Archived

Difference between revisions of "Vulnerable Extensions List"

From Joomla! Documentation

(Remove under investigation page link now deleted)
 
(701 intermediate revisions by 12 users not shown)
Line 1: Line 1:
{{RightTOC}}
 
== Check and Report.  ==
 
  
  
 +
{{notice|This document has now been replaced by the website at [http://vel.joomla.org/ vel.joomla.org from 1st May 2013]
 +
Please refer to there for the latest updates}}
 +
 +
<!-- ***all wiki editors*** - do NOT touch without notice  -->
 +
'''List prior to January 2011 ([[Archived vel|now archived]])''' Please check here also.
 +
<!-- if you have altered the above line then revert your changes and contact me  -->
 +
 +
== Check and Report.  ==
 
'''Please check with the extension publisher in case of any questions over the security of their product.'''
 
'''Please check with the extension publisher in case of any questions over the security of their product.'''
Report Vulnerable extensions either in the [[jforum:432]] security topic or the [http://forum.joomla.org/viewforum.php?f=470 extensions] topic clearly marked with the first word in the title being ''Vulnerable'' where the security moderators or JSST team will respond.
+
{{notice|small=yes|image=Stop hand nuvola.svg
This list is change protected, for updates or editing requests [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=28000 Mandville] or [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=87230 lafrance]
+
  |header=Procedure change|All reports are now to be made via vel.joomla.org}}
 +
Report Vulnerable extensions in the [http://vel.joomla.org vel website]
 +
*If you are seeing this page on any site other than [http://docs.joomla.org/Vulnerable_Extensions_List the Offical Joomla Documentation] you may be seeing an out of date version or experiencing [http://en.wikipedia.org/wiki/Plagiarism plagiary] and the links may not work properly
  
 
== How to use this list ==
 
== How to use this list ==
'''Items will be removed after a suitable period and not on resolution'''
+
'''Items will be removed after a suitable period and not on resolution.'''
All known vulnerable extensions are the listed in the first column. Any in <span style="background:red; color:white">a red box </span>are high where we have not been given a fix for. Alert Advisory details in the centre column (the date is in American format mm/dd/yyyy).
+
{{notice|This document has now been replaced by the website at [http://vel.joomla.org/ vel.joomla.org from 1st May 2013]
The link to the advisory notice.
+
Please refer to there for the latest updates}}
Finally a link to the notice about any <span style="background:#cef2e0; color:black">update with link</span> or <span style="background:red; color:white">'''Not Known''' </span> where none is known.
+
 
 +
All known vulnerable extensions are the listed in the first column "Extension". Any in a <span style="background:red; color:white">red box </span>are where we have not been given a fix. Any in a <span style="background:#cef2e0; color:black">turquoise box</span> contain a link to the notice about an <span style="background:#cef2e0; color:black">update with link.</span> Any that are in an uncolored box are a "Contact the Developer About This Extension".
 +
Alert Advisory details are in the center column.
 +
If the "Extension Update Link & Date Column has <span style="background:red; color:white">'''Not Known''' </span> then it is where no update is known.
  
 
'''This list is compiled from found information and may not be an up to date accurate list''' ''We do '''NOT''' promise to test or validate these reports. We do '''NOT''' guarantee the quality or effectiveness of any updates reported to us or listed here.''
 
'''This list is compiled from found information and may not be an up to date accurate list''' ''We do '''NOT''' promise to test or validate these reports. We do '''NOT''' guarantee the quality or effectiveness of any updates reported to us or listed here.''
 
To sign up for the feed please [http://feeds.joomla.org/JoomlaSecurityVulnerableExtensions follow this link]
 
To sign up for the feed please [http://feeds.joomla.org/JoomlaSecurityVulnerableExtensions follow this link]
 +
* We do not list BETA products, or extensions for J1.0.x
 +
 +
== Developers - How to get yourself removed from the VEL ==
 +
 +
Resolved items will be removed after a suitable period and not on resolution
 +
 +
Please solve the issues and:
  
== November 2009 Compiled Vulnerability Reports. ==
+
* '''If JED listed'''
+
 
 +
To have your extension republished, please follow these steps:
 +
 
 +
1- Solve the issues.
 +
 
 +
2- Attach the new zip file at your actual JED listing.
 +
 
 +
3- Change the extension version at JED listing.
 +
 
 +
4- Make sure to include a notice in the JED description to the fact that the new release is a "Security Release" and those who use the extension should upgrade immediately.
 +
 
 +
5-complete the resolution form on the website at [http://vel.joomla.org/ vel.joomla.org from 1st May 2013]
 +
 
 +
6- Create a [http://bit.ly/velunlist JED listing owner ticket] to the JED with a notice and ask that your listing be republished. Include the full details of your new version number and security notice page
  
Items are not in any particular order.
+
VEL email can be found above and the JED support link is in your notice of "unpublication" [http://extensions.joomla.org/component/maqmahelpdesk/ and here]
  
 +
* '''If not JED listed.'''
 +
Inform us by '''email''' with a notice of resolution, the latest version number '''and''' a link to the security release statement on your website.
  
 +
== January 2012 and onwards Reported Vulnerable Extensions ==
 +
<startFeed />
 
{| class="wikitable sortable" border="1"
 
{| class="wikitable sortable" border="1"
 
|-
 
|-
 
!  '''Extension'''
 
!  '''Extension'''
 
! class="unsortable"| '''Details'''
 
! class="unsortable"| '''Details'''
!  '''Reference Link'''
+
!  '''Date Added'''
! '''Extension Update Link'''
+
! class="unsortable" |'''Extension Update Link & Date'''
 +
 
 +
|-
 +
|
 +
==  civic crm 422==
 +
|upload exploit /RFI
 +
|260413
 +
|developer http://civicrm.org/category/civicrm-blog-categories/civicrm-v43 release 4.3.1
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
==  alfcontact ==
 +
|xss
 +
|230413
 +
|developer release [http://www.alfsoft.com statement on ALFContact v2.0.8 for J!2.5 ALFContact v3.1.4 for J!3]
 +
 
 +
|-
 +
|
 +
==  aiContactSafe 2.0.19 ==
 +
|xss
 +
|160413
 +
|developer release statement  [http://www.algisinfo.com/en/home-bottom/41-xss-in-aicontactsafe.html for version 2.0.21]
 +
 
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  RSfiles==
 +
|SQL
 +
|180313
 +
|developer release statement  [http://www.rsjoomla.com/support/documentation/view-knowledgebase/141-changelog.html for version 12]
 +
 
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  Multiple Customfields Filter for Virtuemart  ==
 +
|SQLi
 +
|18212
 +
|developers [http://myext.eu/en/update/47-v1-66  1.6.8 update statement]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  Collector    ==
 +
|Various [steevo.fr]
 +
|230113
 +
|developer update [http://www.steevo.fr/en/component/content/article/41-release-051 statement to] 0.5.1
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  tz guestbook  ==
 +
|Various
 +
|100113
 +
|developer release statement [http://www.templaza.com/item/256-tz-guestbook-v1-1-2-security-release for 1.1.2]
 +
|-
 +
|
 +
 
 +
== extplorer    ==
 +
| 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 are vulnerable to an authentication bypass
 +
|251212
 +
|developer [http://extplorer.net/news/12  update to 2.1.3 statement]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  JooProperty    ==
 +
|SQLi
 +
|101212
 +
|developer release new version 1.13.1 -  [http://jooproperty.com/en/forum/last-jooproperty-release/277-important-security-fix-released-please-update.html#277 upgrade notice]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  Multiple Customfields Filter for Virtuemart  ==
 +
|SQLi
 +
|18212
 +
|developers [http://myext.eu/en/update/47-v1-66  update statement]
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
==  ag google analytic    ==
 +
|Various
 +
|061212
 +
|
 +
|-
 +
|
 +
 
 +
== sh404sef <3.7.0 ==
 +
|Undisclosed sh404SEF 3.4.x, 3.5.x, 3.6.x for Joomla 2.5
 +
|26112
 +
|developer [http://anything-digital.com/sh404sef/news/releases/sh404sef-3_7_0_1485-released.html statement]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== Login Failed Log    ==
 +
|23112
 +
|ID - information disclosure
 +
|developer [http://www.jm-experts.com/extensions-tools/login-failed-log release statement] to ver 1.5.4
 +
|-
 +
|
 +
 
 +
== jNews==
 +
|
 +
|131112
 +
|developer update [http://www.joobi.co/index.php?option=com_content&view=article&id=8560:security-release-update-to-jnews-79x&catid=93:jnews&Itemid=225 statement to version  7.9.1] 151112
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
 
 +
== Joombah Jobs    ==
 +
|Upload restriction issues
 +
|131112
 +
|developer update [http://www.joombah.com/home/item/joombah-jobs-security-release-update-now statement]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== commedia    ==
 +
|RFI
 +
|231012
 +
|developer update [http://www.ecolora.com/index.php/15-commedia-a-mp3browser-new/77-commedia-3-2-is-not-vulnerable#english statement to version 3.2] 271012
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
 
 +
==  Kunena ==
 +
|SQLi + ID
 +
|221012
 +
|Developer states [http://www.kunena.org/forum/announcement/id-52 current version not exploitable] by reported methods
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
 
 +
==  Icagenda  ==
 +
|SQLi
 +
|
 +
|Developer  [http://www.joomlic.com/en/extensions/icagenda  statement for 1.2.9]
 +
|-
 +
|style="background:red; color:white" |
 +
 
 +
==  JTag [joomlatag]  ==
 +
|SQLi
 +
|
 +
|
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
==  Freestyle Support  ==
 +
|SQLi
 +
|
 +
|developer update [http://freestyle-joomla.com/help/announcements?announceid=60 statement 251012]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  ACEFTP  ==
 +
|DT
 +
|011012
 +
|AceFTP 2.0.0 released. Developer [http://www.joomace.net/blog/aceftp/aceftp-200-has-been-released statement] 101012
 +
|-
 +
|
 +
 
 +
==  MijoFTP  ==
 +
|DT
 +
|011012
 +
|*''reported fixed prior to notification''*
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  spider calendar lite  ==
 +
|RFI
 +
|180912
 +
|developer release version 1.5 [http://web-dorado.com/products/joomla-calendar-module.html  version]
 +
|-
 +
|
 +
 
 +
==  RokModule  ==
 +
|SQLi
 +
|Rereported 180912
 +
|Developer states: no known exploits for our current versions [http://www.rockettheme.com/extensions-downloads/free/1012-rokmodule of RokModule Joomla 2.5 - v1.3 Joomla 1.5 - v1.4]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  ICagenda  ==
 +
| SQLi
 +
|developer [http://www.joomlic.com/en/extensions/icagenda security release] - v1.2.1
 +
|080912
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
 
 +
==  En Masse cart  ==
 +
|RFI
 +
|060812
 +
|Developer upgrade statement [http://www.matamko.com/news-update/14-en-masse-releases/142-announcement-for-security-release-enmasse-313.html  to 3.1.3]
 +
|-
 +
|
 +
 
 +
==  JCE (joomla content editor)  ==
 +
|Upload Restriction <2.2.4
 +
|050812
 +
|Developer states current version not exploitable
 +
|-
 +
|
 +
 
 +
==  RSGallery2  ==
 +
|SQLi XSS
 +
| 31 07 12
 +
|Devleoper statement versions 3.2.0 for Joomla 2.5 and version 2.3.0 for Joomla 1.5  [http://www.rsgallery2.nl/topicseen./announcements/rsgallery2_3.2.0_and_2.3.0_released_16845.msg44046.html released]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
==  osproperty  ==
 +
|Unrestricted uploads
 +
|160712
 +
|Developer release [http://joomservices.com/components/ossolution-property.html version  2.0.3] 180712
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== KSAdvertiser    ==
 +
| RFI
 +
|160712
 +
|The security update version 1.5.72 advise can be found here:
 +
[http://www.kiss-software.de/index.php?option=com_content&view=article&id=251:kiss-advertiser-sicherheitsupdate&catid=69&Itemid=361&lang=de German] [http://www.kiss-software.de/index.php?option=com_content&view=article&id=252:kiss-advertiser-security-update&catid=21&Itemid=362&lang=en English]
 
|-
 
|-
| style="background:#cef2e0; color:black" | '''com_ajaxchat'''
+
|style="background:#cef2e0; color:black" |
| Summary: PHP remote file inclusion vulnerability in Fiji Web Design Ajax Chat ('''com_ajaxchat''') component 1.0 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[mosConfig_absolute_path] parameter to tests/ajcuser.php.New version release December 22,2009
+
 
Published: october 28 2009
+
== Shipping by State for Virtuemart  ==
| [[NIST:CVE-2009-3822|CVE-2009-3822]]
+
|elevated permissions (http://web-expert.gr/en)
|  style="background:#cef2e0; color:white"  | [http://extensions.joomla.org/extensions/communication/chat/10767 update v 1.1]
+
|160612
 +
| [http://web-expert.gr/en/commersial/virtuemart-shipping-by-state-component Upgrade to v2.5 download] commercial product 300612
 
|-
 
|-
| style="background:red; color:white" | '''com_booklibrary'''
+
|style="background:red; color:white" |
| PHP remote file inclusion vulnerability in doc/releasenote.php in the BookLibrary ('''com_booklibrary''') component 1.0 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter, a different vector than [[NIST:CVE-2009-2637|CVE-2009-2637]]. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
+
 
Published: 10/28/2009
+
== ownbiblio 1.5.3  ==
CVSS Severity: 7.5 (HIGH)
+
|SQLi +
| [[NIST:CVE-2009-3817|CVE-2009-3817]]
+
|250512
| style="background:red; color:white"  | '''Not Known'''
+
|
 
|-
 
|-
|   style="background:#cef2e0; color:black" | '''com_foobla_suggestions'''
+
|
|  Summary: SQL injection vulnerability in the foobla Suggestions ('''com_foobla_suggestions''') component 1.5.11 for Joomla! allows remote attackers to execute arbitrary SQL commands via the idea_id parameter to index.php.
+
 
Published: 10/11/2009
+
=Ninjaxplorer <=1.0.6  ==
CVSS Severity: 7.5 (HIGH)
+
|developer notification
| [[NIST:CVE-2009-3669|CVE-2009-3669]]
+
|250412
| style="background:#cef2e0; color:white"  | [http://foobla.com/news/latest/fixed-foobla-suggestions-for-joomla-idea_id-sql-injection-vulnerability.html developer reported upgrade]
+
|developer statement [http://ninjaforge.com/blog/318-security-vulnerability-discovered-in-ninjaxplorer-upgrade-immediately upgrade to 1.0.7]
 
|-
 
|-
| style="background:red; color:white" | '''com_djcatalog'''
+
|style="background:#cef2e0; color:black" |
| Summary: Multiple SQL injection vulnerabilities in the DJ-Catalog ('''com_djcatalog''') component for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) id parameter in a showItem action and (2) cid parameter in a show action to index.php.
+
 
Published: 10/11/2009
+
== Phoca Fav Icon    ==
CVSS Severity: 6.8 (MEDIUM)
+
|Permissions Rewrite
|  [[NIST:CVE-2009-3661|CVE-2009-3661]]
+
|150412
|  style="background:red; color:white"  | '''Not Known'''
+
| [http://www.phoca.cz/news/30-phoca-news/633-phoca-favicon-203-released developer update 2.0.3 statement]
 
|-
 
|-
| style="background:#cef2e0; color:black"  | '''com_cbresumebuilder'''
+
|style="background:#cef2e0; color:black" |
| Summary: SQL injection vulnerability in the JoomlaCache CB Resume Builder (''''''com_cbresumebuilder''') component for Joomla! allows remote attackers to execute arbitrary SQL commands via the group_id parameter in a group_members action to index.php.
+
 
Published: 10/09/2009
+
== estateagent improved  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|sqli (eaimproved.eu)
| [[NIST:CVE-2009-3645|CVE-2009-3645]]
+
|110412
| style="background:#cef2e0; color:white"  |'''[http://www.joomlacache.com/commercial-extensions/security-update.html Developer Update]'''
+
|developer states previous version, not current version
 
|-
 
|-
| style="background:red; color:white" | '''com_soundset'''
+
|
| Summary: SQL injection vulnerability in the Soundset ('''com_soundset''') component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the cat_id parameter to index.php.
+
 
Published: 10/09/2009
+
=bearleague  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|110412
|  [[NIST:CVE-2009-3644|CVE-2009-3644]]
+
|sql
| style="background:red; color:white"  |  '''Not Known'''
+
|(no longer maintained)
 
|-
 
|-
| style="background:red; color:white" |'''com_sportfusion'''
+
|
|  Summary: SQL injection vulnerability in the Kinfusion SportFusion ('''com_sportfusion''') component 0.2.2 through 0.2.3 for Joomla! allows remote attackers to execute arbitrary SQL commands via the cid[0] parameter in a teamdetail action to index.php.
+
 
Published: 09/30/2009
+
=JLive! Chat v4.3.1  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|DT
| [[NIST:CVE-2009-3491|CVE-2009-3491]]
+
|060412
|  style="background:red; color:white"  |'''Not Known'''
+
|Developer reports [http://www.cmsfruit.com/security-measures.html  as unproven]
 
|-
 
|-
| style="background:red; color:white" | '''com_icrmbasic'''
+
|style="background:#cef2e0; color:black" |
|  Summary: A certain interface in the iCRM Basic ('''com_icrmbasic''') component 1.4.2.31 for Joomla! does not require administrative authentication, which has unspecified impact and remote attack vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
+
 
Published: 09/30/2009
+
==  virtuemart 2.0.2 ==
CVSS Severity: 7.5 ('''HIGH''')
+
|SQLi
| [[NIST:CVE-2009-3481|CVE-2009-3481]]
+
|050412
|  style="background:red; color:white"  | '''Not Known'''
+
|developers [http://virtuemart.net/news/list-all-news/417-happy-easter-new-virtuemart-204-released-security-update-sqli release statement]Current version 2.0.6 released
 
|-
 
|-
style="background:red; color:white"  | '''com_mytube'''
+
|
| Summary: SQL injection vulnerability in the MyRemote Video Gallery ('''com_mytube''') component 1.0 Beta for Joomla! allows remote attackers to execute arbitrary SQL commands via the user_id parameter in a videos action to index.php.
+
 
