the cat_id parameter to index.php.
 
Published: 10/09/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3644|CVE-2009-3644]]
 
| style="background:red; color:white"  |  '''Not Known'''
 
|-
 
|  style="background:red; color:white"  |'''com_sportfusion'''
 
|  Summary: SQL injection vulnerability in the Kinfusion SportFusion ('''com_sportfusion''') component 0.2.2 through 0.2.3 for Joomla! allows remote attackers to execute arbitrary SQL commands via the cid[0] parameter in a teamdetail action to index.php.
 
Published: 09/30/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3491|CVE-2009-3491]]
 
|  style="background:red; color:white"  |'''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_icrmbasic'''
 
|  Summary: A certain interface in the iCRM Basic ('''com_icrmbasic''') component 1.4.2.31 for Joomla! does not require administrative authentication, which has unspecified impact and remote attack vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
 
Published: 09/30/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3481|CVE-2009-3481]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_mytube'''
 
|  Summary: SQL injection vulnerability in the MyRemote Video Gallery ('''com_mytube''') component 1.0 Beta for Joomla! allows remote attackers to execute arbitrary SQL commands via the user_id parameter in a videos action to index.php.
 
Published: 09/28/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3446|CVE-2009-3446]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_fastball'''
 
|  Summary: SQL injection vulnerability in the Fastball ('''com_fastball''') component 1.1.0 through 1.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the league parameter to index.php.
 
Published: 09/28/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3443|CVE-2009-3443]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_facebook'''
 
|  Summary: SQL injection vulnerability in the JoomlaFacebook ('''com_facebook''') component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a student action to index.php.
 
Published: 09/28/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3438|CVE-2009-3438]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_tupinambis'''
 
|  Summary: SQL injection vulnerability in the Tupinambis ('''com_tupinambis''') component 1.0 for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the proyecto parameter in a verproyecto action to index.php.
 
Published: 09/28/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3434|CVE-2009-3434]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:#cef2e0; color:black"  |'''com_idoblog'''
 
|  Summary: SQL injection vulnerability in the IDoBlog ('''com_idoblog''') component 1.1 build 30 for Joomla! allows remote attackers to execute arbitrary SQL commands via the userid parameter in a profile action to index.php, a different vector than [[NIST:CVE-2008-2627|CVE-2008-2627]].
 
Published: 09/25/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3417|CVE-2009-3417]]
 
|  style="background:#cef2e0; color:white" |'''[http://idojoomla.com/download.html/ '''New Version v 1.1''' (build 32)]'''
 
|-
 
|  style="background:red; color:white"  | '''com_hbssearch'''
 
|  Summary: Cross-site scripting ('''XSS''') vulnerability in the Hotel Booking Reservation System ('''aka HBS or com_hbssearch''') component for Joomla! allows remote attackers to inject arbitrary web script or HTML via the adult parameter in a showhoteldetails action to index.php.
 
Published: 09/24/2009
 
CVSS Severity: 4.3 ('''MEDIUM''')
 
|  [[NIST:CVE-2009-3368|CVE-2009-3368]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_hbssearch'''
 
|  Summary: Multiple SQL injection vulnerabilities in the Hotel Booking Reservation System ('''aka HBS or com_hbssearch''') component for Joomla! allow remote attackers to execute arbitrary SQL commands via the ('''1''') h_id, ('''2''') id, and ('''3''') rid parameters to longDesc.php, and the h_id parameter to ('''4''') detail.php, ('''5''') detail1.php, ('''6''') detail2.php, ('''7''') detail3.php, ('''8''') detail4.php, ('''9''') detail5.php, ('''10''') detail6.php, ('''11''') detail7.php, and ('''12''') detail8.php, different vectors than [[NIST:CVE-2008-5865|CVE-2008-5865]], [[NIST:CVE-2008-5874|CVE-2008-5874]], and [[NIST:CVE-2008-5875|CVE-2008-5875]].
 
