Archive

Archive for March, 2008

Joomla Alberghi Component “id” SQL Injection

March 21st, 2008
Comments Off

Application: Joomla Alberghi Component
Affected Version: 2.1.3 SR and other version.
Vendor’s URL: Joomla Alberghi Component
Bug Type: SQL Injection
Risk Level: Critical

Solution:
Edit the source code to ensure that input is properly sanitized.

Content Management, SQL Injection

Joomla Joovideo Component “id” SQL Injection

March 21st, 2008
Comments Off

Application: Joomla Joovideo Component
Affected Version: 1.2.2 PRO and other versions.
Vendor’s URL: Joomla Joovideo Component
Bug Type: SQL Injection
Risk Level: Critical

Solution:
Edit the source code to ensure that input is properly sanitized.

Content Management, SQL Injection

Gallarific Multiple Vulnerabilities

March 21st, 2008
Comments Off

Application: Gallarific
Affected Version: Gallarific Free Edition 1.1 and other versions.
Vendor’s URL: http://www.gallarific.com/
Bug Type: Cross Site Scripting and Security Bypass
Risk Level: Critical

Solution:
Use another product, or disable it until the patch is released.

Access Bypass, Cross Site Scripting, Image Galleries

Joomla Restaurante Component “id” SQL Injection

March 21st, 2008
Comments Off

Application: Joomla Restaurante Component
Affected Version: 1.0 and other versions.
Vendor’s URL: Joomla Restaurante Component
Bug Type: SQL Injection
Risk Level: Critical

Solution:
Edit the source code to ensure that input is properly sanitized.

Content Management, SQL Injection

PHPauction GPL File Inclusion

March 20th, 2008
Comments Off

Application: PHPauction GPL
Affected Version: 2.51 and other versions.
Vendor’s URL: PHPauction GPL
Bug Type: File Inclusion
Risk Level: Critical

Solution:
Edit the source code to ensure that input is properly verified.

Applications, File Inclusion

Joomla Acajoom PRO Component SQL Injection

March 20th, 2008
Comments Off

Application: Joomla Acajoom PRO Component
Affected Version: 1.2.5 and 1.1.5 and other versions.
Vendor’s URL: Joomla Acajoom PRO Component
Bug Type: SQL injection
Risk Level: Critical

Solution:
Edit the source code to ensure that input is properly sanitized.

Content Management, SQL Injection

phpBP “id” SQL Injection

March 20th, 2008
Comments Off

Application: phpBP
Affected Version: 2 RC3 (2.204) FIX4 and other versions.
Vendor’s URL: phpBP
Bug Type: SQL Injection
Risk Level: Critical

Solution:
Apply fix: phpBP 2 RC3 2.204 FIX5.

Discussion Boards, SQL Injection

fuzzylime File Inclusion

March 20th, 2008
Comments Off

Application: fuzzylime
Affected Version: 3.01 and other versions.
Vendor’s URL: fuzzylime
Bug Type: File inclusion
Risk Level: Critical

Solution:
Edit the source code to ensure that input is properly verified.

Content Management, File Inclusion

XOOPS Tutorials Module “tid” SQL Injection

March 20th, 2008
Comments Off

Application: XOOPS Tutorials Module
Affected Version: 2.1b and other versions.
Vendor’s URL: XOOPS Tutorials Module
Bug Type: SQL Injection
Risk Level: Critical

Solution:
Edit the source code to ensure that input is properly sanitized.

Content Management, SQL Injection

Fully Modded phpBB “k” SQL Injection

March 20th, 2008
Comments Off

Application: Fully Modded phpBB
Affected Version: 80220 and other versions.
Vendor’s URL: Fully Modded phpBB
Bug Type: SQL Injection
Risk Level: Critical

Solution:
Edit the source code to ensure that input is properly sanitized.