Published: 09/28/2009
+
== JE testimonial    ==
CVSS Severity: 7.5 ('''HIGH''')
+
|SQLi
| [[NIST:CVE-2009-3446|CVE-2009-3446]]
+
|230312
| style="background:red; color:white"  | '''Not Known'''
+
|Developer states '''malicious report.'''
 
|-
 
|-
| style="background:red; color:white"  | '''com_fastball'''
+
|style="background:#cef2e0; color:black" |
| Summary: SQL injection vulnerability in the Fastball ('''com_fastball''') component 1.1.0 through 1.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the league parameter to index.php.
+
 
Published: 09/28/2009
+
== JaggyBlog  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|excessive file permission
|  [[NIST:CVE-2009-3443|CVE-2009-3443]]
+
|090212
|  style="background:#cef2e0; color:white"  | [http://www.fastballproductions.com  latest version] 1.2.1
+
|version 1.3.1 [http://www.jaggysnake.co.uk/products/jaggyblog released]  
 
|-
 
|-
| style="background:red; color:white"  | '''com_facebook'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in the JoomlaFacebook ('''com_facebook''') component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a student action to index.php.
+
 
Published: 09/28/2009
+
== Quickl Form  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|xss
| [[NIST:CVE-2009-3438|CVE-2009-3438]]
+
|260112
| style="background:red; color:white"  | '''Not Known'''
+
|
 
|-
 
|-
| style="background:red; color:white"  | '''com_tupinambis'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in the Tupinambis ('''com_tupinambis''') component 1.0 for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the proyecto parameter in a verproyecto action to index.php.
+
 
Published: 09/28/2009
+
== com_advert  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|sqli - unknown developer
| [[NIST:CVE-2009-3434|CVE-2009-3434]]
+
|240112
| style="background:red; color:white"  | '''Not Known'''
+
|
 
|-
 
|-
| style="background:#cef2e0; color:black" |'''com_idoblog'''
+
|style="background:#cef2e0; color:black" |
|  Summary: SQL injection vulnerability in the IDoBlog ('''com_idoblog''') component 1.1 build 30 for Joomla! allows remote attackers to execute arbitrary SQL commands via the userid parameter in a profile action to index.php, a different vector than [[NIST:CVE-2008-2627|CVE-2008-2627]].
+
 
Published: 09/25/2009
+
== Joomla Discussions Component    ==
CVSS Severity: 7.5 ('''HIGH''')
+
|sqli
| [[NIST:CVE-2009-3417|CVE-2009-3417]]
+
|180112
style="background:#cef2e0; color:white" |'''[http://idojoomla.com/download.html/ '''New Version v 1.1''' (build 32)]'''
+
|Discussions 1.4.1 released [http://www.codingfish.com/news/38-joomla/101-discussions-141-released developer statement]
 
|-
 
|-
| style="background:red; color:white" | '''com_hbssearch'''
+
|style="background:#cef2e0; color:black" |
|  Summary: Cross-site scripting ('''XSS''') vulnerability in the Hotel Booking Reservation System ('''aka HBS or com_hbssearch''') component for Joomla! allows remote attackers to inject arbitrary web script or HTML via the adult parameter in a showhoteldetails action to index.php.
+
 
Published: 09/24/2009
+
== HD Video Share (contushdvideoshare) ==
CVSS Severity: 4.3 ('''MEDIUM''')
+
|sqli
| [[NIST:CVE-2009-3368|CVE-2009-3368]]
+
|180112
|  style="background:red; color:white"  | '''Not Known'''
+
|updated [http://www.hdvideoshare.net version 2.2]
 
|-
 
|-
| style="background:red; color:white"  | '''com_hbssearch'''
+
|style="background:#cef2e0; color:black" |
| Summary: Multiple SQL injection vulnerabilities in the Hotel Booking Reservation System ('''aka HBS or com_hbssearch''') component for Joomla! allow remote attackers to execute arbitrary SQL commands via the ('''1''') h_id, ('''2''') id, and ('''3''') rid parameters to longDesc.php, and the h_id parameter to ('''4''') detail.php, ('''5''') detail1.php, ('''6''') detail2.php, ('''7''') detail3.php, ('''8''') detail4.php, ('''9''') detail5.php, ('''10''') detail6.php, ('''11''') detail7.php, and ('''12''') detail8.php, different vectors than [[NIST:CVE-2008-5865|CVE-2008-5865]], [[NIST:CVE-2008-5874|CVE-2008-5874]], and [[NIST:CVE-2008-5875|CVE-2008-5875]].
+
 
Published: 09/24/2009
+
== Simple File Upload 1.3 ==
CVSS Severity: 7.5 ('''HIGH''')
+
|RFI
|  [[NIST:CVE-2009-3357|CVE-2009-3357]]
+
|010112
|  style="background:red; color:white"  | '''Not Known'''
+
| Developer update [http://wasen.net/index.php?option=com_content&view=article&id=64:simple-file-upload-download&catid=40:project-simple-file-upload&Itemid=59  statement] to 1.3.5
 
|-
 
|-
style="background:#cef2e0; color:black"  |'''com_alphauserpoints'''
+
|
|  Summary: SQL injection vulnerability in frontend/assets/ajax/checkusername.php in the AlphaUserPoints ('''com_alphauserpoints''') component 1.5.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the username2points parameter.
+
 
Published: 09/24/2009
+
==    ==
CVSS Severity: 7.5 ('''HIGH''')
+
|
[[NIST:CVE-2009-3342|CVE-2009-3342]]
+
|
|  style="background:#cef2e0; color:white"  |'''[http://www.alphaplug.com/index.php/news/142-alphauserpoints-153-released.html 1.5.3]'''
+
|
 +
|}<endFeed />
 +
 
 +
== January 2011 - Jan 2012 Reported Vulnerable Extensions ==
 +
 
 +
 
 +
'''Please check with the extension publisher in case of any questions over the security of their product.'''
 +
Report Vulnerable extensions either in the [[jforum:432]] security topic clearly marked with the first word in the title being ''Vulnerable Report'' where the security moderators or JSST team will respond or via email to the VEL team. For a guide to the [http://docs.joomla.org/Vulnerable_Extensions_List#Codes_used codes]
 +
*If you are seeing this page on any site other than [http://docs.joomla.org/Vulnerable_Extensions_List the Offical Joomla Documentation] you may be seeing an out of date version or experiencing [http://en.wikipedia.org/wiki/Plagiarism plagiary] and the links may not work properly
 +
 
 +
<startFeed />
 +
{| class="wikitable sortable" border="1"
 
|-
 
|-
| style="background:red; color:white" | '''TurtuShout'''
+
! '''Extension'''
| Summary: SQL injection vulnerability in the TurtuShout component 0.11 for Joomla! allows remote attackers to execute arbitrary SQL commands via the Name field.
+
! class="unsortable"| '''Details'''
Published: 09/24/2009
+
! '''Date Added'''
CVSS Severity: 7.5 ('''HIGH''')
+
! class="unsortable" |'''Extension Update Link & Date'''
|  [[NIST:CVE-2009-3335|CVE-2009-3335]]
 
|  style="background:red; color:white" | '''Not Known'''
 
 
|-
 
|-
| style="background:red; color:white"  | '''com_jinc'''
+
|style="background:#cef2e0; color:black" |
| Summary: SQL injection vulnerability in the Lhacky! Extensions Cave Joomla! Integrated Newsletters Component ('''aka JINC or com_jinc''') component 0.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the newsid parameter in a messages action to index.php.
+
== Simple File Upload 1.3 ==
Published: 09/23/2009
+
|RFI
CVSS Severity: 7.5 ('''HIGH''')
+
|010112
|  [[NIST:CVE-2009-3334|CVE-2009-3334]]
+
| Developer update [http://wasen.net/index.php?option=com_content&view=article&id=64:simple-file-upload-download&catid=40:project-simple-file-upload&Itemid=59  statement] to 1.3.5
|  style="background:red; color:white"  | '''Not Known'''
 
 
|-
 
|-
| style="background:red; color:white"  | '''com_jbudgetsmagic'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in the JBudgetsMagic ('''com_jbudgetsmagic''') component 0.3.2 through 0.4.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the bid parameter in a mybudget action to index.php.
+
 
Published: 09/23/2009
+
== Dshop    ==
CVSS Severity: 7.5 ('''HIGH''')
+
|sqli (possibly dhrusya.com)
| [[NIST:CVE-2009-3332|CVE-2009-3332]]
+
|201111
| style="background:red; color:white"  | '''Not Known'''
+
|
 
|-
 
|-
| style="background:red; color:white"  | '''com_surveymanager'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in the Focusplus Developments Survey Manager ('''com_surveymanager''') component 1.5.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the stype parameter in an editsurvey action to index.php.
+
 
Published: 09/23/2009
+
== QContacts 1.0.6  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|sqli
| [[NIST:CVE-2009-3325|CVE-2009-3325]]
+
|131211
| style="background:red; color:white"  | '''Not Known'''
+
|
 
|-
 
|-
| style="background:red; color:white"  | '''com_album'''
+
|style="background:red; color:white"  |
| Summary: Directory traversal vulnerability in the Roland Breedveld Album ('''com_album''') component 1.14 for Joomla! allows remote attackers to access arbitrary directories and have unspecified other impact via a .. ('''dot dot''') in the target parameter to index.php.
+
 
Published: 09/23/2009
+
==  Jobprofile 1.0 ==
CVSS Severity: 7.5 ('''HIGH''')
+
SQL Injection Vulnerability
[[NIST:CVE-2009-3318|CVE-2009-3318]]
+
|051211
| style="background:red; color:white"  | '''Not Known'''
+
|
 
|-
 
|-
| style="background:#cef2e0; color:black"   | '''com_jreservation'''
+
|style="background:red; color:white" |
| Summary: SQL injection vulnerability in the [http://extensions.joomla.org/extensions/vertical-markets/booking-a-reservation/9798 JReservation] ('''com_jreservation''') component 1.0 and 1.5 for Joomla! allows remote attackers to execute arbitrary SQL commands via the pid parameter in a propertycpanel action to index.php.
+
 
Published: 09/23/2009
+
== JX Finder 2.0.1   ==
CVSS Severity: 7.5 ('''HIGH''')
+
| XSS Vulnerabilities
| [[NIST:CVE-2009-3316|CVE-2009-3316]]
+
|011211
|  style="background:#cef2e0; color:black" |  [http://www.jforjoomla.com Updated 28th] Jan fixed 13th Nov
+
|
 +
 
 
|-
 
|-
| style="background:red; color:white"  | '''IXXO Cart Standalone'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in IXXO Cart Standalone before 3.9.6.1, and the IXXO Cart component for Joomla! 1.0.x, allows remote attackers to execute arbitrary SQL commands via the parent parameter.
+
 
Published: 09/16/2009
+
== wdbanners  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|Unknown Exploit
| [[NIST:CVE-2009-3215|CVE-2009-3215]]
+
|301111
| style="background:red; color:white"  | '''Not Known'''
+
|
 
|-
 
|-
style="background:red; color:white"  | '''com_digifolio'''
+
|
| Summary: SQL injection vulnerability in the DigiFolio ('''com_digifolio''') component 1.52 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a project action to index.php.
+
== JB Captify Content  J1.5 and J1.7    ==
Published: 09/15/2009
+
|Security checks missing -Versions prior to JB_mod_captifyContent_J1.5_J1.7_1.0.1.zip
CVSS Severity: 7.5 ('''HIGH''')
+
|141111
|  [[NIST:CVE-2009-3193|CVE-2009-3193]]
+
|All extensions available on the [http://joomlabamboo.com site have been updated] and this potential security issue has been resolved.
|  style="background:red; color:white"  | '''Not Known'''
 
 
|-
 
|-
style="background:red; color:white"  | '''com_aclassf'''
+
|
| Summary: Cross-site scripting ('''XSS''') vulnerability in '''gmap.php''' in the Almond Classifieds ('''com_aclassf''') component 7.5 for Joomla! allows remote attackers to inject arbitrary web script or HTML via the addr parameter.
+
 
Published: 09/10/2009
+
== JB Microblog  ==
CVSS Severity: 4.3 ('''MEDIUM''')
+
|Security checks missing - J1.7 only. Versions prior to 1.10.3  
| [[NIST:CVE-2009-3155|CVE-2009-3155]]
+
|14111
|  style="background:red; color:white"  | '''Not Known'''
+
|All extensions available on the [joomlabamboo.com site have been updated] and this potential security issue has been resolved.
 
|-
 
|-
| style="background:#cef2e0; color:black"  | '''com_aclassf'''
+
|
|  Summary: SQL injection vulnerability in the Almond Classifieds ('''com_aclassf''') component 7.5 for Joomla! allows remote attackers to execute arbitrary SQL commands via the replid parameter in a manw_repl add_form action to index.php, a different vector than [[NIST:CVE-2009-2567|CVE-2009-2567]].
+
 
Published: 09/10/2009
+
== JB Slideshow <3.5.1,   ==
CVSS Severity: 7.5 ('''HIGH''')
+
|Security checks missing
|  [[NIST:CVE-2009-3154|CVE-2009-3154]]
+
|141111
| style="background:#cef2e0; color:white"  | [http://www.almondsoft.com/alcl.html Developer latest component]
+
|All extensions available on the [joomlabamboo.com site have been updated] and this potential security issue has been resolved.
 
|-
 
|-
| style="background:red; color:white"  | '''com_jabode'''
+
|
|  Summary: SQL injection vulnerability in Jabode horoscope extension ('''com_jabode''') for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a sign task to index.php.
 
Published: 09/08/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
  
| [[NIST:CVE-2008-7169|CVE-2008-7169]]
+
== JB Bamboobox  ==
| style="background:red; color:white"  | '''Not Known'''
+
|Security checks missing - J1.5 all versions prior to 1.2.2
 +
|141111
 +
|All extensions available on the [joomlabamboo.com site have been updated] and this potential security issue has been resolved.
 
|-
 
|-
style="background:red; color:white"  | '''com_gameserver'''
+
|
| Summary: SQL injection vulnerability in the Game Server ('''com_gameserver''') component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a gamepanel action to index.php.
+
== RokModule    ==
Published: 09/03/2009
+
|SQLI - exploits    RokStock RokWeather RokNewspager
CVSS Severity: 7.5 ('''HIGH''')
+
|121111
|  [[NIST:CVE-2009-3063|CVE-2009-3063]]
+
|developer release statement [http://www.rockettheme.com/blog/extensions/1300-important-security-vulnerability-fixed    RokModule v1.3 for Joomla 1.7  RokModule v1.4 for Joomla 1.5]
|  style="background:red; color:white"  | '''Not Known'''
+
 
 
|-
 
|-
| style="background:red; color:white"  | '''com_artportal'''
+
|style="background:#cef2e0; color:black" |
| Summary: SQL injection vulnerability in the Artetics.com Art Portal ('''com_artportal''') component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the portalid parameter to index.php.
+
 
Published: 09/03/2009
+
== hm community  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|Multiple Vulnerabilities
|  [[NIST:CVE-2009-3054|CVE-2009-3054]]
+
|011111
|  style="background:red; color:white"  | '''Not Known'''
+
|developer release [http://joomlaextensions.co.in/product/HM-Community 1.01]
 
|-
 
|-
| style="background:#cef2e0; color:black" | '''com_agora'''
+
|style="background:#cef2e0; color:black" |
| Summary: Directory traversal vulnerability in the Agora ('''com_agora''') component 3.0.0b for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the action parameter to the avatars page, reachable through index.php.
+
 
Published: 09/03/2009
+
== Alameda  ==
CVSS Severity: 6.8 ('''MEDIUM''')
+
|SQLi
| [[NIST:CVE-2009-3053|CVE-2009-3053]]
+
|01111
| style="background:#cef2e0; color:white" |'''[http://jvitals.com/index.php?option=com_rokdownloads&view=file&Itemid=108&id=282:agora-3-0 3.0.7]'''
+
|developer statement [http://www.blueflyingfish.com/alameda/index.php?option=com_content&view=category&id=5&Itemid=28 and Latest version number v1.0.1.]
 
|-
 
|-
| style="background:red; color:white" | '''com_simpleshop'''
+
|style="background:#cef2e0; color:black" |
| Summary: SQL injection vulnerability in the Simple Shop Galore ('''com_simpleshop''') component for Joomla! allows remote attackers to execute arbitrary SQL commands via the section parameter in a section action to index.php, a different vulnerability than [[NIST:CVE-2008-2568|CVE-2008-2568]]. NOTE: this issue was disclosed by an unreliable researcher, so the details might be incorrect.
+
 
Published: 08/24/2009
+
== Techfolio 1.0    ==
CVSS Severity: 7.5 ('''HIGH''')
+
|Techfolio 1.0 SQLI
|  [[NIST:CVE-2008-7033|CVE-2008-7033]]
+
|291011
| style="background:red; color:white"  | '''Not Known'''
+
|
 
|-
 
|-
| style="background:red; color:white" | '''com_groups'''
+
|style="background:#cef2e0; color:black" |
|  Summary: SQL injection vulnerability in the Permis ('''com_groups''') component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a list action to index.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
 
Published: 08/17/2009
 
CVSS Severity: 7.5 ('''HIGH''')
 
|  [[NIST:CVE-2009-2789|CVE-2009-2789]]
 
|  style="background:red; color:white"  | '''Not Known'''
 
  
 +
==  Barter Sites 1.3  ==
 +
|Barter Sites 1.3 SQL Injection & Persistent XSS vulnerabilities
 +
|291011
 +
|developer [http://my.barter-sites.com/index.php?option=com_content&view=article&id=6&Itemid=25 release 1.3.1]
 
|-
 
|-
| style="background:#cef2e0; color:black" | '''com_content'''
+
|style="background:#cef2e0; color:black" |
| Summary: SQL injection vulnerability in the content component ('''com_content''') 1.0.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the Itemid parameter in a blogcategory action to index.php.
+
 