Published: 09/24/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3357|CVE-2009-3357]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:#cef2e0; color:black"  |'''com_alphauserpoints'''
 
|  Summary: SQL injection vulnerability in frontend/assets/ajax/checkusername.php in the AlphaUserPoints ('''com_alphauserpoints''') component 1.5.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the username2points parameter.
 
Published: 09/24/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3342|CVE-2009-3342]]
 
|  style="background:#cef2e0; color:white"  |'''[http://www.alphaplug.com/index.php/news/142-alphauserpoints-153-released.html 1.5.3]'''
 
|-
 
|  style="background:red; color:white"  | '''TurtuShout'''
 
|  Summary: SQL injection vulnerability in the TurtuShout component 0.11 for Joomla! allows remote attackers to execute arbitrary SQL commands via the Name field.
 
Published: 09/24/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3335|CVE-2009-3335]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_jinc'''
 
|  Summary: SQL injection vulnerability in the Lhacky! Extensions Cave Joomla! Integrated Newsletters Component ('''aka JINC or com_jinc''') component 0.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the newsid parameter in a messages action to index.php.
 
Published: 09/23/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3334|CVE-2009-3334]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_jbudgetsmagic'''
 
|  Summary: SQL injection vulnerability in the JBudgetsMagic ('''com_jbudgetsmagic''') component 0.3.2 through 0.4.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the bid parameter in a mybudget action to index.php.
 
Published: 09/23/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3332|CVE-2009-3332]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_surveymanager'''
 
|  Summary: SQL injection vulnerability in the Focusplus Developments Survey Manager ('''com_surveymanager''') component 1.5.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the stype parameter in an editsurvey action to index.php.
 
Published: 09/23/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3325|CVE-2009-3325]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_album'''
 
|  Summary: Directory traversal vulnerability in the Roland Breedveld Album ('''com_album''') component 1.14 for Joomla! allows remote attackers to access arbitrary directories and have unspecified other impact via a .. ('''dot dot''') in the target parameter to index.php.
 
Published: 09/23/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3318|CVE-2009-3318]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_jreservation'''
 
|  Summary: SQL injection vulnerability in the JReservation ('''com_jreservation''') component 1.0 and 1.5 for Joomla! allows remote attackers to execute arbitrary SQL commands via the pid parameter in a propertycpanel action to index.php.
 
Published: 09/23/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3316|CVE-2009-3316]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''IXXO Cart Standalone'''
 
|  Summary: SQL injection vulnerability in IXXO Cart Standalone before 3.9.6.1, and the IXXO Cart component for Joomla! 1.0.x, allows remote attackers to execute arbitrary SQL commands via the parent parameter.
 
Published: 09/16/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3215|CVE-2009-3215]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_digifolio'''
 
|  Summary: SQL injection vulnerability in the DigiFolio ('''com_digifolio''') component 1.52 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a project action to index.php.
 
Published: 09/15/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3193|CVE-2009-3193]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_aclassf'''
 
|  Summary: Cross-site scripting ('''XSS''') vulnerability in '''gmap.php''' in the Almond Classifieds ('''com_aclassf''') component 7.5 for Joomla! allows remote attackers to inject arbitrary web script or HTML via the addr parameter.
 
Published: 09/10/2009
 
CVSS Severity: 4.3 ('''MEDIUM''')
 
|  [[NIST:CVE-2009-3155|CVE-2009-3155]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_aclassf'''
 
|  Summary: SQL injection vulnerability in the Almond Classifieds ('''com_aclassf''') component 7.5 for Joomla! allows remote attackers to execute arbitrary SQL commands via the replid parameter in a manw_repl add_form action to index.php, a different vector than [[NIST:CVE-2009-2567|CVE-2009-2567]].
 
Published: 09/10/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3154|CVE-2009-3154]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_jabode'''
 
|  Summary: SQL injection vulnerability in Jabode horoscope extension ('''com_jabode''') for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a sign task to index.php.
 
Published: 09/08/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
 
|  [[NIST:CVE-2008-7169|CVE-2008-7169]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_gameserver'''
 
|  Summary: SQL injection vulnerability in the Game Server ('''com_gameserver''') component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a gamepanel action to index.php.
 
