Joomla Component SQL Injection Vulnerability

Ens4R

Prof Spys-z
Katılım
9 Eki 2012
Mesajlar
1,642
Tepkime puanı
1
Puanları
0
Web sitesi
ajanlar.org
Joomla! VirtueMart component <= 2.0.22a - SQL Injection
------------------------------------------------------------

== Description ==
- Software link: http://www.virtuemart.net/
- Affected versions: All versions between 2.0.8 and 2.0.22a are vulnerable.
- Vulnerability discovered by: Matias Fontanini

== Vulnerability ==
The vulnerability is located in the "user" controller, "removeAddressST"
task. The "virtuemart_userinfo_id" parameter is not properly sanitized
before being used in the "DELETE" query performed in it, allowing the
execution of arbitrary SQL queries.

In order to exploit the vulnerability, an attacker must be authenticated
as a customer in the application. However, since the system allows free
account registration, this is not a problem.

== Proof of concept ==
The following example URL uses the MySQL "sleep" function through the
injection:

http://example.com/index.php?option...uemart_userinfo_id=16" and sleep(10) and ""="

== Solution ==
Upgrade the product to the 2.0.22b version.

== Report timeline ==
[2013-08-15] Vulnerability reported to vendor.
[2013-08-16] Developers answered back.
[2013-08-22] VirtueMart 2.0.22b was released, which fixes the the
reported issue.
[2013-08-22] Public disclosure.
 

mersin escort bodrum escort fethiye escort alanya escort konya escort marmaris escort bodrum escort vozol puff sakarya escort sakarya escort sakarya escort sakarya escort sakarya escort sakarya escort sakarya escort sakarya escort sakarya escort ankara escort meritking giriş
Üst
Copyright® Ajanlar.org 2012