Published: 08/10/2009
+
== Jeema SMS 3.2  ==
CVSS Severity: 7.5 ('''HIGH''')
+
|Jeema SMS 3.2 Multiple Vulnerabilities
| [[NIST:CVE-2008-6923|CVE-2008-6923]]
+
|291011
| style="background:#cef2e0; color:white"  |'''[http://developer.joomla.org/security/news/305-20091103-core-front-end-editor-issue-.html Resolution]'''
+
|developer resolution notice [http://jeema.net/about-us/securty-releases.html for 3.5.2]
 
|-
 
|-
| style="background:red; color:white"  | '''com_livechat'''
+
|style="background:red; color:white"  |
| Summary: SQL injection vulnerability in the Live Chat ('''com_livechat''') component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the last parameter to getChatRoom.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
+
 
Published: 07/30/2009
+
== Vik Real Estate 1.0   ==
CVSS Severity: 7.5 ('''HIGH''')
+
|Vik Real Estate 1.0  Multiple Blind SqlI
| [[NIST:CVE-2008-6883|CVE-2008-6883]]
+
|291011
| style="background:red; color:white"  | '''Not Known'''
+
|
 
|-
 
|-
| style="background:red; color:white" | '''com_livechat'''
+
|style="background:#cef2e0; color:black" |
| Summary: Live Chat ('''com_livechat''') component 1.0 for Joomla! allows remote attackers to use the xmlhttp.php script as an open HTTP proxy to hide network scanning activities or scan internal networks via a GET request with a full URL in the query string.
+
 
Published: 07/30/2009
+
== yj contact    ==
CVSS Severity: 7.5 ('''HIGH''')
+
|LFI (youjoomla contact)
|  [[NIST:CVE-2008-6882|CVE-2008-6882]]
+
|241011
|  style="background:red; color:white"  | '''Not Known'''
+
|developer update statement [http://www.youjoomla.com/yj-contact-us-1.0.1-released.html 261011]
 +
 
 
|-
 
|-
| style="background:red; color:white| '''com_livechat'''
+
|style="background:#cef2e0; color:black" |
| Summary: Multiple SQL injection vulnerabilities in the Live Chat ('''com_livechat''') component 1.0 for Joomla! allow remote attackers to execute arbitrary SQL commands via the last parameter to ('''1''') getChat.php, ('''2''') getChatRoom.php, and ('''3''') getSavedChatRooms.php.
+
 
Published: 07/30/2009
+
==  NoNumber Framework ==
CVSS Severity: 7.5 ('''HIGH''')
+
| Advanced Module Manager * AdminBar Docker * Add to Menu * Articles Anywhere * What? Nothing!* Tooltips* Tabber* Sourcerer* Slider* Timed Styles* Modules Anywhere* Modalizer* ReReplacer* Snippets* DB Replacer* CustoMenu* Content Templater* CDN for Joomla!* Cache Cleaner* Better Preview
|  [[NIST:CVE-2008-6881|CVE-2008-6881]]
+
|181011
|  style="background:red; color:white"  | '''Not Known'''
+
|see http://feeds.feedburner.com/nonumber/news for updates of various extensions
 
|-
 
|-
| style="background:#cef2e0; color:black"  |'''JUMI'''
+
|style="background:red; color:white"  |
| There is a backdoor in JUMI that installs itself when JUMI is installed on your web site. It sends your credentials to a website, and sets up a back door for remote code execution.
+
 
Please remove JUMI2.0.5 from the download page immediately to stop people falling victim to this.
+
== Time Returns    ==
It will be simple enough to remove the compromised code from this download, but you need to do
+
|SQLi takeaweb.it
a full security audit on your site as well as you have been compromised. Added November 2009
+
|151011
|  [http://code.google.com/p/jumi/updates/list Report]
+
|No longer developed. New version 2.0.1 for Joomla 1.6/1.7 (old version are no longer supported) http://www.takeaweb.it
|  style="background:#cef2e0; color:white"  |[http://code.google.com/p/jumi/updates/list Jumi Update]
 
 
|-
 
|-
| style="background:#cef2e0; color:black" |'''com_photoblog'''
+
|style="background:#cef2e0; color:black" |
| Input Validation Error Added November 2009
+
 
| [http://www.securityfocus.com/bid/36809/ 36809]
+
== Simple File Upload  ==
| style="background:#cef2e0; color:white"  |[http://webguerilla.net/downloads/3-components-for-joomla-1 webguerilla Photoblog alpha 3b]
+
|LFI
 +
|300811
 +
|developer advice [http://wasen.net/index.php?option=com_content&view=article&id=64&Itemid=59 page]  
 
|-
 
|-
| style="background:red; color:white" | '''com_jshop'''
+
|style="background:#cef2e0; color:black" |
|  Summary: SQL injection vulnerability in the JShop ('''com_jshop''') component for Joomla! allows remote attackers to execute arbitrary SQL commands via the pid parameter in a product action to index.php.
+
 
Published: 11/02/2009
+
== Jumi    ==
CVSS Severity: 7.5 '''(HIGH)'''
+
|LFI
| [[NIST:CVE-2009-3835|CVE-2009-3835]]
+
|300811
| style="background:red; color:white"  | '''Not Known'''
+
|Developer states proper use of joomla administration/extension documentation reading
 
|-
 
|-
| style="background:#cef2e0; color:black" |'''BF Survey Pro'''
+
|style="background:#cef2e0; color:black" |
| Summary: SQL injection vulnerability in the '''BF Survey Pro''' v1.2.5 or lower  (fixed in version 1.2.6). '''BF Survey Basic v1.0''' (fixed in version 1.1). '''BF Quiz v1.1.1''' (fixed in version 1.2 or greater) Added November 2009
+
 
[http://www.tamlyncreative.com.au/software/forum/index.php?topic=357.0 tamlyncreative.com.au]
+
== Joomla content editor    ==
|  style="background:#cef2e0; color:white"  |[http://www.tamlyncreative.com.au/software/forum/index.php?topic=357.0 update]
+
|JCE lfi/rfi vulnerability
 +
|
 +
|JCE 2.0.11 and JCE 1.5.7.14 [http://www.joomlacontenteditor.net/news/item/jce-2011-released have been released]
 +
 
 
|-
 
|-
| style="background:#cef2e0; color:black" |'''Joo!BB 0.9.1 '''
+
|style="background:#cef2e0; color:black" |
| Summary: Persistent XSS/MySQL Injection vulnerabilities in Joo!BB 0.9.1 Added November 2009
+
 
| [http://www.joobb.org/community/board/topic/700-MultipleXSSSQLInjectionVulnerabilities.html joob.org]
+
==  Google Website Optimizer  ==
|  style="background:#cef2e0; color:white" |[http://www.joobb.org/downloads/components.html update]
+
|Numerous vulnerabilities. Website Optimizer, Pearl Group
 +
|290811
 +
|developer update [http://www.pearl-group.com/optimizer-changelog statement to ver. 1.4.0]  
 
|-
 
|-
| style="background:#cef2e0; color:black" |'''sh404sef '''
+
|style="background:#cef2e0; color:black" |
| Summary: sh404sef URI XSS Vulnerability  Added November 2009
+
 
| [http://jeffchannell.com/Joomla/sh404sef-uri-xss-vulnerability.html jeffchannell.com]
+
== Almond Classifieds  ==
| style="background:#cef2e0; color:white"  |[http://extensions.siliana.com/en/2009060876/sh404SEF-and-url-rewriting/Interim-release-of-sh404sef-for-Joomla-1.5.x.html update]
+
|777 Folder settings (all folders it uses are set to 777 including previously 755 locked folders)
 +
|260811
 +
|developer resolution [http://www.almondsoft.com/acj/ notice]  
 
|-
 
|-
| style="background:red; color:white" | '''AWD Wall 1.5'''
+
|style="background:#cef2e0; color:black" |
| Summary '''AWD Wall 1.5''' Blind SQL Injection Vulnerability.The Joomla component AWD Wall 1.5 suffers from an SQL Injection vulnerability in its handling of the 'cbuser' parameter.Added November 2009
+
 
| [http://jeffchannell.com/Joomla/awd-wall-15-blind-sql-injection-vulnerability.html Notice]
+
== joomtouch    ==
|style="background:red; color:white"  | '''  Not Known'''
+
|LFI/RFI
 +
|180811
 +
|developers [http://www.joomtouch.com/ultime/4-risolta-la-vulnerabilita-di-joomtouch.html resolution notice  1.0.3]
 
|-
 
|-
| style="background:red; color:white"  | '''EasyBook 2.0.0rc4'''
+
|style="background:#cef2e0; color:black" |
| Summary: The Joomla component '''EasyBook 2.0.0rc4''' suffers from multiple persistent XSS vulnerabilities. One seems fairly critical, while the others would take some incredible creativity to actively exploit. Added November 2009
+
 
| [http://jeffchannell.com/Joomla/easybook-200rc4-multiple-xss-vulnerabilities.html Alert]
+
== RAXO All-mode PRO  ==
| style="background:red; color:white"  | '''  Not Known'''
+
|Timthumb  RFI
 +
|110811
 +
|[http://raxo.org/forum/viewtopic.php?f=2&t=60#p2056 developer upgrade 1.5.0 statement]
 
|-
 
|-
| style="background:red; color:white"  | '''F!BB 1.5.96'''
+
|style="background:#cef2e0; color:black" |
| Summary: The Joomla component '''F!BB 1.5.96 RC''' suffers from multiple persistent XSS vulnerabilities, as well SQL Injection in its user search feature. Added November 2009
+
 
| [http://jeffchannell.com/Joomla/fbb-1596-rc-multiple-vulnerabilities.html Alert]
+
== V-portfolio  ==
| style="background:red; color:white"  | '''  Not Known'''
+
|DT - open folders
 +
|110811
 +
| [http://vsmart-extensions.com/index.php?option=com_content&view=article&id=61 developer resolution statement]  
 
|-
 
|-
| style="background:red; color:white" | '''Testimonial Ku 2.0 Admin Panel'''
+
|style="background:#cef2e0; color:black" |
| Summary: The Joomla component '''Testimonial Ku 2.0''' is vulnerable to persistent XSS in the administrator panel. A malicious user can submit a testimonial containing <script> tags with absolutely no quotes and inject that script into the administrator panel through any of the available inputs except "email". Added November 2009
+
 
| [http://jeffchannell.com/Joomla/testimonial-ku-20-admin-panel-persistent-xss.html Alert]
+
== obSuggest    ==
| style="background:red; color:white"  | '''  Not Known'''
+
|LFI
 +
|310711
 +
|developer [http://foobla.com/news/latest/obsuggest-1.8-security-release.html release statement]
 
|-
 
|-
| style="background:red; color:white" | '''MS Comment 0.8.0b'''
+
|style="background:#cef2e0; color:black" |
| Summary '''MS Comment 0.8.0b for Joomla''', a commenting plugin, suffers from an multiple vulnerabilities. Added November 2009
+
 
| [http://jeffchannell.com/Joomla/ms-comment-080b-multiple-vulnerabilities.html Alert]
+
== Simple Page    ==
| style="background:red; color:white"  | '''  Not Known'''
+
|LFI
 +
|230711
 +
|developer update [http://omar84.com/latest-news/65-simple-page-options-1517-security-release statement] v1.5.17 has been released
 
|-
 
|-
| style="background:#cef2e0; color:black" '''!JoomlaComment 4.0 beta1'''
+
|style="background:#cef2e0; color:black" |
| Summary: '''!JoomlaComment 4.0 beta1''', a commenting plugin, suffers from multiple XSS vulnerabilities. Added November 2009
+
 
| [http://jeffchannell.com/Joomla/joomlacomment-40-beta1-multiple-xss-vulnerabilities.html Alert]
+
== JE Story  ==
| style="background:#cef2e0; color:white"  | '''  [http://compojoom.com/blog/8-news/121-joomlacomment-40-rc1-released Developer Notice 4.0 rc1]''
+
|LFI
 +
|230711
 +
|[http://joomlaextensions.co.in/extensions/components/je-story-submit.html devloper security update] notice to ver 1.9
 
|-
 
|-
| style="background:red; color:white"  | '''WebAmoeba Ticket System 3.0.0'''
+
|style="background:#cef2e0; color:black" |
| Summary:  '''WebAmoeba Ticket System 3.0.0''', a Joomla help desk component. The vulnerability is with the BBCode library used to parse BBCode tags, as it does not strip javascript: urls from [url] tags. Added November 2009
+
 
| [http://jeffchannell.com/Joomla/webamoeba-ticket-system-300-bbcode-xss.html Alert]
+
==  appointment booking pro ==
| style="background:red; color:white"  | ''' Not Known'''
+
|LFI 22071
 +
|
 +
|[http://appointmentbookingpro.com/index.php?option=com_kunena&Itemid=66&func=view&catid=25&id=8129#8129 developer update security announcement] Current 2.0.1 and 1.4.x versions, are '''not''' vulnerable,
 
|-
 
|-
|style="background:#cef2e0; color:black" |'''Kunena 1.5.x'''
+
|style="background:red; color:white" |
|Summary: This is an important security release and users are urged to update immediately. Five security issues and an Internet Explorer 8 table bug have been resolved in this release. This release also contains many other important bug fixes. Added 18 November 2009
+
 
|[http://www.kunena.com/blog/19-developer-blog/51-kunena-157-security-release-now-available Advisory]
+
==  acajoom  ==
|style="background:#cef2e0; color:white"  |[http://www.kunena.com/blog/19-developer-blog/52-kunena-158-service-release-now-available Latest 1.5.8 Version]
+
|xss (admin permission required)
 +
|220711
 +
|updated to 5.20
 
|-
 
|-
| style="background:red; color:white"  | '''com_siirler'''
+
|style="background:#cef2e0; color:black" |
| Summary: SQL injection vulnerability in the '''Q-Proje Siirler Bileseni (com_siirler)''' component 1.2 RC for Joomla! allows remote attackers to execute arbitrary SQL commands via the sid parameter in an sdetay action to index.php. Added 18 November 2009
+
 
|  [[NIST:CVE-2009-3972 | CVE-2009-3972]]
+
== gTranslate  ==
| style="background:red; color:white"  | '''  Not Known'''
+
|ID -
 +
|220711
 +
|[http://edo.webmaster.am/gtranslate-changelog developer security release] 1.5 x.25 and 1.6 x.26.
 
|-
 
|-
| style="background:red; color:white"  | '''jTips (com_jtips)'''
+
|style="background:red; color:white"  |
|SUmmary:SQL injection vulnerability in the '''jTips (com_jtips)''' component 1.0.7 and 1.0.9 for Joomla! allows remote attackers to execute arbitrary SQL commands via the season parameter in a ladder action to index.php. Added 18 November 2009
+
 
| [[NIST:CVE-2009-3971 |CVE-2009-3971]]
+
==  alpharegistration    ==
|style="background:red; color:white"  | '''  Not Known'''
+
|http://www.alphaplug.com/ Please contact the developer for any questions on this extension
 +
|170711 220711
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black" |'''NinjaMonials'''
+
|style="background:#cef2e0; color:black" |
| Summary: SQL injection vulnerability in the '''NinjaMonials (com_ninjacentral)''' component 1.1.0 for '''Joomla 1.0.x''' ! allows remote attackers to execute arbitrary SQL commands via the testimID parameter in a display action to index.php. Added 18 November 2009
+
 
| [[NIST:CVE-2009-3964 | CVE-2009-3964]]
+
== Jforce    ==
|style="background:#cef2e0; color:white"  |'''  [http://ninjaforge.com/index.php?option=com_ninjacentral&page=show_package&id=14&Itemid=235 developer patch Ver 1.2]'''
+
|DT -  
 +
|170711
 +
| [http://www.jforce.com/blog/270-jforce-security-release.html developer states The new version number v1.5r1362 resolves the problem]  
 
|-
 
|-
|style="background:#cef2e0; color:black"   | '''webee 1.1.1 &1.2'''
+
|style="background:#cef2e0; color:black" |
|Summary: '''webee 1.1.1,''' a Joomla commenting plugin, suffers from multiple vulnerabilities. '''webee has been updated to 1.2''' as of 12 November 2009 and''' still suffers''' from SQL Injection. XSS was not tested in 1.2. Added 19 November 2009
+
 
| [http://jeffchannell.com/Joomla/webee-111-multiple-vulnerabilities.html jeffchannell.com]
+
==  Flash Magazine Deluxe Joomla   ==
|style="background:#cef2e0; color:white" | ''' [http://extensions.joomla.org/extensions/contacts-and-feedback/articles-comments/10155 developer update ver2.0]'''
+
|ID [http://www.joomplace.com/joomla-components/flash-magazine-deluxe-component.html multiple vulnerabilities]
 +
|170711
 +
|[http://www.joomplace.com/news-blog/flashmagazine-deluxe-2-1-4-security-release.html developer release] 2.1.4
 
|-
 
|-
|style="background:#cef2e0; color:black" |'''iF Portfolio Nexus'''
+
|style="background:#cef2e0; color:black" |
|Summary: The '''iF Portfolio Nexus component for Joomla!''' is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements using the id parameter, which could allow the attacker to view, add, modify or delete information in the back-end database. Nov 18, 2009
 
|[http://secunia.com/advisories/37408/ secunia.com 37408/]
 
|style="background:#cef2e0; color:white" |[http://www.inertialfate.za.net/help/forums/topic?id=10&p=3#p172 iF Portfolio Nexus v1.1.1 released]
 
  
 +
== AVreloaded    ==
 +
|SQLi - version 1.2.6
 +
|150711
 +
|[http://allvideos.fritz-elfert.de/ 1.2.7 released developer release statement 160711]
 
|-
 
|-
|style="background:red; color:white"  | '''JoomClip'''
+
|style="background:#cef2e0; color:black" |
|Summary: The '''JoomClip component for Joomla!''' is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements to the index.php script using the cat parameter, which could allow the attacker to view, add, modify or delete information in the back-end database.  Nov 18, 2009
+
== Sobi  ==
|[http://secunia.com/advisories/37400/ secunia.com 37400/]
+
|SQLI -
|style="background:red; color:white"  | '''  Not Known'''
+
|130711
 +
|[http://www.sigsiu.net/changelog developer fix and update statement]
 
|-
 
|-
|style="background:#cef2e0; color:black" |'''Joomla XML'''
+
|style="background:#cef2e0; color:black" |
|Summary: Joomla! before 1.5.15 allows remote attackers to read an extension's XML file, and thereby obtain the extension's version number, via a direct request.
+
 