Published: 09/03/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3063|CVE-2009-3063]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_artportal'''
 
|  Summary: SQL injection vulnerability in the Artetics.com Art Portal ('''com_artportal''') component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the portalid parameter to index.php.
 
Published: 09/03/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-3054|CVE-2009-3054]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
| style="background:#cef2e0; color:black" | '''com_agora'''
 
|  Summary: Directory traversal vulnerability in the Agora ('''com_agora''') component 3.0.0b for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the action parameter to the avatars page, reachable through index.php.
 
Published: 09/03/2009
 
CVSS Severity: 6.8 ('''MEDIUM''')
 
|  [[NIST:CVE-2009-3053|CVE-2009-3053]]
 
|  style="background:#cef2e0; color:white" |'''[http://jvitals.com/index.php?option=com_rokdownloads&view=file&Itemid=108&id=282:agora-3-0 3.0.7]'''
 
|-
 
|  style="background:red; color:white"  | '''com_simpleshop'''
 
|  Summary: SQL injection vulnerability in the Simple Shop Galore ('''com_simpleshop''') component for Joomla! allows remote attackers to execute arbitrary SQL commands via the section parameter in a section action to index.php, a different vulnerability than [[NIST:CVE-2008-2568|CVE-2008-2568]]. NOTE: this issue was disclosed by an unreliable researcher, so the details might be incorrect.
 
Published: 08/24/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2008-7033|CVE-2008-7033]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_groups'''
 
|  Summary: SQL injection vulnerability in the Permis ('''com_groups''') component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a list action to index.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
 
Published: 08/17/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-2789|CVE-2009-2789]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
 
|-
 
| style="background:#cef2e0; color:black" | '''com_content'''
 
|  Summary: SQL injection vulnerability in the content component ('''com_content''') 1.0.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the Itemid parameter in a blogcategory action to index.php.
 
Published: 08/10/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2008-6923|CVE-2008-6923]]
 
|  style="background:#cef2e0; color:white"  |'''[http://developer.joomla.org/security/news/305-20091103-core-front-end-editor-issue-.html Resolution]'''
 
|-
 
|  style="background:red; color:white"  | '''com_livechat'''
 
|  Summary: SQL injection vulnerability in the Live Chat ('''com_livechat''') component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the last parameter to getChatRoom.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
 
Published: 07/30/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2008-6883|CVE-2008-6883]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_livechat'''
 
|  Summary: Live Chat ('''com_livechat''') component 1.0 for Joomla! allows remote attackers to use the xmlhttp.php script as an open HTTP proxy to hide network scanning activities or scan internal networks via a GET request with a full URL in the query string.
 
Published: 07/30/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2008-6882|CVE-2008-6882]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''com_livechat'''
 
|  Summary: Multiple SQL injection vulnerabilities in the Live Chat ('''com_livechat''') component 1.0 for Joomla! allow remote attackers to execute arbitrary SQL commands via the last parameter to ('''1''') getChat.php, ('''2''') getChatRoom.php, and ('''3''') getSavedChatRooms.php.
 
Published: 07/30/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2008-6881|CVE-2008-6881]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:#cef2e0; color:black"  |'''JUMI'''
 
|  There is a backdoor in JUMI that installs itself when JUMI is installed on your web site. It sends your credentials to a website, and sets up a back door for remote code execution.
 
Please remove JUMI2.0.5 from the download page immediately to stop people falling victim to this.
 
It will be simple enough to remove the compromised code from this download, but you need to do
 
a full security audit on your site as well as you have been compromised. Added November 2009
 
|  [http://code.google.com/p/jumi/updates/list Report]
 
|  style="background:#cef2e0; color:white"  |[http://code.google.com/p/jumi/updates/list Jumi Update]
 
|-
 
|  style="background:#cef2e0; color:black"  |'''com_photoblog'''
 
|  Input Validation Error Added November 2009
 
|  [http://www.securityfocus.com/bid/36809/ 36809]
 
|  style="background:#cef2e0; color:white"  |[http://webguerilla.net/downloads/3-components-for-joomla-1 webguerilla Photoblog alpha 3b]
 
|-
 
|  style="background:red; color:white"  | '''com_jshop'''
 
|  Summary: SQL injection vulnerability in the JShop ('''com_jshop''') component for Joomla! allows remote attackers to execute arbitrary SQL commands via the pid parameter in a product action to index.php.
 
