Joomla JooDatabase SQL Injection

2012-04-26T00:00:00
ID PACKETSTORM:112231
Type packetstorm
Reporter HauntIT
Modified 2012-04-26T00:00:00

Description

                                        
                                            `[ TITLE ....... ][ JooDatabase (Joomla component) SQL Injection  
[ DATE ........ ][ 04.04.2012  
[ AUTOHR ...... ][ http://hauntit.blogspot.com  
[ SOFT LINK ... ][ http://  
[ VERSION ..... ][   
[ TESTED ON ... ][ LAMP  
[ ----------------------------------------------------------------------- [  
  
[ 1. What is this?  
[ 2. What is the type of vulnerability?  
[ 3. Where is bug :)  
[ 4. More...  
  
[--------------------------------------------[  
[ 1. What is this?  
This is very nice extension for Joomla, You should try it! ;)  
  
[--------------------------------------------[  
[ 2. What is the type of vulnerability?  
This is sql injection for authenticated user (for now;) tests in progress...)  
  
[--------------------------------------------[  
[ 3. Where is bug :)  
  
"You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to   
use near '(...)' at line 1 SQL=SELECT * FROM qcd3p_joodb AS c WHERE name LIKE '(...)' OR id='(...)' ORDER BY (...) LIMIT 0, (...)"  
  
$orderby and many more parameters are vulnerable to sql injection attacks.  
  
  
[--------------------------------------------[  
[ 4. More...  
  
- http://hauntit.blogspot.com  
- http://www.google.com  
- http://portswigger.net  
[  
[--------------------------------------------[  
[ All questions about new projects @ mail now :)  
]  
[ Best regards  
[   
  
`