Published: 11/16/2009
+
==  fabrik  ==
|[[NIST:CVE-2009-3946 | CVE-2009-3946]]
+
|sqli
|style="background:#cef2e0; color:white"  |'''[http://developer.joomla.org/security/news/306-20091103-core-xml-file-read-issue.html Resolution]'''
+
|120711
 +
|[http://fabrikar.com/downloads/details/36/89 Developers Update statement 2.1]
 
|-
 
|-
|style="background:red; color:white" | '''Mygallery Remote SQL Injection Vulnerability'''
+
|
|Summary: Joomla Component mygallery ( farbinform_krell) Remote SQL Injection Vulnerability Added 27 Nov 2009 {{JVer|1.5}} NB: This could be an error in our database as the only one we could find was for wordpress.If anyone know of one for joomla please let us know..(poss joomlicious.com CM)
+
 
|[http://www.exploit-db.com]
+
=xmap  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|sqli 1.2.11
 +
|120711
 +
|upgrade to 1.2.12
 
|-
 
|-
|style="background:red; color:white" | '''Extreme Google Calendar'''
+
|style="background:#cef2e0; color:black" |
|Summary: '''com_gcalendar 1.1.2''' (gcid) Remote SQL Injection Vulnerability
+
 
Remote SQL Injection were identified in Google Calendar Component [http://extensions.joomla.org/extensions/calendars-a-events/calendars/4188 Extension Link] Added 27 Nov 2009
+
== Atomic Gallery    ==
|[http://www.exploit-db.com reference]
+
|Creates 777 folders [http://www.atomicon.nl/atomicongallery Atomic gallery]  
|style="background:red; color:white"  | '''  Not Known'''
+
|110711
 +
|developer [http://www.atomicon.nl/atomicongallery#changelog release statement/changelog]
 
|-
 
|-
|style="background:red; color:white" | '''LyftenBloggie'''
+
|
| Summary: [http://www.lyften.com/products/lyftenbloggie.html LyftenBloggie] Component "author" SQL Injection Vulnerability LyftenBloggie 1.x Added 27 Nov 2009
+
 
|[http://secunia.com/advisories/product/28005/ SA37499]
+
=myApi  ==
| [http://jeffchannell.com/Joomla/lyften-bloggie-sql-injection-fix.html Un official fix]. Developer fix not release at 30 Nov 09 ''' [http://www.lyften.com/products/lyftenbloggie/extensions/download/id-20.html 1.0.4a (last update on Dec 28, 2009)]'''
+
|ID [http://extensions.joomla.org/component/mtree/social-web/facebook-integration/11624 Contains "Call-Home" function. Sends private user information to developer.]
 +
|020711
 +
|[http://www.myapi.co.uk/ Developer states Use version 1.3.4.1]
 
|-
 
|-
|style="background:#cef2e0; color:black"  |'''Sermon speaker'''
+
|style="background:red; color:white"  |
|Summary: [http://joomlacode.org/gf/project/sermon_speaker sermon speaker] sql vulnerability and password reset vulnerability version 3.2 and below
+
 
 +
==  mdigg  ==
 +
|SQL I (not listed in JED)
 +
|020711
 
|
 
|
|style="background:#cef2e0; color:white"  |[http://joomlacode.org/gf/project/sermon_speaker/forum/?action=ForumBrowse&forum_id=7897&_forum_action=ForumMessageBrowse&thread_id=15219 Developer fix] 30 Nov 2009
 
 
|-
 
|-
|style="background:#cef2e0; color:white"  | [http://joomlacode.org/gf/project/musicgallery/ MusicGallery]
+
|style="background:#cef2e0; color:black" |
|Summary: [http://joomlacode.org/gf/project/musicgallery/ Component MusicGallery] SQL Injection Vulnerability 30 November {{JVer|1.5}}
 
|[[NIST:CVE-2009-4217 | CVE-2009-4217]]
 
|style="background:#cef2e0; color:black" | [http://joomlacode.org/gf/project/musicgallery/ developer]
 
|}
 
  
----
+
==  Calc Builder  ==
 +
|sqli + ID
 +
|180611
 +
| [http://components.moonsoft.es/downloadcalcbuilder  dev security release 0.0.2]
 +
|-
 +
|style="background:#cef2e0; color:black" |
  
== December 2009 Compiled Reports ==
+
== Cool Debate    ==
{| class="wikitable sortable" border="1"
+
|Cool Debate 1.03 LFI
 +
|
 +
| version [http://www.acoolsip.com/development/a-cool-debate.html 1.0.8 released.]
 
|-
 
|-
! '''Extension'''
+
|style="background:red; color:white" |
! class="unsortable"| '''Details'''
+
 
!  '''Reference Link'''
+
==    ==
!  '''Extension Update Link'''
+
|
 +
|
 +
|
 
|-
 
|-
|style="background:red; color:white"  | '''Omilen Photo Gallery'''
+
|style="background:#cef2e0; color:black" |
|Summary: Directory traversal vulnerability in the [http://extensions.joomla.org/extensions/photos-&-images/photo-flash-gallery/6373/details Omilen Photo Gallery] (com_omphotogallery) component Beta 0.5 for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the controller parameter to index.php.
+
 
Published: 12/04/2009
+
== Scriptegrator Plugin 1.5.5==
|[[NIST:CVE-2009-4202 | CVE-2009-4202]]
+
|LFI
|style="background:red; color:white"  | '''  Not Known'''
+
|140611
 +
| [http://www.greatjoomla.com/news/index.html  Update - Core Design Scriptegrator plugin 2.0.9 &] 1.5.6
 
|-
 
|-
|style="background:red; color:white"  | '''Seminar'''
+
|style="background:#cef2e0; color:black" |
|Summary: SQL injection vulnerability in the [http://seminar.vollmar.ws/ Seminar] (com_seminar) component 1.28 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a View_seminar action to index.php.
+
 
Published: 12/04/2009
+
== Joomnik Gallery  ==
|[[NIST:CVE-2009-4200 | CVE-2009-4200]]
+
|SQLi
|style="background:red; color:white"  | '''  Not Known'''
+
|
 +
|[http://joomlacode.org/gf/project/joomnik/ developer update to 0.9.1]
 
|-
 
|-
|style="background:#cef2e0; color:black" | '''Mambo Resident'''
+
|style="background:#cef2e0; color:black" |
|Summary: Multiple SQL injection vulnerabilities in the Mambo Resident (aka Mos Res or com_mosres) component 1.0f for Mambo and Joomla!, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) property_uid parameter in a viewproperty action to index.php and the (2) regID parameter in a showregion action to index.php. Mambo Resident component for v4.5.2 '''may only be for 1.0.xx versions of J!'''
+
 
Published: 12/04/2009
+
==  JMS fileseller  ==
|[[NIST:CVE-2009-4199 | CVE-2009-4199]]
+
|LFI
|style="background:#cef2e0; color:white" |[http://www.jomres.net/ Replacement Extension 08 dec 09]
+
|0611
 +
|[http://joommasters.com/commercial-extensions/components/jms-fileseller.html developer upgrade announcement to v1.1]
 
|-
 
|-
|style="background:red; color:white"  | '''ProofReader'''
+
|style="background:#cef2e0; color:black" |
|Summary: Multiple cross-site scripting (XSS) vulnerabilities in index.php in the ProofReader (com_proofreader) component 1.0 RC9 and earlier for Joomla! allow remote attackers to inject arbitrary web script or HTML via the URI, which is not properly handled in (1) 404 or (2) error pages. Published: 12/02/2009 CVSS Severity: 4.3 (MEDIUM)
+
 
| [[NIST:CVE-2009-4157 | CVE-2009-4157]]
+
== sh404SEF  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|low-level XSS security issue
 +
|300511
 +
|[http://dev.anything-digital.com/Forum/Announcements/11147-sh404SEF-2.2.6-now-available-for-Joomla-1.5/ Dev upgrade statement to 2.2.6]
 
|-
 
|-
|style="background:#cef2e0; color:black"  | '''Laoneo Google Calendar GCalendar'''
+
|style="background:#cef2e0; color:black" |
|Summary: SQL injection vulnerability in the [http://g4j.laoneo.net/content/extensions/download/cat_view/20-joomla-15x/21-gcalendar.html Google Calendar GCalendar] (com_gcalendar) component 1.1.2, 2.1.4, and possibly earlier versions for Joomla! allows remote attackers to execute arbitrary SQL commands via the gcid parameter. NOTE: some of these details are obtained from third party information. Published: 11/29/2009 CVSS Severity: 7.5 (HIGH) Note: There is already a listing for GCalendar 1.1.2
+
 
|[[NIST:CVE-2009-4099 | CVE-2009-4099]]
+
== JE Story submit    ==
|style="background:#cef2e0; color:white"  | [http://g4j.laoneo.net/content/extensions/download/doc_details/28-gcalendar-suite-215.html Latest version GCalendar Suite 2.1.5]
+
|LFI/RFI
 +
|
 +
|[http://joomlaextensions.co.in/extensions/modules/je-content-menu.html?page=shop.product_details&flypage=flypage.tpl&product_id=77&category_id=13&vmcchk=1 developer states Version 1.8]
 
|-
 
|-
|style="background:red; color:white"  | '''D4J eZine'''
+
|style="background:red; color:white"  |
|Summary: PHP remote file inclusion vulnerability in class/php/d4m_ajax_pagenav.php in the D4J eZine (com_ezine) component 2.1 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS mosConfig_absolute_path parameter. Published: 11/29/2009 CVSS Severity: 7.5 (HIGH)
+
 
|[[NIST:CVE-2009-4094 | CVE-2009-4094]]
+
==  FCKeditor  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|File Upload Vulnerability
 +
|230511
 +
|
 
|-
 
|-
| style="background:red; color:white"  | '''Quick News'''
+
|style="background:red; color:white"  |
| Summary: The Joomla [http://joomlacode.org/gf/project/quicknews/ Quick News component] suffers from a remote SQL injection vulnerability. added 1st Dec 09
+
 
|[http://www.exploit-db.com Reference]
+
== KeyCaptcha    ==
|style="background:red; color:white"  | '''  Not Known'''
+
|ID
 +
|190511
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black"  | '''Joaktree component'''
+
|style="background:red; color:white"  |
|Summary: [http://extensions.joomla.org/extensions/miscellaneous/genealogy/9842 Joaktree] Vulnerability : SQL injection/ added 1st Dec 09
+
 
|[http://securityreason.com/exploitalert/7508 7508]
+
==  Ask A Question AddOn v1.1  ==
|style="background:#cef2e0; color:white" | '''  [http://naastniels.nl/index.php/en/joaktree/downloads version 1.1 update]'''
+
|SQLi
 +
|160511
 +
|
 
|-
 
|-
|style="background:red; color:white" | '''mojoblog'''
+
|style="background:#cef2e0; color:black" |
|Summary [http://www.joomlify.com/files/mojoblog/ MojoBlog] Multiple Remote File Include Vulnerability added 1st Dec 09 {{JVer|1.5}}
+
 
|[http://securityreason.com/exploitalert/7509 7509]
+
== Global Flash Gallery    ==
|style="background:red; color:white"  | '''  Not Known'''
+
|flash-gallery.com xss
 +
|130511
 +
|[http://flash-gallery.com/help/joomla-extension/faq/security-update-0.5.0/ dev release 0.5.0 statement]
 
|-
 
|-
|style="background:#cef2e0; color:black" | '''YJ Whois'''
+
|style="background:#cef2e0; color:black" |
|Summary: [http://extensions.joomla.org/extensions/external-contents/domain-search/5774 YJ Whois] '''Low security risk''',and fixesMalicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable application to fool a user in order to gather data from them. An attacker can steal the session cookie and take over the account. Files affected is , modules/mod_yj_whois.php added 3 December 09
+
 
|[http://www.exploit-db.com Reference]
+
== com_google    ==
|style="background:#cef2e0; color:white" |[http://www.youjoomla.com/xss-security-patch-for-yj-whois.html Developer Notice and fix 03 dec 09]
+
|LFI [http://freejoomlacomponent.appspot.com/ com_google]
 +
|080511
 +
|[http://freejoomlacomponent.appspot.com/securityrelease.html devs update to 1.5.1]
 
|-
 
|-
|style="background:#cef2e0; color:black" | '''yt_color YOOOtheme'''
+
|style="background:#cef2e0; color:black" |
|Summary: [http://www.yootheme.com/ YT_color yootheme] Malicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable application to fool a user in order to gather data from them. An attacker can steal the session cookie and take over the account. added 5 dec 09
+
 
|[http://www.exploit-db.com Reference]
+
==  docman  ==
|style="background:#cef2e0; color:white" | '''  [http://www.yootheme.com/member-area/downloads/item/templates-15/xss-and-php-53-patches All members without an active membership can download the template patches here].'''
+
|com-docman Input Validation Error
 +
|160511
 +
|[http://forum.joomla.org/viewtopic.php?p=2502904#p2502904 devs resolution statement, report for old version]
 
|-
 
|-
|style="background:red; color:white"  | '''TP Whois'''
+
|style="background:#cef2e0; color:black" |
|summary: [http://www.templateplazza.com/view-details/tpwhois/183-component-tp-whois-for-joomla-1.5.x.html TP Whois ] Malicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable application to fool a user in order to gather data from them. An attacker can steal the session cookie and take over the account. Added 3 december {{JVer|1.5}}
+
 
|[http://www.exploit-db.com Refrence]
+
== Newsletter Subscriber    ==
|style="background:red; color:white"  | '''  Not Known'''
+
|XSS
 +
|120511
 +
|[http://mavrosxristoforos.com/joomla-extensions/free/newsletter-subscriber Deveopler update]
 
|-
 
|-
|style="background:red; color:white"  | '''com_job'''
+
|style="background:#cef2e0; color:black" |
|Summary: [http://extensions.joomla.org/extensions/ads-a-affiliates/jobs-a-recruitment/8319 Component com_job] ( showMoreUse) SQL injection vulnerability  Added 9th Dec
+
 
|[http://xforce.iss.net/xforce/xfdb/54626 Reference]
+
== Akeeba  ==
| style="background:red; color:white"  | '''  Not Known'''
+
|akkeba backup and joomlapack
 +
|170411
 +
|[https://www.akeebabackup.com/home/item/1091-akeeba-backup-3-2-7.html dev update to 3.2.7]
 
|-
 
|-
|style="background:#cef2e0; color:black" '''JQuarks'''
+
|style="background:#cef2e0; color:black" |
|Summary: [http://extensions.joomla.org/extensions/contacts-and-feedback/quiz-a-surveys/10590 JQuarks] SQL injection vulnerability {{JVer|1.5}} added 8th dec 09
+
 
|[http://www.exploit-db.com Reference]
+
== Facebook Graph Connect  ==
|style="background:#cef2e0; color:white" | [http://www.iptechinside.com/labs/projects/list_files/jquarks Developer Update ]
+
|SID. call home device with user credentials
 +
|120411
 +
|[http://www.sikkimonline.info/security-notice dev update notice]
 
|-
 
|-
|style="background:red; color:white" | '''Mamboleto Component 2.0 RC3'''
+
|style="background:#cef2e0; color:black" |
|Summary: [http://www.fernandosoares.com.br/index.php?option=com_docman&task=cat_view&gid=28&Itemid=28 Mamboleto Component 2.0 RC3]SQL injection vulnerability {{JVer|1.5}} added 12 December
+
 
|[http://www.exploit-db.com Reference]
+
== booklibrary    ==
|style="background:red; color:white"  | '''  Not Known'''
+
|SQLi ordasoft booklibrary
 +
|180311
 +
|[http://ordasoft.com/Book-Library/security-upgrade-instructions-for-book-library.html developer upgrade instructions]
 
|-
 
|-
| style="background:#cef2e0; color:black"  | ''' JS JOBS'''
+
|style="background:red; color:white"  |
|Summary [http://www.joomshark.com/index.php?option=com_content&view=article&id=4&Itemid=8 JS JOBS] Joomla Component com_jsjobs 1.0.5.6 SQL Injection Vulnerabilities {{JVer|1.5}} added 12 December
+
 
|[http://www.exploit-db.com Reference]
+
== semantic    ==
|style="background:#cef2e0; color:white"  | '''  [http://www.joomsky.com/index.php?option=com_rokdownloads&view=folder&Itemid=3&id=2:components Developer update 1.0.5.7]'''
+
|com semantic http://www.scms.es/joomla creates hidden admin users
 +
|150311
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black" |  '''corePHP JPhoto'''
+
|
|Summary: [http://extensions.joomla.org/extensions/photos-a-images/photo-gallery/10365 'corePHP' JPhoto]SQL injection vulnerability {{JVer|1.5}} added 12 December
+
 
|[http://secunia.com/advisories/37676/ Reference]
+
=JOMSOCIAL 2.0.x 2.1.x  ==
|style="background:#cef2e0; color:white"  | '''  [http://www.corephp.com/blog/uber-fast-jphoto-security-release/ Developer Upgrade]'''
+
|SID, open folders
 +
|120311
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black"   | '''com_virtuemart'''
+
|style="background:#cef2e0; color:black" |
|Summary: "com_virtuemart" http://virtuemart.net/  '''Version : 1.0''' Vulnerability : SQL injection added Date : 07- dec -09 {{JVer|1.5}}
+
 
|[http://www.exploit-db.com Reference]
+
==  flexicontent  ==
|style="background:#cef2e0; color:white"  |[http://virtuemart.net/ latest version]
+
|forced 777, malicious files
 +
|250311
 +
|[http://www.flexicontent.org/home/item/192-flexicontent-154-is-finally-out.html devs resolve statement], [http://www.flexicontent.org/downloads/latest-version.html Changelog]
 
|-
 
|-
|style="background:red; color:white" | ''' Kide Shoutbox'''
+
|style="background:red; color:white" |
  
|Summary: The Kide Shoutbox (com_kide) component 0.4.6 for Joomla! does not properly perform authentication, which allows remote attackers to post messages with an arbitrary account name via an insertar action to index.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Added: December 08
+
== jLabs Google Analytics Counter    ==
|[[NIST:CVE-2009-4232 | CVE-2009-4232]]
+
|jLabs Google Analytics Counter  SID
|style="background:red; color:white"  | '''  Not Known'''
+
|
 +
|
 
|-
 
|-
|style="background:red; color:white" | ''' JoomPortfolio Component'''
+
|
|Summary: [http://www.joomplace.com/joomportfolio/joomportfolio.html JoomPortfolio] Input passed via the "secid" parameter to index.php (when "option" is set to "com_joomportfolio" and "task" is set to "showcat") is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.The vulnerability is reported in version 1.0.0. Other versions may also be affected. Added: December 18 {{JVer|1.5}}
+
==  xcloner  ==
|[http://secunia.com/advisories/37838/ Reporting Site]
+
|Unspecified
|style="background:red; color:white"  | '''  Not Known'''
+
|260211
 +
|[http://www.xcloner.com/xcloner-news/important-security-upgrade/ dev announcement of security release]
 
|-
 
|-
|style="background:red; color:white" | '''City Portal (templates?)'''
+
|style="background:#cef2e0; color:black" |
|Summary:  City Portal Blind SQL Injection Vulnerability added: 2009-12-18
+
 
|[http://www.exploit-db.com Reference] Possibly this [http://www.youjoomla.com/jclick-city-portal-joomla-template.html tempate]
+
== smartformer    ==
|style="background:red; color:white"  | '''  Not Known'''
+
|RFI
 +
|230211 (repeat of 041110)
 +
|[http://www.itoris.com/joomla-form-builder-smartformer.html v2.4.1 security fix for Joomla 1.5.x]
 
|-
 
|-
|style="background:red; color:white" | '''Event Manager'''
+
|style="background:#cef2e0; color:black" |
|Summary:  [http://www.jforjoomla.com/Joomla-Components/event-manager-15-component.html Event Manager] Blind SQL Injection Vulnerability EDB-ID: 10549
+
 
added: 2009-12-18
+
== xmap 1.2.10    ==
|[http://www.exploit-db.com Reference]
+
|Malicious payload in zip
|style="background:red; color:white"  | '''  Not Known'''
+
|230211
 +
|[http://joomla.vargas.co.cr/en/news/4-xmap/95-security-notice developer resolution notic]e Clean version available from [http://joomlacode.org/gf/project/xmap/frs/ joomlacode]  
 
|-
 
|-
|style="background:red; color:white" | com_zcalendar
+
|style="background:#cef2e0; color:black" |
|Summary:  com_zcalendar Blind SQL-injection Vulnerability
+
 