Published: 11/02/2009
 
CVSS Severity: 7.5 '''(HIGH)'''
 
|  [[NIST:CVE-2009-3835|CVE-2009-3835]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
|-
 
|  style="background:#cef2e0; color:black" |'''BF Survey Pro'''
 
|  Summary: SQL injection vulnerability in the '''BF Survey Pro''' v1.2.5 or lower  (fixed in version 1.2.6). '''BF Survey Basic v1.0''' (fixed in version 1.1). '''BF Quiz v1.1.1''' (fixed in version 1.2 or greater) Added November 2009
 
|  [http://www.tamlyncreative.com.au/software/forum/index.php?topic=357.0 tamlyncreative.com.au]
 
|  style="background:#cef2e0; color:white"  |[http://www.tamlyncreative.com.au/software/forum/index.php?topic=357.0 update]
 
|-
 
|  style="background:#cef2e0; color:black" |'''Joo!BB 0.9.1 '''
 
|  Summary: Persistent XSS/MySQL Injection vulnerabilities in Joo!BB 0.9.1 Added November 2009
 
|  [http://www.joobb.org/community/board/topic/700-MultipleXSSSQLInjectionVulnerabilities.html joob.org]
 
|  style="background:#cef2e0; color:white" |[http://www.joobb.org/downloads/components.html update]
 
|-
 
|  style="background:#cef2e0; color:black"  |'''sh404sef '''
 
|  Summary: sh404sef URI XSS Vulnerability  Added November 2009
 
|  [http://jeffchannell.com/Joomla/sh404sef-uri-xss-vulnerability.html jeffchannell.com]
 
|  style="background:#cef2e0; color:white"  |[http://extensions.siliana.com/en/2009060876/sh404SEF-and-url-rewriting/Interim-release-of-sh404sef-for-Joomla-1.5.x.html update]
 
|-
 
|  style="background:red; color:white"  | '''AWD Wall 1.5'''
 
|  Summary '''AWD Wall 1.5''' Blind SQL Injection Vulnerability.The Joomla component AWD Wall 1.5 suffers from an SQL Injection vulnerability in its handling of the 'cbuser' parameter.Added November 2009
 
|  [http://jeffchannell.com/Joomla/awd-wall-15-blind-sql-injection-vulnerability.html Notice]
 
|style="background:red; color:white"  | '''  Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''EasyBook 2.0.0rc4'''
 
|  Summary: The Joomla component '''EasyBook 2.0.0rc4''' suffers from multiple persistent XSS vulnerabilities. One seems fairly critical, while the others would take some incredible creativity to actively exploit. Added November 2009
 
|  [http://jeffchannell.com/Joomla/easybook-200rc4-multiple-xss-vulnerabilities.html Alert]
 
| style="background:red; color:white"  | '''  Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''F!BB 1.5.96'''
 
|  Summary: The Joomla component '''F!BB 1.5.96 RC''' suffers from multiple persistent XSS vulnerabilities, as well SQL Injection in its user search feature. Added November 2009
 
|  [http://jeffchannell.com/Joomla/fbb-1596-rc-multiple-vulnerabilities.html Alert]
 
| style="background:red; color:white"  | '''  Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''Testimonial Ku 2.0 Admin Panel'''
 
|  Summary: The Joomla component '''Testimonial Ku 2.0''' is vulnerable to persistent XSS in the administrator panel. A malicious user can submit a testimonial containing <script> tags with absolutely no quotes and inject that script into the administrator panel through any of the available inputs except "email". Added November 2009
 
|  [http://jeffchannell.com/Joomla/testimonial-ku-20-admin-panel-persistent-xss.html Alert]
 