Discussion Boards, SQL Injection

EasyCalendar SQL Injection and XSS

March 20th, 2008
Comments Off

Application: EasyCalendar
Affected Version: 4.0tr and other versions.
Vendor’s URL: EasyCalendar
Bug Type: SQL Injection and Cross Site Scripting
Risk Level: Critical

Solution:
Edit the source code to ensure that input is properly sanitized.

Applications, Cross Site Scripting, SQL Injection

PHP-Nuke Hadith Module “cat” SQL Injection

March 20th, 2008
Comments Off

Application: PHP-Nuke Hadith Module
Affected Version:
Vendor’s URL: PHP-Nuke Hadith Module
Bug Type: SQL Injection
Risk Level: Critical

Solution:
Edit the source code to ensure that input is properly sanitized.

Content Management, SQL Injection

Joomla! eWriting Component “cat” SQL Injection

March 20th, 2008
Comments Off

Application: Joomla! eWriting Component
Affected Version: 1.2.1 and other versions.
Vendor’s URL: Joomla! eWriting Component
Bug Type: SQL Injection
Risk Level: Critical

Solution:
Edit the source code to ensure that input is properly sanitized.

Content Management, SQL Injection

PHP-Nuke Kütüb-i Sitte Module “kid” SQL Injection

March 20th, 2008
Comments Off

Application: PHP-Nuke Kütüb-i Sitte Module
Affected Version: 1.1 and other versions.
Vendor’s URL: PHP-Nuke Kütüb-i Sitte Module
Bug Type: SQL Injection
Risk Level: Critical

Solution:
Edit the source code to ensure that input is properly sanitized.

Content Management, SQL Injection

XOOPS Prayer List Module “cid” SQL Injection

March 20th, 2008
Comments Off

Application: XOOPS Prayer List Module
Affected Version: 1.04 and other versions.
Vendor’s URL: XOOPS Prayer List Module
Bug Type: SQL Injection
Risk Level: Critical

Solution:
Edit the source code to ensure that input is properly sanitized.

Content Management, SQL Injection

XOOPS Tiny Event Module “id” SQL Injection

March 20th, 2008
Comments Off

Application: XOOPS Tiny Event Module
Affected Version: 1.01.
Vendor’s URL: XOOPS Tiny Event Module
Bug Type: SQL Injection
Risk Level: Critical

Solution:
Edit the source code to ensure that input is properly sanitized.

Content Management, SQL Injection

TikiWiki Script Insertion Vulnerability

March 20th, 2008
Comments Off

Application: Tikiwiki
Affected Version: prior to 1.9.10.1.
Vendor’s URL: http://tikiwiki.org/
Bug Type: Cross Site Scripting
Risk Level: Medium

Solution:
Update to version 1.9.10.1.

Content Management, Cross Site Scripting

Joomla! Gary’s Cookbook Component SQL Injection

March 20th, 2008

Application: Joomla! Gary’s Cookbook Component
Affected Version: 2.4.0 and other versions.
Vendor’s URL: Joomla! Gary’s Cookbook Component
Bug Type: SQL injection
Risk Level: Critical

Solution:
Edit the source code to ensure that input is properly sanitized.

Content Management, SQL Injection

Joomla! File Inclusion

March 20th, 2008
Comments Off

Application: Joomla!
Affected Version: Joomla! 1.0.x in versions 1.0.14 and 1.0.13 and prior versions.
Vendor’s URL: http://www.joomla.org/
Bug Type: File inclusion
Risk Level: Critical

Solution:
Update to version 1.0.15.

Content Management, File Inclusion

Xoops XM-Memberstats Module SQL Injection

March 20th, 2008
Comments Off

Application: Xoops XM-Memberstats Module
Affected Version: 2.0e and other versions.
Vendor’s URL: http://www.xoopsmalaysia.org
Bug Type: SQL Injection
Risk Level: Critical

Solution:
Edit the source code to ensure that input is properly sanitized.

Content Management, SQL Injection