EDB-ID: 10548 added: 2009-12-18
+
==  Frontend-User-Access 3.4.1  ==
|[http://www.exploit-db.com Reference]
+
|Frontend-User-Access 3.4.1 from http://www.pages-and-items.com LFI
|style="background:red; color:white"  | '''  Not Known'''
+
|030211
 +
|update to [http://extensions.joomla.org/extensions/access-a-security/frontend-access-control/6874 Frontend-User-Access 3.4.2]
 +
|-
 +
|style="background:#cef2e0; color:black" |
 +
 
 +
== com properties 7134  ==
 +
| http://com-property.com/ malicious files in script
 +
|
 +
|[http://joomlacode.org/gf/project/property/frs/?action=FrsReleaseBrowse&frs_package_id=5815 Dev update statement]
 +
 
 
|-
 
|-
|style="background:red; color:white" | '''com_acmisc'''
+
|style="background:red; color:white" |
|Summary: com_acmisc SQL injection added: 2009-12-18
+
 
|[http://www.exploit-db.com Reference]
+
== B2 Portfolio ==
|style="background:red; color:white"  | '''  Not Known'''
+
|B2 portfolio 1.0 SQLi pulseextensions.com
 +
|250111
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black" | '''com_digistore'''
+
|style="background:#cef2e0; color:black" |
|Summary: com_digistore SQL injection EDB-ID: 10546 added: 2009-12-18  {{JVer|1.5}}
+
 
|[http://www.exploit-db.com Reference]
+
== allcinevid  ==
|style="background:#cef2e0; color:white" | '''  [http://www.ijoomla.com/ijoomla-digistore/ijoomla-digistore/ijoomla-digistore-change-log/ Update change log] '''
+
|SQLI http://extensions.joomla.org/extensions/multimedia/multimedia-players/video-players-a-gallery/15367
 +
|220111
 +
|[http://www.joomtraders.com/our-blog/allcinevid-1.0-sql-injection.html Developers resolution notice]
 
|-
 
|-
|style="background:red; color:white" | '''com_jbook'''
+
|style="background:red; color:white" |
|Summary:  com_jbook Blind SQL-injection EDB-ID: 10545 added: 2009-12-18 {{JVer|1.0}}
+
 
|[http://www.exploit-db.com Reference]
+
== People Component    ==
|style="background:red; color:white"  | '''  Not Known'''
+
|People component http://www.ptt-solution.com/vmchk/people-component.html sqli
 +
|150111
 +
|
 
|-
 
|-
|style="background:red; color:white" |  '''com_personel'''
+
|style="background:red; color:white" |
|Summary: com_personel component for Joomla! is vulnerable to SQL injection.
+
 
|[http://xforce.iss.net/xforce/xfdb/54903 iss.net reference]
+
== Jimtawl    ==
|style="background:red; color:white"  | '''  Not Known'''
+
|Jimtawl LFI
 +
|251110
 +
|
 +
 
 
|-
 
|-
|style="background:#cef2e0; color:black" |  '''JEEMA Article Collection'''
+
|style="background:red; color:white" |
|Summary: [http://www.forum.jeema.net/component/content/article/4-jeema-article-collection-component/13-about-jeema-article-collection.html JEEMA Article Collection] Input passed via the "catid" parameter to index.php (when "option" is set to "com_jeemaarticlecollection" and "view" is set to "longlook") is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. version 1.0.0.1 {{JVer|1.5}} added 22 dec 09
+
 
| [http://secunia.com/advisories/37865/ secunia]
+
==  Maian Media SILVER ==
|style="background:#cef2e0; color:white"    | [http://www.jeema.net/downloads/free-joomla-extensions/joomla-components/12-jeema-joomla-article-collection.htm fixed the same in the version v102.]
+
|Maian Media SQLi
 +
|151110
 +
|Developer states unproven in free edition, paid/SILVER version is being upgraded. [http://www.aretimes.com/index.php?option=com_content&view=category&layout=blog&id=40&Itemid=113 dev article]
 
|-
 
|-
|style="background:red; color:white" |  '''HotBrackets Tournament Brackets '''
+
|style="background:#cef2e0; color:black" |
|Summary: The [http://extensions.joomla.org/extensions/sports-a-games/sports/10746 HotBrackets Tournament Brackets] component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. {{JVer|1.5}} added 22 dec
+
 
|[http://www.securityfocus.com/bid/37439/ Reference]
+
==  alfurqan ==
|style="background:red; color:white"  | '''  Not Known'''
+
|alfurqan 1.5 sqli
 +
|151110
 +
|developer update [http://forums.islamis4u.com/index.php/topic%2c83.0.html statement]  
 
|-
 
|-
|style="background:red; color:white" | '''Car Manager'''
+
|style="background:#cef2e0; color:black" |
|Summary: http://webformatique.com/ com_carman Cross Site Scripting Vulnerability added 24 december 09{{JVer|1.5}}
+
 
|[http://www.exploit-db.com Reference]
+
==  ccboard  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|[http://extensions.joomla.org/extensions/communication/forum/6823 ccboard XSS and SQLi]
 +
|131110
 +
| on my site at [http://codeclassic.org/component/content/article/1-latest-news/83-ccboard-13-released.html] Please find the respective update information
 +
 
 
|-
 
|-
| style="background:red; color:white" |'''Schools component'''
+
|style="background:red; color:white" |
|Summary: The 'com_schools' component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
+
 
|[http://www.securityfocus.com/bid/37469 Reference] added 24 dec 09
+
==  ProDesk v 1.5  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|LFI
 +
|091110
 +
|
 +
 
 +
 
 
|-
 
|-
|style="background:red; color:white" | '''webcamxp'''
+
|style="background:#cef2e0; color:black" |
|[http://extensions.joomla.org/extensions/communication/video-conference/4490 com_webcamxp] Cross Site Scripting Vulnerabilities  Last version 2008 {{JVer|1.5}} Dec 27
+
 
|[http://www.exploit-db.com Reference]
+
==  sponsorwall  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|SQL injection pulseextensions.com
 +
|011110
 +
|developer  [http://demo.pulseextensions.com/sponsor-wall.html resolution notice]
 
|-
 
|-
|style="background:#cef2e0; color:black"  | '''beeheard'''
+
|style="background:#cef2e0; color:black" |
|[http://extensions.joomla.org/extensions/contacts-and-feedback/testimonials-a-suggestions/10283 beeheard]  Blind SQL injection Vulnerability {{JVer|1.5}} Dec 27
+
 
|[http://www.exploit-db.com Reference]
+
 
|style="background:#cef2e0; color:white" | ''' [http://beeheard.cmstactics.com/change-log Version 1.4.2] 04 Jan'''
+
== Flip wall  ==
 +
|SQL injection pulseextensions.com
 +
|011110
 +
| developer http://demo.pulseextensions.com/flip-wall.html update notice [http://www.example.com link title]
 
|-
 
|-
|style="background:red; color:white" | '''jm-recommend'''
+
|style="background:#cef2e0; color:black" |
|jm-recommendCross Site Scripting Vulnerabilities. unable to locate on jed. {{JVer|1.5}} Dec 27
+
 
|[http://www.exploit-db.com Reference]
+
== Freestyle FAQ 1.5.6    ==
|style="background:red; color:white"  | '''  Not Known'''
+
|http://freestyle-joomla.com/fssdownloads/viewcategory/2 Freestyle FAQ 1.5.6 ‎SQL Injection
 +
|
 +
|[http://freestyle-joomla.com/index.php?announceid=43 new version (1.9.0) is available which fixes] the security issues.
 +
 
 
|-
 
|-
|style="background:red; color:white" | facileforms
+
|style="background:red; color:white" |
| com_facileforms Cross Site Scripting Vulnerabilities. unable to locate on jed. Product considered retired{{JVer|1.5}} Dec 27
+
 
|[http://www.exploit-db.com Reference]
+
==  iJoomla Magazine 3.0.1 ==
|style="background:red; color:white"  | '''  Not Known'''
+
|iJoomla Magazine 3.0.1 RFI
 +
|090910
 +
|
 
|-
 
|-
|style="background:red; color:white" |'''adagency'''
+
|style="background:red; color:white" |
| [http://www.ijoomla.com/ijoomla-ad-agency/ijoomla-ad-agency/index/ adagency ]Vulnerabilities {{JVer|1.5}} Dec 27
+
 
|[http://www.exploit-db.com Reference]
+
==  Clantools  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|  
 +
|http://www.joomla-clantools.de/downloads/doc_download/7-clantools-123.html clantool sqli
 +
|090910
 +
|
 
|-
 
|-
|style="background:red; color:white" |  '''com_intuit'''
+
|style="background:red; color:white" |
|[http://www.san-diego-web-designer.com/new-file-download/item/root/aboutimage-igateway-for-joomla.html com_intuit]Local File Inclusion Vulnerability {{JVer|1.5}} Dec. 27
+
 
|[http://www.exploit-db.com Reference]
+
== jphone  ==
|style="background:#cef2e0; color:white" | '''  [http://www.securityfocus.com/bid/37494/discuss Retired]'''
+
|jphone LFI
 +
|090910
 +
|
 +
 
 
|-
 
|-
|style="background:red; color:white" | '''MemoryBook'''
+
|style="background:#cef2e0; color:black" |
|[http://extensions.joomla.org/extensions/calendars-a-events/birthdays-a-historic-events/10868 MemoryBook 1.2] Multiple Vulnerabilities. requires: magic quotes OFF, user account {{JVer|1.5}} Dec. 27
+
==  PicSell    ==
|[http://www.exploit-db.com Reference]
+
|[http://vm.xmlswf.com/index.php?option=com_content&view=article&id=104&Itemid=131Picsell LFD, 777]
|style="background:red; color:white"  | '''  Not Known'''
+
|020910
 +
|new version [http://vm.xmlswf.com/picsell released 150312] version number 11
 +
 
 
|-
 
|-
|style="background:red; color:white" |'''qpersonel'''
+
|style="background:red; color:white" |
|[http://extensions.joomla.org/extensions/directory-a-documentation/thematic-directory/7049 qpersonel ] Cross Site Scripting Vulnerabilities {{JVer|1.0}}[[Image:http://extensions.joomla.org/images/jed/compat_15_legacy.png]] Dec. 27
+
 
|[http://www.exploit-db.com Reference]
+
==  Zoom Portfolio  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|SID
 +
|020910
 +
|
 
|-
 
|-
|style="background:red; color:white" |'''opryknings point'''
+
|style="background:red; color:white" |
|com_oprykningspoint_mc Cross Site Scripting Vulnerabilities {{JVer|1.5}} Dec. 27
+
 
|[http://www.exploit-db.com Reference]
+
==  zina  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|[http://www.pancake.org/zina/ SQL Injection]
 +
|020910
 +
|
 
|-
 
|-
|style="background:red; color:white" |'''trabalhe conosco'''
+
|style="background:red; color:white" |
|com_trabalhe_conosco Cross Site Scripting Vulnerabilities {{JVer|1.5}} Dec. 27
+
 
|[http://www.exploit-db.com Reference]
+
==  Team's  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|[http://www.joomlamo.com Teams extension] SQL Injection
 +
|120810
 +
|
 
|-
 
|-
|style="background:red; color:white" |'''DhForum'''
+
|style="background:red; color:white" |
|com_dhforum SQL Injection Vulnerability. considered retired/EOL Dec. 27 {{JVer|1.0}}1.5 legacy
+
 
|[http://www.exploit-db.com Reference]
+
==  Amblog    ==
|style="background:red; color:white"  | '''  Not Known'''
+
|[http://robitbt.hu/jm/index.php?option=com_amdownloader&task=showfiles&pathid=8 Amblog] SQLi
 +
|120810
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black" |'''com_morfeoshow'''
+
|style="background:red; color:white" |
|[http://extensions.joomla.org/extensions/photos-a-images/photo-gallery-add-ons/9810 morfeoshow] this was a false report
+
 
|[http://www.exploit-db.com Reference]
+
==    ==
|style="background:#cef2e0; color:black"  | '''  false report'''
+
|
 +
|
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black"  |'''Run Digital Download rd-download'''
+
|
|[http://extensions.joomla.org/extensions/directory-a-documentation/downloads/7838 RD Download] Local File Disclosure Vulnerability  {{JVer|1.5}} Dec. 30 Version affected not disclosed.
+
==    ==
|[http://www.exploit-db.com Reference]
+
|
|style="background:#cef2e0; color:white"  | [http://extensions.joomla.org/extensions/directory-a-documentation/downloads/7838 Version 0.9 relased]
+
|
 +
|
 
|-
 
|-
 +
|style="background:red; color:white"  |
 +
 +
==  wmtpic  ==
 +
|www.webmaster-tips.net various
 +
|010710
 
|
 
|
 +
 +
 +
|-
 +
|style="background:red; color:white"  |
 +
 +
== Jomtube    ==
 +
|http://www.jomtube.com/ SID
 +
|220710
 
|
 
|
 
|
 
|
 +
|-
 +
|style="background:red; color:white"  |
 +
 +
== Rapid Recipe    ==
 +
|http://www.rapid-source.com Persistent XSS Vulnerability last known fix version 1.7.2
 +
|july 10,2010
 
|
 
|
|}
+
|-
 +
|style="background:red; color:white"  |
  
----
+
==  Health & Fitness Stats  ==
 +
|http://joomla-extensions.instantiate.co.uk/jcomponents/healthstats Persistent XSS Vulnerability july 10,2010
 +
|
 +
|
 +
|-
 +
|style="background:red; color:white"  |
  
  
 +
==  staticxt  ==
 +
|http://extensions.joomla.org/extensions/edition/custom-code-in-content/2184  no version number provided
 +
|
 +
|
  
== January 2010 Reported Vulnerable Extensions ==
 
  
 +
|-
 +
|style="background:red; color:white"  |
  
'''Please check with the extension publisher in case of any questions over the security of their product.'''
+
==  quickfaq  ==
Report Vulnerable extensions either in the [[jforum:432]] security topic or the [http://forum.joomla.org/viewforum.php?f=470 extensions] topic clearly marked with the first word in the title being ''Vulnerable'' where the security moderators or JSST team will respond.
+
|http://www.schlu.net sqli
''This list is change protected, for updates or editing requests [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=28000 Mandville] or [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=87230 lafrance]
+
|090710
''
+
|
 +
|-
 +
|style="background:red; color:white"  |
  
[http://docs.joomla.org/Vulnerable_Extensions_List Back To Top]
+
==    Minify4Joomla  ==
 +
|http://waltercedric.com/ LFI and xss
 +
|090710
 +
|No longer available to download
 +
|-
 +
|style="background:#cef2e0; color:black" |
  
 +
==  IXXO Cart  ==
 +
|http://www.php-shop-system.com/ SQLi LFI XSS Vulnerability
 +
|
 +
|developer resolution [http://support.ixxoglobal.com/index.php?/News/NewsItem/View/22/ixxo-cart-new-release-v41190 notice]
  
 +
|-
 +
|style="background:red; color:white"  |
  
{| class="wikitable sortable" border="1"
+
== PaymentsPlus  ==
 +
|http://paymentsplus.com.au/ 2.1.5 Blind SQL Injection Vulnerability
 +
|090710
 +
|current version 2.20, 2.1.5 not listed on dev site
 
|-
 
|-
!  '''Extension'''
+
|style="background:red; color:white" |
! class="unsortable"| '''Details'''
+
 
! '''Reference Link'''
+
== ArtForms  ==
!  '''Extension Update Link'''
+
|http://joomlacode.org/gf/project/jartforms/ ArtForms 2.1b7.2 RC2 Multiple Remote Vulnerabilities
 +
|090710
 +
| Old beta extension
 +
 
 
|-
 
|-
|style="background:red; color:white"  |JvideoDirect
+
|style="background:red; color:white" |
|Summary: [http://extensions.joomla.org/extensions/multimedia/video-players-a-gallery/9501 Jvideodirect] SQLi Jan 29
+
 