| style="background:red; color:white"  | '''  Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''MS Comment 0.8.0b'''
 
|  Summary '''MS Comment 0.8.0b for Joomla''', a commenting plugin, suffers from an multiple vulnerabilities. Added November 2009
 
|  [http://jeffchannell.com/Joomla/ms-comment-080b-multiple-vulnerabilities.html Alert]
 
| style="background:red; color:white"  | '''  Not Known'''
 
|-
 
| style="background:red; color:white"  |  '''!JoomlaComment 4.0 beta1'''
 
|  Summary: '''!JoomlaComment 4.0 beta1''', a commenting plugin, suffers from multiple XSS vulnerabilities. Added November 2009
 
|  [http://jeffchannell.com/Joomla/joomlacomment-40-beta1-multiple-xss-vulnerabilities.html Alert]
 
| style="background:red; color:white"  | '''  Not Known'''
 
|-
 
|  style="background:red; color:white"  | '''WebAmoeba Ticket System 3.0.0'''
 
|  Summary:  '''WebAmoeba Ticket System 3.0.0''', a Joomla help desk component. The vulnerability is with the BBCode library used to parse BBCode tags, as it does not strip javascript: urls from [url] tags. Added November 2009
 
|  [http://jeffchannell.com/Joomla/webamoeba-ticket-system-300-bbcode-xss.html Alert]
 
| style="background:red; color:white"  | '''  Not Known'''
 
|-
 
|style="background:#cef2e0; color:black" |'''Kunena 1.5.x'''
 
|Summary: This is an important security release and users are urged to update immediately. Five security issues and an Internet Explorer 8 table bug have been resolved in this release. This release also contains many other important bug fixes. Added 18 November 2009
 
|[http://www.kunena.com/blog/19-developer-blog/51-kunena-157-security-release-now-available Advisory]
 
|style="background:#cef2e0; color:white"  |[http://www.kunena.com/blog/19-developer-blog/52-kunena-158-service-release-now-available Latest 1.5.8 Version]
 
|-
 
|  style="background:red; color:white"  | '''com_siirler'''
 
|  Summary:  SQL injection vulnerability in the '''Q-Proje Siirler Bileseni (com_siirler)''' component 1.2 RC for Joomla! allows remote attackers to execute arbitrary SQL commands via the sid parameter in an sdetay action to index.php. Added 18 November 2009
 
|  [[NIST:CVE-2009-3972 | CVE-2009-3972]]
 
| style="background:red; color:white"  | '''  Not Known'''
 
|-
 
| style="background:red; color:white"  | '''jTips (com_jtips)'''
 
|SUmmary:SQL injection vulnerability in the '''jTips (com_jtips)''' component 1.0.7 and 1.0.9 for Joomla! allows remote attackers to execute arbitrary SQL commands via the season parameter in a ladder action to index.php. Added 18 November 2009
 
| [[NIST:CVE-2009-3971 |CVE-2009-3971]]
 
|style="background:red; color:white"  | '''  Not Known'''
 
|-
 
|style="background:#cef2e0; color:black"  |'''NinjaMonials'''
 
| Summary: SQL injection vulnerability in the '''NinjaMonials (com_ninjacentral)''' component 1.1.0 for '''Joomla 1.0.x''' ! allows remote attackers to execute arbitrary SQL commands via the testimID parameter in a display action to index.php. Added 18 November 2009
 
|  [[NIST:CVE-2009-3964 | CVE-2009-3964]]
 
|style="background:#cef2e0; color:white"  |'''  [http://ninjaforge.com/index.php?option=com_ninjacentral&page=show_package&id=14&Itemid=235 developer patch Ver 1.2]'''
 
|-
 
|style="background:#cef2e0; color:black"  | '''webee 1.1.1 &1.2'''
 
|Summary: '''webee 1.1.1,''' a Joomla commenting plugin, suffers from multiple vulnerabilities. '''webee has been updated to 1.2''' as of 12 November 2009 and''' still suffers''' from SQL Injection. XSS was not tested in 1.2. Added 19 November 2009
 
| [http://jeffchannell.com/Joomla/webee-111-multiple-vulnerabilities.html jeffchannell.com]
 
|style="background:#cef2e0; color:white" | ''' [http://extensions.joomla.org/extensions/contacts-and-feedback/articles-comments/10155 developer update ver2.0]'''
 
|-
 
|style="background:#cef2e0; color:black"  |'''iF Portfolio Nexus'''
 
|Summary: The '''iF Portfolio Nexus component for Joomla!''' is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements using the id parameter, which could allow the attacker to view, add, modify or delete information in the back-end database. Nov 18, 2009
 
|[http://secunia.com/advisories/37408/ secunia.com 37408/]
 
|style="background:#cef2e0; color:white" |[http://www.inertialfate.za.net/help/forums/topic?id=10&p=3#p172 iF Portfolio Nexus v1.1.1 released]
 
 
|-
 
|style="background:red; color:white"  | '''JoomClip'''
 
|Summary: The '''JoomClip component for Joomla!''' is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements to the index.php script using the cat parameter, which could allow the attacker to view, add, modify or delete information in the back-end database.  Nov 18, 2009
 
|[http://secunia.com/advisories/37400/ secunia.com 37400/]
 
|style="background:red; color:white"  | '''  Not Known'''
 
|-
 
|style="background:#cef2e0; color:black"  |'''Joomla XML'''
 
|Summary: Joomla! before 1.5.15 allows remote attackers to read an extension's XML file, and thereby obtain the extension's version number, via a direct request.
 
Published: 11/16/2009
 
|[[NIST:CVE-2009-3946 | CVE-2009-3946]]
 
|style="background:#cef2e0; color:white"  |'''[http://developer.joomla.org/security/news/306-20091103-core-xml-file-read-issue.html Resolution]'''
 
|-
 
|style="background:red; color:white"  | '''Mygallery Remote SQL Injection Vulnerability'''
 
|Summary: Joomla Component mygallery ( farbinform_krell) Remote SQL Injection Vulnerability Added 27 Nov 2009 {{JVer|1.5}} NB: This could be an error in our database as the only one we could find was for wordpress.If anyone know of one for joomla please let us know..(poss joomlicious.com CM)
 
|[http://www.exploit-db.com]
 
|style="background:red; color:white"  | '''  Not Known'''
 
|-
 
|style="background:red; color:white"  | '''Extreme Google Calendar'''
 
|Summary: '''com_gcalendar 1.1.2''' (gcid) Remote SQL Injection Vulnerability
 
Remote SQL Injection were identified in Google Calendar Component [http://extensions.joomla.org/extensions/calendars-a-events/calendars/4188 Extension Link] Added 27 Nov 2009
 
|[http://www.exploit-db.com reference]
 
|style="background:red; color:white"  | '''  Not Known'''
 
|-
 
|style="background:red; color:white"  | '''LyftenBloggie'''
 
| Summary: [http://www.lyften.com/products/lyftenbloggie.html LyftenBloggie] Component "author" SQL Injection Vulnerability LyftenBloggie 1.x Added 27 Nov 2009
 
|[http://secunia.com/advisories/product/28005/ SA37499]
 
| [http://jeffchannell.com/Joomla/lyften-bloggie-sql-injection-fix.html Un official fix]. Developer fix not release at 30 Nov 09 '''  Not Known'''
 
|-
 
|style="background:#cef2e0; color:black"  |'''Sermon speaker'''
 
|Summary: [http://joomlacode.org/gf/project/sermon_speaker sermon speaker] sql vulnerability and password reset vulnerability version 3.2 and below
 
|
 
|style="background:#cef2e0; color:white"  |[http://joomlacode.org/gf/project/sermon_speaker/forum/?action=ForumBrowse&forum_id=7897&_forum_action=ForumMessageBrowse&thread_id=15219 Developer fix] 30 Nov 2009
 
|-
 
|style="background:#cef2e0; color:white"  | [http://joomlacode.org/gf/project/musicgallery/ MusicGallery]
 
|Summary: [http://joomlacode.org/gf/project/musicgallery/ Component MusicGallery] SQL Injection Vulnerability 30 November {{JVer|1.5}}
 
|[[NIST:CVE-2009-4217 | CVE-2009-4217]]
 
|[http://joomlacode.org/gf/project/musicgallery/ developer]
 
|}
 
 
----
 
 
 