 +
==  autartimonial   ==
 +
|autartica.be Sqli Vulnerability
 +
|060710
 
|
 
|
|style="background:red; color:white" | '''  Not Known'''
+
 
 +
 
 +
 
 +
 
 
|-
 
|-
|style="background:#cef2e0; color:black"   |'''JEvent'''
+
|style="background:red; color:white" |
|Summary: [http://extensions.joomla.org/extensions/calendars-a-events/events/95 JEvent] SQLi reported Jan 29
+
 
 +
== eventcal 1.6.4    ==
 +
|http://joomlacode.org/gf/project/eventcal/frs/ SQL I  last update 2006-12-31 on joomlacode
 +
|040710
 
|
 
|
|style="background:#cef2e0; color:white" | '''  [http://www.jevents.net/forum/viewtopic.php?f=17&t=3910#p15526 upgrade to 1.5.3b]'''
+
 
 +
 
 +
 
 +
 
 
|-
 
|-
|style="background:red; color:white"   |'''Kunena'''
+
|style="background:red; color:white" |
|Summary: [http://extensions.joomla.org/extensions/communication/forum/7256/details kunena] re reported suffering SQLi in version 1.5.9 Jan 29 '''Confirmation Required'''
+
 
 +
== date converter    ==
 +
|http://sourceforge.net/projects/date-converter/ sqli
 +
|010710
 
|
 
|
|style="background:red; color:white" | '''  Not Known'''
+
 
 +
 
 
|-
 
|-
|style="background:red; color:white"   |'''JE Quiz'''
+
|style="background:red; color:white" |
|Summary : http://extensions.joomla.org/extensions/contacts-and-feedback/quiz-a-surveys/11212 JeQuiz SQLi reported 29 Jan
+
 
 +
== real estate    ==
 +
|http://www.opensourcetechnologies.com/demos/real-estate.html RFI
 +
|210610
 
|
 
|
|style="background:red; color:white" | '''  Not Known'''
+
 
 +
 
 
|-
 
|-
|style="background:red; color:white"  |'''idoblog'''
+
|style="background:red; color:white" |
|summary: exploitable due to open file permissions. 28 Jan
+
 
|Private Notification
+
==  cinema   ==
|style="background:red; color:white" | '''  Not Known'''
+
|SQL injection
 +
|190610
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black"   |'''ccnewsletter'''
+
|style="background:red; color:white" |
|Summary [http://extensions.joomla.org/extensions/5112/details ccnewsletter Directory Traversal Vulnerability] Jan 28
+
 
|Private Notification
+
==  Jreservation  ==
|style="background:#cef2e0; color:white"  | ''' [http://www.chillcreations.com/en/blog/ccnewsletter-joomla-newsletter/ccnewsletter-106-security-release.html version 1.0.6 released 29 Jan]'''
+
|http://jforjoomla.com/ SQLi Vulnerability
 +
|190610
 +
|
 +
 
 
|-
 
|-
|style="background:red; color:white"  |'''Virtuemart 1.1.4'''
+
|style="background:red; color:white" |
|Summary: [http://extensions.joomla.org/extensions/e-commerce/shopping-cart/129 virtuemart] Input var order_status_id is vulnerable to SQLi NB Requires Higher Level access before exploiting. Jan 27
+
 
 +
==   joomdocs  ==
 +
|http://joomclan.com/index.php/JoomDocs/ xss vulnerability
 +
|190610
 
|
 
|
|style="background:red; color:white" | '''  Not Known'''
+
 
 
|-
 
|-
|style="background:#cef2e0; color:black|'''JBDiary'''
+
|style="background:red; color:white" |
|Summary: [http://extensions.joomla.org/extensions/calendars-a-events/events/11009 JBDiary] BLIND SQL Injection Vulnerabilities Jan 24 [http://www.jb-soft.nl/ http://www.jb-soft.nl/]
+
 
 +
==   Live Chat    ==
 +
|http://www.joompolitan.com/livechat.html Multiple Remote Vulnerabilities
 +
|190610
 
|
 
|
|style="background:#cef2e0; color:white"  | ''' [http://www.jb-soft.nl/index.php?option=com_content&view=article&id=64 Developer Update 27 Jan]'''
 
 
|-
 
|-
|style="background:#cef2e0; color:black"   |'''JbPublishDownFp'''
+
|style="background:red; color:white" |
|Sumary: [http://extensions.joomla.org/extensions/news-production/timed-content/6496 JbPublishDownFp] SQL Injection Vulnerability Jan 24 [http://www.jb-soft.nl http://www.jb-soft.nl]
+
 
 +
== Turtushout 0.11    ==
 +
| http://www.turtus.org.ua/files?func=fileinfo&id=13 SQL Injection (again)
 +
|190610
 
|
 
|
|style="background:#cef2e0; color:white"  |'''  [http://www.jb-soft.nl/index.php?option=com_content&view=article&id=64 Developer Update Jan 27]'''
 
 
|-
 
|-
|style="background:red; color:white" |'''com_casino'''
+
|style="background:red; color:white" |
|Summary: [http://extensions.joomla.org/extensions/sports-a-games/tips-a-betts com_casino]
+
 
SQL Injection Vulnerabilities Jan24
+
==  BF Survey Pro Free  ==
 +
|BF Survey Pro Free SQL Injection Exploit
 +
|190610
 +
|Product marker as retired by the developer
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
==  MisterEstate  ==
 +
|http://www.misterestate.com/ Blind SQL Injection Exploit
 +
|190610
 
|
 
|
|style="background:red; color:white"  | '''  Not Known'''
 
 
|-
 
|-
|style="background:#cef2e0; color:black"   |'''Mochigames'''
+
|style="background:red; color:white" |
|Summary: [http://extensions.joomla.org/extensions/search/mochigames com_Mochigames]
+
 
SQL Injection Vulnerabilities Jan24
+
==  RSMonials    ==
 +
|http://www.rswebsols.com/downloads/category/14-download-rsmonials-all?download=23%3Adownload-rsmonials-component XSS Exploit
 +
|190610
 +
|Believed to be 1.5.1 version
 +
 
 +
 
 +
|-
 +
|style="background:red; color:white"  |
 +
 
 +
==  Answers v2.3beta  ==
 +
|Multiple Vulnerabilities http://extensions.joomla.org/extensions/communication/forum/12652
 +
|180610
 
|
 
|
|style="background:#cef2e0; color:white" | ''' [http://www.yoflash.com/download.html mochigames_alpha052 Released]'''
 
 
|-
 
|-
|style="background:red; color:white"  |'''ContentBlogList'''
+
|style="background:red; color:white"  |
|Summary: [http://extensions.joomla.org/extensions/news-production/blog/10989 com_ContentBlogList] SQL Injection Vulnerability Jan 23
+
 
|[http://www.exploit-db.com Reference]
+
==  Gallery XML 1.1  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|Multiple Vulnerabilities
 +
http://extensions.joomla.org/extensions/photos-a-images/photo-gallery/12504
 +
|180610
 +
|
 
|-
 
|-
|style="background:red; color:white"  |MailChimp for Joomla 1.5
+
|style="background:red; color:white"  |
|Summary: [http://extensions.joomla.org/extensions/bridges/mailing-a-newsletter-bridges/7836 MailChimp for Joomla 1.5]  jan 17
+
 
|Developer Statement
+
==  JFaq 1.2  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|JFaq 1.2 Multiple Vulnerabilities
 +
|180610
 +
|
 
|-
 
|-
|style="background:red; color:white"  |'''JoomlaXML'''
+
|style="background:red; color:white"  |
|Summary: [http://extensions.joomla.org/extensions/tools/design-tools/5020 JoomlaXML] malicious code insertion
+
 
 +
==  Listbingo 1.3  ==
 +
|Multiple Vulnerabilities
 +
http://extensions.joomla.org/extensions/ads-a-affiliates/classified-ads/12062
 +
|180610
 
|
 
|
|style="background:red; color:white"  | '''  Not Known'''
+
 
 
|-
 
|-
| style="background:red; color:white"  | '''JVClouds3D SWF module'''
+
|style="background:red; color:white"  |
|[http://joomlapro.ru/3djvclouds JVClouds3D SWF module] Cross Site Scripting . jan 14
+
 
|[http://xforce.iss.net/xforce/xfdb/55535 xforce]
+
== Alpha User Points    ==
|style="background:red; color:white"  | '''  Not Known'''
+
|www.alphaplug.com LFI
 +
|180610
 +
|
 +
 
 
|-
 
|-
|style="background:red; color:white"  | '''JVClouds3D'''
+
|style="background:red; color:white"  |
|[http://joomlapro.ru/3djvclouds JVClouds3D module] Cross Site Scripting . jan 14
+
 
|[http://xforce.iss.net/xforce/xfdb/55534 xforce]
+
==  recruitmentmanager  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|http://recruitment.focusdev.co.uk Upload Vulnerability
 +
|130610
 +
|
 
|-
 
|-
|style="background:red; color:white"  |'''JA Showcase'''
+
|style="background:red; color:white"  |
|[http://www.joomlart.com/addons/components_and_modules/ja_showcase.html JA Showcase component] Directory Traversal jan 14
+
 
|[http://xforce.iss.net/xforce/xfdb/55512 xforce]
+
==  Info Line (MT_ILine)    ==
|style="background:red; color:white"  | '''  Not Known'''
+
|http://extensions.joomla.org/extensions/news-display/news-tickers-a-scrollers/8425 reports of shell scripts in download file
 +
|120610
 +
|
 +
 
 +
 
 +
 
 
|-
 
|-
|style="background:red; color:white"  |'''jprojects'''
+
|style="background:red; color:white"  |
|Summary:   Unknown Author com_j-projects Blind SQL Injection Vulnerability. Jan 10 detail update
+
 
|[http://www.exploit-db.com Reference]
+
==  Ads manager  Annonce   ==
|style="background:red; color:white"  | '''  Not Known'''
+
|http://joomla.clubnautiquemarine.fr/
 +
Upload Vulnerability
 +
| 05/06/10
 +
|
 
|-
 
|-
|style="background:red; color:white"   |'''jEmbed-Embed Anything'''
+
|style="background:red; color:white" |
|[http://www.joshprakash.com/index.php?option=com_docman&task=doc_details&gid=70 jEmbed-Embed Anything] A vulnerability has been discovered in the jEmbed-Embed Anything component for Joomla, which can be exploited by malicious people to conduct SQL injection attacks. Jan 10
+
 
|[http://secunia.com/advisories/38112 Secunia Advisory: SA38112]
+
== lead article    ==
|style="background:red; color:white"  | [http://extensions.joomla.org/extensions/3699/details Product considered retired]
+
|http://www.leadya.co.il/ SQLi
 +
|050610
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black"   |'''perchagallery '''
+
|style="background:red; color:white" |
|Summary: perchagallery [http://extensions.joomla.org/extensions/photos-a-images/photo-gallery/10350 com_perchagallery] SQL Injection Vulnerability  Jan 7
+
 
|[http://www.exploit-db.com Reference]
+
== djartgallery  ==
|style="background:#cef2e0; color:white"  | '''  [http://www.percha.com/index.php?option=com_phocadownload&view=file&id=22:1.5&Itemid=20 Developer Update 1.5b]'''
+
|http://www.design-joomla.eu Multiple Vul
 +
|05/06/10
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black"   | '''CARTwebERP'''
+
|style="background:red; color:white" |
|Summary:  [http://extensions.joomla.org/extensions/bridges/e-commerce-bridges/8753 CARTwebERP] Local File Inclusion Vulnerability  Jan. 3
+
 
|[http://www.exploit-db.com Reference]
+
== Gallery 2 Bridge    ==
|style="background:#cef2e0; color:white"  | '''  [http://extensions.joomla.org/extensions/bridges/e-commerce-bridges/8753 1.56.76 (last update on Jan 11, 2010)]'''
+
|[http://trac.4theweb.nl/g2bridge g2bridge] LFI vulnerability
 +
|
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black"  |   '''JoomlaBibleStudy'''
+
|style="background:red; color:white"  |
|Summary: [http://extensions.joomla.org/extensions/miscellaneous/religion/3461 JoomlaBibleStudy] LFI Vulnerability Jan. 3
+
 
|[http://www.exploit-db.com Reference]
+
== jsjobs  ==
|style="background:#cef2e0; color:white"  | '''[http://joomlabiblestudy.org/invisible-downloads/category/3-component.html Developer reported update]'''
+
|[http://www.joomsky.com jsjobs] SQL Injection Vulnerability
 +
|
 +
|
 
|-
 
|-
|style="background:red; color:white"  |  '''com_bfsurvey_basic and pro'''
+
|
|Summary: [http://www.tamlyncreative.com.au/software/ BFsurvey] SQL Injection Vulnerability ,LFI Vulnerability  Jan. 3
+
 
|[http://www.exploit-db.com Reference]
+
==    ==
|style="background:red; color:white"  | '''  Not Known'''
+
|
 +
|
 +
|
 
|-
 
|-
|style="background:red; color:white"  | '''Alfresco'''
+
|style="background:red; color:white"  |
|Summary: SQL Injection Vulnerability. Not believed to be Joomlatools extension Jan. 3
+
 
|[http://www.exploit-db.com Reference]
+
==  JE Poll ==
|style="background:red; color:white"  | '''  Not Known'''
+
|http://slideshow.joomlaextensions.co.in/ SQL Injection Vulnerability
 +
|
 +
|
 +
 
 
|-
 
|-
|style="background:red; color:white"  |  '''abbrev'''
+
|style="background:red; color:white"  |
|Summary: [http://extensions.joomla.org/extensions/directory-a-documentation/glossary-a-dictionary/4965 abbrev] Local File Inclusion Vulnerability Jan. 3
+
 
|[http://www.exploit-db.com Reference]
+
== MediQnA  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|MediQnA LFI vulnerability version : v1.1
 +
|
 +
|
 
|-
 
|-
|style="background:red; color:white"  |  '''countries'''
+
|style="background:red; color:white"  |
|Summary: [http://extensions.joomla.org/extensions/miscellaneous/development/6553 countries] SQL Injection Vulnerability  Jan. 3
+
 
|[http://www.exploit-db.com Reference]
+
==  JE Job ==
|style="background:red; color:white"  | '''  Not Known'''
+
|http://joomlaextensions.co.in/ LFI SQLi
 +
|
 +
|
 +
 
 
|-
 
|-
|style="background:#cef2e0; color:black"  | '''Dedicated Component com_tpjobs'''
+
|
|Summary: [http://www.templateplazza.com/ tpjobs] SQL Injection Vulnerability unable to locate files probably template plaza  Jan. 3
+
 
|[http://www.exploit-db.com Reference]
+
==    ==
|style="background:#cef2e0; color:white"    | '''  [http://www.templateplazza.com/extensions-updates/tpjobs-component-update-v-1.1.html Developer Update] '''
+
|
 +
|
 +
|
 +
 
 
|-
 
|-
|style="background:red; color:white"  |  '''Component com_doqment'''
+
|style="background:red; color:white"  |
|SQL Injection Vulnerability Jan. 3
+
 
|[http://www.exploit-db.com Reference]
+
== SectionEx  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|Stack Ideas section Ex LFI
 +
|
 +
|
 
|-
 
|-
|style="background:red; color:white"  | '''Component com_otzivi'''
+
|style="background:red; color:white"  |
|Blind SQL Injection Vulnerability Jan. 3
+
 
|[http://www.exploit-db.com Reference]
+
== ActiveHelper LiveHelp    ==
|style="background:red; color:white"  | '''  Not Known'''
+
|XSS in [http://extensions.joomla.org/extensions/communication/chat/12492 LiveHelp]  
 +
|200510
 +
|
 +
 
 
|-
 
|-
|style="background:red; color:white| '''aprice'''
+
|style="background:#cef2e0; color:black" |
|Summary: [http://adeptweb.info/component/option,com_aprice/Itemid,109/ com_aprice] Component 'analog' Parameter SQL Injection Vulnerability
+
== JE Quotation Form  ==
|[http://www.securityfocus.com/bid/37575 Report]
+
|http://joomlaextensions.co.in/free-download/doc_download/11-je-quotation-form.html  LFI
|style="background:red; color:white" | ''' Not Known'''
+
|
 +
|developers statement of [http://joomlaextensions.co.in/extensions/joomla-components/product/JE-Quote-Form resolution]  '''note''', now known as [http://joomlaextensions.co.in/extensions/joomla-components/product/JE-Quote-Form JE Quote Form]
 
|-
 
|-
|style="background:red; color:white"  |'''cartikads'''
+
|style="background:red; color:white"  |
|Summary: [http://www.cartikahosting.com com_cartikads] Remote File Upload Vulnerability  
+
 
'''Mambo''' Open Source ads management component
+
==  konsultasi  ==
|[http://www.exploit-db.com Reference]
+
|SQL Injection Vulnerability
|style="background:red; color:white"  | '''  Not Known'''
+
|
 +
|
 +
 
 
|-
 
|-
|style="background:#cef2e0; color:black"   | '''Docman seller'''
+
|style="background:red; color:white" |
|Summary: [http://extensions.joomla.org/extensions/e-commerce/subscriptions/5000 Document seller]  Input passed via the "id" parameter to index.php (when "option" is set to "com_dm_orders", "task" is set to "order_form", and "payment_method" is set to "Paypal") is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
+
 
|[http://secunia.com/advisories/38024/ secunia]
+
==  Seber Cart    ==
|style="background:#cef2e0; color:white"  | [http://extensions.joomla.org/extensions/e-commerce/subscriptions/5000 Updated 10th Jan]
+
|Local File Disclosure Vulnerability
 +
|
 +
|[http://www.sebercart.com/index.php?option=com_content&view=article&id=158 Developer Update 140510]
 +
 
 
|-
 
|-
|style="background:#cef2e0; color:black" '''ozio gallery'''
+
|style="background:red; color:white"   |
|summary: [http://extensions.joomla.org/extensions/photos-a-images/photo-flash-gallery/4883 Ozio Gallery2] SQLi eploit
+
 
|[http://www.viruslist.com/en/advisories/37974 Reference]
+
== Camp26 Visitor    ==
|style="background:#cef2e0; color:white"  |[http://oziogallery.joomla.it/index.php?option=com_content&view=article&id=62%3Anuova-ozio-gallery-23-aggiornamento-di-sicurezza&catid=2%3Anotizie&Itemid=13&lang=en developer update Jan 11]
+
|RFI www.camp26.biz
 +
|
 +
|
 +
 