== December 2009 Compiled Reports ==
 
== December 2009 Compiled Reports ==
 
{| class="wikitable sortable" border="1"
 
{| class="wikitable sortable" border="1"
Line 555: Line 133:
 
|style="background:red; color:white"  | '''  Not Known'''
 
|style="background:red; color:white"  | '''  Not Known'''
 
|-
 
|-
|style="background:red; color:white" | '''com_digistore'''
+
|style="background:#cef2e0; color:black" | '''com_digistore'''
 
|Summary:  com_digistore SQL injection EDB-ID: 10546 added: 2009-12-18  {{JVer|1.5}}
 
|Summary:  com_digistore SQL injection EDB-ID: 10546 added: 2009-12-18  {{JVer|1.5}}
 
|[http://www.exploit-db.com Reference]
 
|[http://www.exploit-db.com Reference]
|style="background:red; color:white"  | ''' New Release on Monday Dec. 21'''
+
|style="background:#cef2e0; color:white"  | '''[http://www.ijoomla.com/ijoomla-digistore/ijoomla-digistore/index/ update] '''
 
|-
 
|-
 
|style="background:red; color:white" | '''com_jbook'''
 
|style="background:red; color:white" | '''com_jbook'''
Line 583: Line 161:
 
|
 
|
 
|}
 
|}
 
== Notes ==
 
List as discussed in  [[jtopic:455746]] by [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=67439 PhilD] editing by [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=28000 Mandville]
 
Exploits under investigation are held on this [http://docs.joomla.org/Investigation_of_exploits exploit''' investigation''' list]
 
----
 
[[Category:Security]]
 
[[Category:Security_FAQ]]
 
 
----
 

Revision as of 13:36, 22 December 2009

Replacement filing cabinet.png
This page has been archived - Please Do Not Edit or Create Pages placed in this namespace. The pages in the Archived namespace exist only as a historical reference, it will not be improved and its content may be incomplete.

December 2009 Compiled Reports

Extension Details Reference Link Extension Update Link
Omilen Photo Gallery Summary: Directory traversal vulnerability in the Omilen Photo Gallery (com_omphotogallery) component Beta 0.5 for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the controller parameter to index.php.

Published: 12/04/2009

CVE-2009-4202 Not Known
Seminar Summary: SQL injection vulnerability in the Seminar (com_seminar) component 1.28 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a View_seminar action to index.php.

Published: 12/04/2009

CVE-2009-4200 Not Known
Mambo Resident Summary: Multiple SQL injection vulnerabilities in the Mambo Resident (aka Mos Res or com_mosres) component 1.0f for Mambo and Joomla!, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) property_uid parameter in a viewproperty action to index.php and the (2) regID parameter in a showregion action to index.php. Mambo Resident component for v4.5.2 may only be for 1.0.xx versions of J!