 +
 
 +
 
 
|-
 
|-
|style="background:red; color:white"  | '''RD-Autos Free'''
+
|style="background:red; color:white"  |
|[http://extensions.joomla.org/extensions/vertical-markets/vehicles/5458 RD-Autos Free ] Version 2.0.1
+
 
|Private advisory to JED Jan 11
+
==  JE Property  ==
|style="background:red; color:white"  | '''  Not Known'''
+
|JE Property Finder Upload Vulnerability
 +
|
 +
|
 
|-
 
|-
|style="background:red; color:white" '''DailyMeals'''
+
|style="background:red; color:white"   |
|Summary: [http://extensions.joomla.org/extensions/vertical-markets/food-a-beverage/4764 dailymeals] Local File Inclusion Vulnerability Jan 02
+
 
|[http://www.exploit-db.com Reference]
+
==  Noticeboard ==
|style="background:red; color:white"  | '''  Not Known'''
+
|Noticeboard for Joomla "controller" Local File Inclusion Vulnerability
 +
|
 +
|
 
|-
 
|-
|style="background:#cef2e0; color:black" | '''RD-Autos Pro'''
+
|style="background:red; color:white"   |
|[http://extensions.joomla.org/extensions/vertical-markets/vehicles/6357 RD Autos Pro]
+
 
|Private advisory to JED Jan 11
+
==SmartSite    ==
|style="background:#cef2e0; color:black"  | '''  Upgrade to  Latest version  be 2.0.2'''
+
|SmartSite com_smartsite Local File Inclusion Vulnerability
 +
|
 +
|
 +
 
 
|-
 
|-
 +
|style="background:red; color:white"  |
 +
 +
==  htmlcoderhelper graphics  ==
 +
|htmlcoderhelper graphics v1.0.6 LFI Vulnerability
 
|
 
|
 
|
 
|
 +
|-
 +
|style="background:red; color:white"  |
 +
 +
== Ultimate Portfolio    ==
 +
|Ultimate Portfolio  Local File Inclusion Vulnerability
 
|
 
|
 
|
 
|
|}
 
  
== New format Feed Starts Here ==
+
|-
Please do not change your [http://feeds.joomla.org/JoomlaSecurityVulnerableExtensions feed url], only the feed format has changed.
+
|style="background:red; color:white"  |
  
 +
==  Archery Scores  ==
 +
| [http://lispeltuut.org/ Archery Scores (com_archeryscores) v1.0.6 LFI Vulnerability]
  
== February 2010 Reported Vulnerable Extensions ==
+
|210410
<startFeed />
+
|
 +
|-
 +
|style="background:red; color:white"  |
  
'''Please check with the extension publisher in case of any questions over the security of their product.'''
+
==  ZiMB Manager  ==
Report Vulnerable extensions either in the [[jforum:432]] security topic clearly marked with the first word in the title being ''Vulnerable Report'' where the security moderators or JSST team will respond. For a guide to the [http://docs.joomla.org/Vulnerable_Extensions_List_0210#Codes_used codes]
+
|Joomla Component ZiMB Manager Local File Inclusion Vulnerability
 +
|210410
 +
|
 +
|-
 +
|style="background:red; color:white"  |
  
[http://docs.joomla.org/Vulnerable_Extensions_List Previous Reports]
+
==  Matamko  ==
 +
|Matamko Local File Inclusion Vulnerability
 +
|210410
 +
|
 +
|-
 +
|style="background:red; color:white"  |
  
{| class="wikitable sortable" border="1"
+
== Multiple Root  ==
 +
|Multiple Root Local File Inclusion Vulnerability http://joomlacomponent.inetlanka.com/
 +
|
 +
|
 
|-
 
|-
!  '''Extension'''
+
|style="background:red; color:white"   |
! class="unsortable"| '''Details'''
+
 
! '''Date Added'''
+
== Multiple Map  ==
!  '''Extension Update Link & Date'''
+
|Multiple Map Local File Inclusion Vulnerability joomlacomponent.inetlanka.com
 +
|
 +
|
 
|-
 
|-
 
|style="background:red; color:white"  |
 
|style="background:red; color:white"  |
  
== Yelp ==
+
==   Contact Us Draw Root Map  ==
| SQLi - Unable to locate developer. Possibly a custom extension.
+
|Draw Root Map Local File Inclusion Vulnerability joomlacomponent.inetlanka.com
|Feb 01
+
|
|style="background:red; color:white" | '''  Not Known'''
+
|
 
|-
 
|-
|style="background:red; color:white" |
+
|style="background:red; color:white"   |
  
==   ==
+
== iF surfALERT  ==
|  
+
|[http://www.inertialfate.za.net/ iF surfALERT] Local File Inclusion Vulnerability
 +
|
 
|
 
|
|style="background:red; color:white" | '''  Not Known'''
 
 
|-
 
|-
|style="background:red; color:white" |
+
|style="background:red; color:white"   |
  
==   ==
+
==   GBU FACEBOOK  ==
 +
|GBU FACEBOOK SQL injection vulnerability http://www.gbugrafici.nl/gbufacebook/
 +
|
 
|
 
|
 +
|-
 +
|style="background:red; color:white"  |
 +
 +
==  jnewspaper  ==
 +
|jnewspaper (cid) SQL Injection Vulnerability
 
|
 
|
 
|
 
|
 +
 +
 +
 +
 +
 
|-
 
|-
|style="background:red; color:white" |
+
|
  
 
==    ==
 
==    ==
Line 921: Line 1,525:
 
|
 
|
 
|
 
|
|}
+
|-
<endFeed />
+
|style="background:red; color:white"  |
 +
== MT Fire Eagle ==
 +
 
 +
|LFI http://joomlacode.org/gf/project/jfireeagle/frs/ http://www.moto-treks.com
 +
| 190410
 +
| product considered retired and to be replaced by dev
 +
 
 +
|-
 +
|style="background:red; color:white"|
 +
 
 +
==  Sweetykeeper  ==
 +
|Sweetykeeper Local File Inclusion Vulnerability  http://www.joomlacorner.com/
 +
|120410
 +
|
 +
|-
 +
|style="background:red; color:white"|
 +
 
 +
==  jvehicles  ==
 +
|SQL Injection http://jvehicles.com
 +
|120410
 +
|
 +
|-
 +
|style="background:red; color:white"|
 +
 
 +
==  worldrates  ==
 +
|http://dev.pucit.edu.pk/
 +
|120410
 +
|
 +
|-
 +
|style="background:red; color:white"|
 +
 
 +
==  cvmaker  ==
 +
|http://dev.pucit.edu.pk/
 +
|
 +
|
 +
|-
 +
|style="background:red; color:white"|
 +
 
 +
==  advertising  ==
 +
|http://dev.pucit.edu.pk/
 +
|
 +
|
 +
|-
 +
|style="background:red; color:white"|
 +
 
 +
==  horoscope  ==
 +
|http://dev.pucit.edu.pk/
 +
|120410
 +
|
 +
|-
 +
|style="background:red; color:white"|
 +
 
 +
==  webtv  ==
 +
|http://dev.pucit.edu.pk/
 +
|120410
 +
|
 +
|-
 +
|style="background:red; color:white"|
 +
 
 +
==  diary  ==
 +
|http://dev.pucit.edu.pk/
 +
|120410
 +
|
 +
 
 +
|-
 +
|style="background:red; color:white"|
 +
 
 +
==  Memory Book  ==
 +
|http://dev.pucit.edu.pk/
 +
|120410
 +
|
 +
|-
 +
|style="background:red; color:white"|
 +
 
 +
==  JprojectMan  ==
 +
|LFI http://extensions.joomla.org/extensions/communities-a-groupware/project-a-task-management/5676
 +
|110410
 +
|
 +
 
 +
|-
 +
|style="background:red; color:white"|
 +
 
 +
==  econtentsite  ==
 +
|LFI
 +
|040410
 +
|
 +
|-
 +
|style="background:red; color:white"|
  
''This list is change protected, for updates or additions [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=28000 Mandville] or [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=87230 lafrance]
+
==   Jvehicles ==
''
+
|ID
 +
|040410
 +
|
 +
|-
 +
|
  
== Codes used ==
+
==     ==
SQLi - SQL injection [http://en.wikipedia.org/wiki/Code_injection#SQL_injection wikipedia]
+
|
 +
|
 +
|-
 +
|style="background:red; color:white"|
  
LFI - Local File Inclusion [http://www.scribd.com/doc/6498408/Remote-and-Local-File-Inclusion-Explained scribd]
+
==    gigcalender  ==
  
RFI - Remote file inclusion [http://en.wikipedia.org/wiki/Remote_File_Inclusion wikipedia]
+
|SQLi [http://extensions.joomla.org/extensions/calendars-a-events/events/97)http://extensions.joomla.org/extensions/calendars-a-events/events/97 gigcalender]
 +
|13 march 2010
 +
|
 +
|-
 +
|style="background:red; color:white"|
  
DT - Directory Traversal [http://en.wikipedia.org/wiki/Directory_traversal wikipedia]
+
==    heza content  ==
 +
|SQLi [http://extensions.joomla.org/extensions/structure-a-navigation/sections-a-categories/10427)http://extensions.joomla.org/extensions/structure-a-navigation/sections-a-categories/10427  heza content]
 +
|13 march 2010
 +
|
  
  
 +
|-
 +
|style="background:red; color:white" |
  
 +
==  SqlReport  ==
 +
|Sqlreport has a sql/RFI exploit. awaiting confirmation on exact developer.
 +
|Feb 20
 +
|'''Not Known'''
  
 +
|-
 +
|style="background:red; color:white" |
  
 +
== Yelp ==
 +
| SQLi - Unable to locate developer. Possibly a custom extension.
 +
|Feb 01
 +
|style="background:red; color:white" | '''  Not Known'''
 +
|-
  
== Developers - How to get yourself removed from the from the VEL ==
+
|-
 +
|
  
Resolved items will be removed after a suitable period and not on resolution
+
==    ==
 +
|
 +
|
 +
|
 +
|}<endFeed />
  
Please solve the issues and:
+
''This list is change protected, for updates or additions [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=28000 Mandville] or [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=87230 lafrance] or [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=67439 PhilD]
 +
''
  
* If JED listed
+
== Codes used ==
Attach the new zip file at your actual JED listing.
+
SQLi - SQL injection [http://en.wikipedia.org/wiki/Code_injection#SQL_injection wikipedia]
  
Change the extension version at JED listing.
+
LFI - Local File Inclusion [http://www.scribd.com/doc/6498408/Remote-and-Local-File-Inclusion-Explained scribd]
  
Contact the JED by mail back with a notice and ask them republish your listing.
+
RFI - Remote file inclusion [http://en.wikipedia.org/wiki/Remote_File_Inclusion wikipedia]
  
 +
DT - Directory Traversal [http://en.wikipedia.org/wiki/Directory_traversal wikipedia] (incl 777 folders)
  
* If not JED listed.
+
ID = Information Disclosure: account information or sensitive information publicly viewable, or passed to 3rd party without knowledge
Inform us by PM of the link to your resolution notice on your website.
 
  
 
== Future Actions & WIP ==
 
== Future Actions & WIP ==
Line 966: Line 1,690:
  
 
== Notes ==
 
== Notes ==
The RSS feed is currently sent as ONE item. This is to prevent people only parsing for example 10 items and missing half the list. We try and put the newest item to the top of the list but it is not always possible.  
+
The RSS feed is currently fed by item entry order and not by date fixed.  
 
List as discussed in  [[jtopic:455746]] by [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=67439 PhilD] editing by [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=28000 Mandville]
 
List as discussed in  [[jtopic:455746]] by [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=67439 PhilD] editing by [http://forum.joomla.org/memberlist.php?mode=viewprofile&u=28000 Mandville]
Exploits under investigation are held on this [http://docs.joomla.org/Investigation_of_exploits exploit''' investigation''' list]
 
----
 
[[Category:Security]]
 
[[Category:Security_FAQ]]
 
  
 
----
 
----
 +
__NOINDEX__
 +
[[Category:Archived pages]]

Latest revision as of 17:39, 8 April 2020

This page has been archived. This page contains information for an unsupported Joomla! version or is no longer relevant. It exists only as a historical reference, it will not be improved and its content may be incomplete and/or contain broken links.


Info non-talk.png
General Information

This document has now been replaced by the website at vel.joomla.org from 1st May 2013 Please refer to there for the latest updates

List prior to January 2011 (now archived) Please check here also.

Check and Report.[edit]

Please check with the extension publisher in case of any questions over the security of their product.

Info non-talk.png
General Information

All reports are now to be made via vel.joomla.org

Report Vulnerable extensions in the vel website

How to use this list[edit]

Items will be removed after a suitable period and not on resolution.

Info non-talk.png
General Information

This document has now been replaced by the website at vel.joomla.org from 1st May 2013 Please refer to there for the latest updates

All known vulnerable extensions are the listed in the first column "Extension". Any in a red box are where we have not been given a fix. Any in a turquoise box contain a link to the notice about an update with link. Any that are in an uncolored box are a "Contact the Developer About This Extension". Alert Advisory details are in the center column. If the "Extension Update Link & Date Column has Not Known then it is where no update is known.

This list is compiled from found information and may not be an up to date accurate list We do NOT promise to test or validate these reports. We do NOT guarantee the quality or effectiveness of any updates reported to us or listed here. To sign up for the feed please follow this link

  • We do not list BETA products, or extensions for J1.0.x

Developers - How to get yourself removed from the VEL[edit]

Resolved items will be removed after a suitable period and not on resolution

Please solve the issues and:

  • If JED listed

To have your extension republished, please follow these steps:

1- Solve the issues.

2- Attach the new zip file at your actual JED listing.

3- Change the extension version at JED listing.

4- Make sure to include a notice in the JED description to the fact that the new release is a "Security Release" and those who use the extension should upgrade immediately.

5-complete the resolution form on the website at vel.joomla.org from 1st May 2013

6- Create a JED listing owner ticket to the JED with a notice and ask that your listing be republished. Include the full details of your new version number and security notice page

VEL email can be found above and the JED support link is in your notice of "unpublication" and here

  • If not JED listed.

Inform us by email with a notice of resolution, the latest version number and a link to the security release statement on your website.

January 2012 and onwards Reported Vulnerable Extensions[edit]

<startFeed />

Extension Details Date Added Extension Update Link & Date

civic crm 422[edit]

upload exploit /RFI 260413 developer http://civicrm.org/category/civicrm-blog-categories/civicrm-v43 release 4.3.1

alfcontact[edit]

xss 230413 developer release statement on ALFContact v2.0.8 for J!2.5 ALFContact v3.1.4 for J!3

aiContactSafe 2.0.19[edit]

xss 160413 developer release statement for version 2.0.21

RSfiles[edit]

SQL 180313 developer release statement for version 12

Multiple Customfields Filter for Virtuemart[edit]

SQLi 18212 developers 1.6.8 update statement

Collector[edit]

Various [steevo.fr] 230113 developer update statement to 0.5.1

tz guestbook[edit]

Various 100113 developer release statement for 1.1.2

extplorer[edit]

2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 are vulnerable to an authentication bypass 251212 developer update to 2.1.3 statement

JooProperty[edit]

SQLi 101212 developer release new version 1.13.1 - upgrade notice

Multiple Customfields Filter for Virtuemart[edit]

SQLi 18212 developers update statement

ag google analytic[edit]

Various 061212

sh404sef <3.7.0[edit]

Undisclosed sh404SEF 3.4.x, 3.5.x, 3.6.x for Joomla 2.5 26112 developer statement

Login Failed Log[edit]

23112 ID - information disclosure developer release statement to ver 1.5.4

jNews[edit]

131112 developer update statement to version 7.9.1 151112


Joombah Jobs[edit]

Upload restriction issues 131112 developer update statement

commedia[edit]

RFI 231012 developer update statement to version 3.2 271012


Kunena[edit]

SQLi + ID 221012 Developer states current version not exploitable by reported methods


Icagenda[edit]

SQLi Developer statement for 1.2.9

JTag [joomlatag][edit]

SQLi

Freestyle Support[edit]

SQLi developer update statement 251012

ACEFTP[edit]

DT 011012 AceFTP 2.0.0 released. Developer statement 101012

MijoFTP[edit]

DT 011012 *reported fixed prior to notification*

spider calendar lite[edit]

RFI 180912 developer release version 1.5 version

RokModule[edit]

SQLi Rereported 180912 Developer states: no known exploits for our current versions of RokModule Joomla 2.5 - v1.3 Joomla 1.5 - v1.4

ICagenda[edit]

SQLi developer security release - v1.2.1 080912


En Masse cart[edit]

RFI 060812 Developer upgrade statement to 3.1.3

JCE (joomla content editor)[edit]

Upload Restriction <2.2.4 050812 Developer states current version not exploitable

RSGallery2[edit]

SQLi XSS 31 07 12 Devleoper statement versions 3.2.0 for Joomla 2.5 and version 2.3.0 for Joomla 1.5 released

osproperty[edit]

Unrestricted uploads 160712 Developer release version 2.0.3 180712

KSAdvertiser[edit]

RFI 160712 The security update version 1.5.72 advise can be found here:

German English

Shipping by State for Virtuemart[edit]

elevated permissions (http://web-expert.gr/en) 160612 Upgrade to v2.5 download commercial product 300612

ownbiblio 1.5.3[edit]

SQLi + 250512

Ninjaxplorer <=1.0.6[edit]

developer notification 250412 developer statement upgrade to 1.0.7

Phoca Fav Icon[edit]

Permissions Rewrite 150412 developer update 2.0.3 statement

estateagent improved[edit]

sqli (eaimproved.eu) 110412 developer states previous version, not current version

bearleague[edit]

110412 sql (no longer maintained)

JLive! Chat v4.3.1[edit]

DT 060412 Developer reports as unproven

virtuemart 2.0.2[edit]

SQLi 050412 developers release statementCurrent version 2.0.6 released

JE testimonial[edit]

SQLi 230312 Developer states malicious report.

JaggyBlog[edit]

excessive file permission 090212 version 1.3.1 released

Quickl Form[edit]

xss 260112

com_advert[edit]

sqli - unknown developer 240112

Joomla Discussions Component[edit]

sqli 180112 Discussions 1.4.1 released developer statement

HD Video Share (contushdvideoshare)[edit]

sqli 180112 updated version 2.2

Simple File Upload 1.3[edit]

RFI 010112 Developer update statement to 1.3.5

[edit]

<endFeed />

January 2011 - Jan 2012 Reported Vulnerable Extensions[edit]

Please check with the extension publisher in case of any questions over the security of their product. Report Vulnerable extensions either in the jforum:432 security topic clearly marked with the first word in the title being Vulnerable Report where the security moderators or JSST team will respond or via email to the VEL team. For a guide to the codes

<startFeed />

Extension Details Date Added Extension Update Link & Date

Simple File Upload 1.3[edit]

RFI 010112 Developer update statement to 1.3.5

Dshop[edit]

sqli (possibly dhrusya.com) 201111

QContacts 1.0.6[edit]

sqli 131211

Jobprofile 1.0[edit]

SQL Injection Vulnerability 051211

JX Finder 2.0.1[edit]

XSS Vulnerabilities 011211

wdbanners[edit]

Unknown Exploit 301111

JB Captify Content J1.5 and J1.7[edit]

Security checks missing -Versions prior to JB_mod_captifyContent_J1.5_J1.7_1.0.1.zip 141111 All extensions available on the site have been updated and this potential security issue has been resolved.

JB Microblog[edit]

Security checks missing - J1.7 only. Versions prior to 1.10.3 14111 All extensions available on the [joomlabamboo.com site have been updated] and this potential security issue has been resolved.

JB Slideshow <3.5.1,[edit]

Security checks missing 141111 All extensions available on the [joomlabamboo.com site have been updated] and this potential security issue has been resolved.

JB Bamboobox[edit]

Security checks missing - J1.5 all versions prior to 1.2.2 141111 All extensions available on the [joomlabamboo.com site have been updated] and this potential security issue has been resolved.

RokModule[edit]

SQLI - exploits RokStock RokWeather RokNewspager 121111 developer release statement RokModule v1.3 for Joomla 1.7 RokModule v1.4 for Joomla 1.5

hm community[edit]

Multiple Vulnerabilities 011111 developer release 1.01

Alameda[edit]

SQLi 01111 developer statement and Latest version number v1.0.1.

Techfolio 1.0[edit]

Techfolio 1.0 SQLI 291011

Barter Sites 1.3[edit]

Barter Sites 1.3 SQL Injection & Persistent XSS vulnerabilities 291011 developer release 1.3.1

Jeema SMS 3.2[edit]

Jeema SMS 3.2 Multiple Vulnerabilities 291011 developer resolution notice for 3.5.2

Vik Real Estate 1.0[edit]

Vik Real Estate 1.0 Multiple Blind SqlI 291011

yj contact[edit]

LFI (youjoomla contact) 241011 developer update statement 261011

NoNumber Framework[edit]

Advanced Module Manager * AdminBar Docker * Add to Menu * Articles Anywhere * What? Nothing!* Tooltips* Tabber* Sourcerer* Slider* Timed Styles* Modules Anywhere* Modalizer* ReReplacer* Snippets* DB Replacer* CustoMenu* Content Templater* CDN for Joomla!* Cache Cleaner* Better Preview 181011 see http://feeds.feedburner.com/nonumber/news for updates of various extensions

Time Returns[edit]

SQLi takeaweb.it 151011 No longer developed. New version 2.0.1 for Joomla 1.6/1.7 (old version are no longer supported) http://www.takeaweb.it

Simple File Upload[edit]

LFI 300811 developer advice page

Jumi[edit]

LFI 300811 Developer states proper use of joomla administration/extension documentation reading

Joomla content editor[edit]

JCE lfi/rfi vulnerability JCE 2.0.11 and JCE 1.5.7.14 have been released

Google Website Optimizer[edit]

Numerous vulnerabilities. Website Optimizer, Pearl Group 290811 developer update statement to ver. 1.4.0

Almond Classifieds[edit]

777 Folder settings (all folders it uses are set to 777 including previously 755 locked folders) 260811 developer resolution notice

joomtouch[edit]

LFI/RFI 180811 developers resolution notice 1.0.3

RAXO All-mode PRO[edit]

Timthumb RFI 110811 developer upgrade 1.5.0 statement

V-portfolio[edit]

DT - open folders 110811 developer resolution statement

obSuggest[edit]

LFI 310711 developer release statement

Simple Page[edit]

LFI 230711 developer update statement v1.5.17 has been released

JE Story[edit]

LFI 230711 devloper security update notice to ver 1.9

appointment booking pro[edit]

LFI 22071 developer update security announcement Current 2.0.1 and 1.4.x versions, are not vulnerable,

acajoom[edit]

xss (admin permission required) 220711 updated to 5.20

gTranslate[edit]

ID - 220711 developer security release 1.5 x.25 and 1.6 x.26.

alpharegistration[edit]

http://www.alphaplug.com/ Please contact the developer for any questions on this extension 170711 220711

Jforce[edit]

DT - 170711 developer states The new version number v1.5r1362 resolves the problem

Flash Magazine Deluxe Joomla[edit]

ID multiple vulnerabilities 170711 developer release 2.1.4

AVreloaded[edit]

SQLi - version 1.2.6 150711 1.2.7 released developer release statement 160711

Sobi[edit]

SQLI - 130711 developer fix and update statement

fabrik[edit]

sqli 120711 Developers Update statement 2.1

xmap[edit]

sqli 1.2.11 120711 upgrade to 1.2.12

Atomic Gallery[edit]

Creates 777 folders Atomic gallery 110711 developer release statement/changelog

myApi[edit]

ID Contains "Call-Home" function. Sends private user information to developer. 020711 Developer states Use version 1.3.4.1

mdigg[edit]

SQL I (not listed in JED) 020711

Calc Builder[edit]

sqli + ID 180611 dev security release 0.0.2

Cool Debate[edit]

Cool Debate 1.03 LFI version 1.0.8 released.

[edit]

Scriptegrator Plugin 1.5.5[edit]

LFI 140611 Update - Core Design Scriptegrator plugin 2.0.9 & 1.5.6

Joomnik Gallery[edit]

SQLi developer update to 0.9.1

JMS fileseller[edit]

LFI 0611 developer upgrade announcement to v1.1

sh404SEF[edit]

low-level XSS security issue 300511 Dev upgrade statement to 2.2.6

JE Story submit[edit]

LFI/RFI developer states Version 1.8

FCKeditor[edit]

File Upload Vulnerability 230511

KeyCaptcha[edit]

ID 190511

Ask A Question AddOn v1.1[edit]

SQLi 160511

Global Flash Gallery[edit]

flash-gallery.com xss 130511 dev release 0.5.0 statement

com_google[edit]

LFI com_google 080511 devs update to 1.5.1

docman[edit]

com-docman Input Validation Error 160511 devs resolution statement, report for old version

Newsletter Subscriber[edit]

XSS 120511 Deveopler update

Akeeba[edit]

akkeba backup and joomlapack 170411 dev update to 3.2.7

Facebook Graph Connect[edit]

SID. call home device with user credentials 120411 dev update notice

booklibrary[edit]

SQLi ordasoft booklibrary 180311 developer upgrade instructions

semantic[edit]

com semantic http://www.scms.es/joomla creates hidden admin users 150311

JOMSOCIAL 2.0.x 2.1.x[edit]

SID, open folders 120311

flexicontent[edit]

forced 777, malicious files 250311 devs resolve statement, Changelog

jLabs Google Analytics Counter[edit]

jLabs Google Analytics Counter SID

xcloner[edit]

Unspecified 260211 dev announcement of security release

smartformer[edit]

RFI 230211 (repeat of 041110) v2.4.1 security fix for Joomla 1.5.x

xmap 1.2.10[edit]

Malicious payload in zip 230211 developer resolution notice Clean version available from joomlacode

Frontend-User-Access 3.4.1[edit]

Frontend-User-Access 3.4.1 from http://www.pages-and-items.com LFI 030211 update to Frontend-User-Access 3.4.2

com properties 7134[edit]

http://com-property.com/ malicious files in script Dev update statement

B2 Portfolio[edit]

B2 portfolio 1.0 SQLi pulseextensions.com 250111

allcinevid[edit]

SQLI http://extensions.joomla.org/extensions/multimedia/multimedia-players/video-players-a-gallery/15367 220111 Developers resolution notice

People Component[edit]

People component http://www.ptt-solution.com/vmchk/people-component.html sqli 150111

Jimtawl[edit]

Jimtawl LFI 251110

Maian Media SILVER[edit]

Maian Media SQLi 151110 Developer states unproven in free edition, paid/SILVER version is being upgraded. dev article

alfurqan[edit]

alfurqan 1.5 sqli 151110 developer update statement

ccboard[edit]

ccboard XSS and SQLi 131110 on my site at [1] Please find the respective update information

ProDesk v 1.5[edit]

LFI 091110


sponsorwall[edit]

SQL injection pulseextensions.com 011110 developer resolution notice


Flip wall[edit]

SQL injection pulseextensions.com 011110 developer http://demo.pulseextensions.com/flip-wall.html update notice link title

Freestyle FAQ 1.5.6[edit]

http://freestyle-joomla.com/fssdownloads/viewcategory/2 Freestyle FAQ 1.5.6 ‎SQL Injection new version (1.9.0) is available which fixes the security issues.

iJoomla Magazine 3.0.1[edit]

iJoomla Magazine 3.0.1 RFI 090910

Clantools[edit]

http://www.joomla-clantools.de/downloads/doc_download/7-clantools-123.html clantool sqli 090910

jphone[edit]

jphone LFI 090910

PicSell[edit]

LFD, 777 020910 new version released 150312 version number 11

Zoom Portfolio[edit]

SID 020910

zina[edit]

SQL Injection 020910

Team's[edit]

Teams extension SQL Injection 120810

Amblog[edit]

Amblog SQLi 120810

[edit]

[edit]

wmtpic[edit]

www.webmaster-tips.net various 010710


Jomtube[edit]

http://www.jomtube.com/ SID 220710

Rapid Recipe[edit]

http://www.rapid-source.com Persistent XSS Vulnerability last known fix version 1.7.2 july 10,2010

Health & Fitness Stats[edit]

http://joomla-extensions.instantiate.co.uk/jcomponents/healthstats Persistent XSS Vulnerability july 10,2010


staticxt[edit]

http://extensions.joomla.org/extensions/edition/custom-code-in-content/2184 no version number provided


quickfaq[edit]

http://www.schlu.net sqli 090710

Minify4Joomla[edit]

http://waltercedric.com/ LFI and xss 090710 No longer available to download

IXXO Cart[edit]

http://www.php-shop-system.com/ SQLi LFI XSS Vulnerability developer resolution notice

PaymentsPlus[edit]

http://paymentsplus.com.au/ 2.1.5 Blind SQL Injection Vulnerability 090710 current version 2.20, 2.1.5 not listed on dev site

ArtForms[edit]

http://joomlacode.org/gf/project/jartforms/ ArtForms 2.1b7.2 RC2 Multiple Remote Vulnerabilities 090710 Old beta extension

autartimonial[edit]

autartica.be Sqli Vulnerability 060710



eventcal 1.6.4[edit]

http://joomlacode.org/gf/project/eventcal/frs/ SQL I last update 2006-12-31 on joomlacode 040710



date converter[edit]

http://sourceforge.net/projects/date-converter/ sqli 010710


real estate[edit]

http://www.opensourcetechnologies.com/demos/real-estate.html RFI 210610


cinema[edit]

SQL injection 190610

Jreservation[edit]

http://jforjoomla.com/ SQLi Vulnerability 190610

joomdocs[edit]

http://joomclan.com/index.php/JoomDocs/ xss vulnerability 190610

Live Chat[edit]

http://www.joompolitan.com/livechat.html Multiple Remote Vulnerabilities 190610

Turtushout 0.11[edit]

http://www.turtus.org.ua/files?func=fileinfo&id=13 SQL Injection (again) 190610

BF Survey Pro Free[edit]

BF Survey Pro Free SQL Injection Exploit 190610 Product marker as retired by the developer

MisterEstate[edit]

http://www.misterestate.com/ Blind SQL Injection Exploit 190610

RSMonials[edit]

http://www.rswebsols.com/downloads/category/14-download-rsmonials-all?download=23%3Adownload-rsmonials-component XSS Exploit 190610 Believed to be 1.5.1 version


Answers v2.3beta[edit]

Multiple Vulnerabilities http://extensions.joomla.org/extensions/communication/forum/12652 180610

Gallery XML 1.1[edit]

Multiple Vulnerabilities

http://extensions.joomla.org/extensions/photos-a-images/photo-gallery/12504

180610

JFaq 1.2[edit]

JFaq 1.2 Multiple Vulnerabilities 180610

Listbingo 1.3[edit]

Multiple Vulnerabilities

http://extensions.joomla.org/extensions/ads-a-affiliates/classified-ads/12062

180610

Alpha User Points[edit]

www.alphaplug.com LFI 180610

recruitmentmanager[edit]

http://recruitment.focusdev.co.uk Upload Vulnerability 130610

Info Line (MT_ILine)[edit]

http://extensions.joomla.org/extensions/news-display/news-tickers-a-scrollers/8425 reports of shell scripts in download file 120610


Ads manager Annonce[edit]

http://joomla.clubnautiquemarine.fr/

Upload Vulnerability

05/06/10

lead article[edit]

http://www.leadya.co.il/ SQLi 050610

djartgallery[edit]

http://www.design-joomla.eu Multiple Vul 05/06/10

Gallery 2 Bridge[edit]

g2bridge LFI vulnerability

jsjobs[edit]

jsjobs SQL Injection Vulnerability

[edit]

JE Poll[edit]

http://slideshow.joomlaextensions.co.in/ SQL Injection Vulnerability

MediQnA[edit]

MediQnA LFI vulnerability version : v1.1

JE Job[edit]

http://joomlaextensions.co.in/ LFI SQLi

[edit]

SectionEx[edit]

Stack Ideas section Ex LFI

ActiveHelper LiveHelp[edit]

XSS in LiveHelp 200510

JE Quotation Form[edit]

http://joomlaextensions.co.in/free-download/doc_download/11-je-quotation-form.html LFI developers statement of resolution note, now known as JE Quote Form

konsultasi[edit]

SQL Injection Vulnerability

Seber Cart[edit]

Local File Disclosure Vulnerability Developer Update 140510

Camp26 Visitor[edit]

RFI www.camp26.biz


JE Property[edit]

JE Property Finder Upload Vulnerability

Noticeboard[edit]

Noticeboard for Joomla "controller" Local File Inclusion Vulnerability

SmartSite[edit]

SmartSite com_smartsite Local File Inclusion Vulnerability

htmlcoderhelper graphics[edit]

htmlcoderhelper graphics v1.0.6 LFI Vulnerability

Ultimate Portfolio[edit]

Ultimate Portfolio Local File Inclusion Vulnerability

Archery Scores[edit]

Archery Scores (com_archeryscores) v1.0.6 LFI Vulnerability 210410

ZiMB Manager[edit]

Joomla Component ZiMB Manager Local File Inclusion Vulnerability 210410

Matamko[edit]

Matamko Local File Inclusion Vulnerability 210410

Multiple Root[edit]

Multiple Root Local File Inclusion Vulnerability http://joomlacomponent.inetlanka.com/

Multiple Map[edit]

Multiple Map Local File Inclusion Vulnerability joomlacomponent.inetlanka.com

Contact Us Draw Root Map[edit]

Draw Root Map Local File Inclusion Vulnerability joomlacomponent.inetlanka.com

iF surfALERT[edit]

iF surfALERT Local File Inclusion Vulnerability

GBU FACEBOOK[edit]

GBU FACEBOOK SQL injection vulnerability http://www.gbugrafici.nl/gbufacebook/

jnewspaper[edit]

jnewspaper (cid) SQL Injection Vulnerability



[edit]

MT Fire Eagle[edit]

LFI http://joomlacode.org/gf/project/jfireeagle/frs/ http://www.moto-treks.com 190410 product considered retired and to be replaced by dev

Sweetykeeper[edit]

Sweetykeeper Local File Inclusion Vulnerability http://www.joomlacorner.com/ 120410

jvehicles[edit]

SQL Injection http://jvehicles.com 120410

worldrates[edit]

http://dev.pucit.edu.pk/ 120410

cvmaker[edit]

http://dev.pucit.edu.pk/

advertising[edit]

http://dev.pucit.edu.pk/

horoscope[edit]

http://dev.pucit.edu.pk/ 120410

webtv[edit]

http://dev.pucit.edu.pk/ 120410

diary[edit]

http://dev.pucit.edu.pk/ 120410

Memory Book[edit]

http://dev.pucit.edu.pk/ 120410

JprojectMan[edit]

LFI http://extensions.joomla.org/extensions/communities-a-groupware/project-a-task-management/5676 110410

econtentsite[edit]

LFI 040410

Jvehicles[edit]

ID 040410

[edit]

gigcalender[edit]

SQLi gigcalender 13 march 2010

heza content[edit]

SQLi heza content 13 march 2010


SqlReport[edit]

Sqlreport has a sql/RFI exploit. awaiting confirmation on exact developer. Feb 20 Not Known

Yelp[edit]

SQLi - Unable to locate developer. Possibly a custom extension. Feb 01 Not Known

[edit]

<endFeed />

This list is change protected, for updates or additions Mandville or lafrance or PhilD

Codes used[edit]

SQLi - SQL injection wikipedia

LFI - Local File Inclusion scribd

RFI - Remote file inclusion wikipedia

DT - Directory Traversal wikipedia (incl 777 folders)

ID = Information Disclosure: account information or sensitive information publicly viewable, or passed to 3rd party without knowledge

Future Actions & WIP[edit]

RSS feed completed


to feed VEL direct to twitter

Notes[edit]

The RSS feed is currently fed by item entry order and not by date fixed. List as discussed in jtopic:455746 by PhilD editing by Mandville