Published: 12/04/2009

CVE-2009-4199 Replacement Extension 08 dec 09
ProofReader Summary: Multiple cross-site scripting (XSS) vulnerabilities in index.php in the ProofReader (com_proofreader) component 1.0 RC9 and earlier for Joomla! allow remote attackers to inject arbitrary web script or HTML via the URI, which is not properly handled in (1) 404 or (2) error pages. Published: 12/02/2009 CVSS Severity: 4.3 (MEDIUM) CVE-2009-4157 Not Known
Laoneo Google Calendar GCalendar Summary: SQL injection vulnerability in the Google Calendar GCalendar (com_gcalendar) component 1.1.2, 2.1.4, and possibly earlier versions for Joomla! allows remote attackers to execute arbitrary SQL commands via the gcid parameter. NOTE: some of these details are obtained from third party information. Published: 11/29/2009 CVSS Severity: 7.5 (HIGH) Note: There is already a listing for GCalendar 1.1.2 CVE-2009-4099 Not Known
D4J eZine Summary: PHP remote file inclusion vulnerability in class/php/d4m_ajax_pagenav.php in the D4J eZine (com_ezine) component 2.1 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS mosConfig_absolute_path parameter. Published: 11/29/2009 CVSS Severity: 7.5 (HIGH) CVE-2009-4094 Not Known
Quick News Summary: The Joomla Quick News component suffers from a remote SQL injection vulnerability. added 1st Dec 09 Reference Not Known
Joaktree component Summary: Joaktree Vulnerability : SQL injection/ added 1st Dec 09 7508 Not Known
mojoblog Summary MojoBlog Multiple Remote File Include Vulnerability added 1st Dec 09 Joomla 1.5 7509 Not Known
YJ Whois Summary: YJ Whois Low security risk,and fixesMalicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable application to fool a user in order to gather data from them. An attacker can steal the session cookie and take over the account. Files affected is , modules/mod_yj_whois.php added 3 December 09 Reference Developer Notice and fix 03 dec 09
yt_color YOOOtheme Summary: YT_color yootheme Malicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable application to fool a user in order to gather data from them. An attacker can steal the session cookie and take over the account. added 5 dec 09 Reference All members without an active membership can download the template patches here.
TP Whois summary: TP Whois Malicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable application to fool a user in order to gather data from them. An attacker can steal the session cookie and take over the account. Added 3 december Joomla 1.5 Refrence Not Known
com_job Summary: Component com_job ( showMoreUse) SQL injection vulnerability Added 9th Dec Reference Not Known
JQuarks Summary: JQuarks SQL injection vulnerability Joomla 1.5 added 8th dec 09 Reference Developer Update
Mamboleto Component 2.0 RC3 Summary: Mamboleto Component 2.0 RC3SQL injection vulnerability Joomla 1.5 added 12 December Reference Not Known
JS JOBS Summary JS JOBS Joomla Component com_jsjobs 1.0.5.6 SQL Injection Vulnerabilities Joomla 1.5 added 12 December Reference Developer update 1.0.5.7
corePHP JPhoto Summary: 'corePHP' JPhotoSQL injection vulnerability Joomla 1.5 added 12 December Reference Developer Upgrade
com_virtuemart Summary: "com_virtuemart" http://virtuemart.net/ Version : 1.0 Vulnerability : SQL injection added Date : 07-12-09 Joomla 1.5 Reference latest version
Kide Shoutbox Summary: The Kide Shoutbox (com_kide) component 0.4.6 for Joomla! does not properly perform authentication, which allows remote attackers to post messages with an arbitrary account name via an insertar action to index.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Added: December 08 CVE-2009-4232 Not Known
JoomPortfolio Component Summary: JoomPortfolio Input passed via the "secid" parameter to index.php (when "option" is set to "com_joomportfolio" and "task" is set to "showcat") is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.The vulnerability is reported in version 1.0.0. Other versions may also be affected. Added: December 18 Joomla 1.5 Reporting Site Not Known
City Portal (templates?) Summary: City Portal Blind SQL Injection Vulnerability added: 2009-12-18 Reference Possibly this tempate Not Known
Event Manager Summary: Event Manager Blind SQL Injection Vulnerability EDB-ID: 10549

added: 2009-12-18

Reference Not Known
com_zcalendar Summary: com_zcalendar Blind SQL-injection Vulnerability

EDB-ID: 10548 added: 2009-12-18

Reference Not Known
com_acmisc Summary: com_acmisc SQL injection added: 2009-12-18 Reference Not Known
com_digistore Summary: com_digistore SQL injection EDB-ID: 10546 added: 2009-12-18 Joomla 1.5 Reference update
com_jbook Summary: com_jbook Blind SQL-injection EDB-ID: 10545 added: 2009-12-18 Joomla 1.0 Reference Not Known
com_personel Summary: com_personel component for Joomla! is vulnerable to SQL injection. iss.net reference Not Known