{"id": "SECURITYVULNS:DOC:28372", "bulletinFamily": "software", "title": "Joomla com_photo - SQL Injection Vulnerability", "description": "\r\n\r\nTitle:\r\n======\r\nJoomla com_photo - SQL Injection Vulnerability\r\n\r\n\r\nDate:\r\n=====\r\n2012-07-10\r\n\r\n\r\nReferences:\r\n===========\r\nhttp://www.vulnerability-lab.com/get_content.php?id=654\r\n\r\n\r\nVL-ID:\r\n=====\r\n641\r\n\r\n\r\nCommon Vulnerability Scoring System:\r\n====================================\r\n8\r\n\r\n\r\nIntroduction:\r\n=============\r\nJoomla is a free and open source content management system (CMS) for publishing content on the World\r\nWide Web and intranets and a model\u2013view\u2013controller (MVC) Web application framework that can also be\r\nused independently.\r\n\r\nJoomla is written in PHP, uses object-oriented programming (OOP) techniques and software design\r\npatterns, stores data in a MySQL database, and includes features such as page caching,\r\nRSS feeds, printable versions of pages, news flashes, blogs, polls, search, and support for language\r\ninternationalization.\r\n\r\nJoomla had been downloaded 23 million times. Between March 2007 and February 2011 there had been\r\nmore than 21 million downloads. As of November 2011, there are over 8,600 free and commercial\r\nextensions available from the official Joomla! Extension Directory and more available from other sources.\r\n\r\n(Copy of the Vendor Homepage: http://en.wikipedia.org/wiki/Joomla)\r\n\r\n\r\nAbstract:\r\n=========\r\nA Vulnerability-Lab researcher discovered a SQL injection vulnerability in the com_photo module of the joomla CMS.\r\n\r\n\r\nReport-Timeline:\r\n================\r\n2012-07-10:\tPublic or Non-Public Disclosure\r\n\r\n\r\nStatus:\r\n========\r\nPublished\r\n\r\n\r\nExploitation-Technique:\r\n=======================\r\nRemote\r\n\r\n\r\nSeverity:\r\n=========\r\nCritical\r\n\r\n\r\nDetails:\r\n========\r\nA SQL Injection vulnerability is detected in the com_photo module of the joomla Content Management System.\r\nRemote attackers & low privileged user accounts can execute/inject own sql commands to compromise the application dbms.\r\nThe vulnerability is located in the com_photo module with the bound vulnerable AlbumId & key parameters. \r\nSuccessful exploitation of the vulnerability result in dbms (Server) or application (Web) compromise.\r\n\r\nVulnerable Module(s):\r\n\t\t\t\t[+] index.php?option=com_photo\r\n\r\nVulnerable Parameter(s):\t\t\r\n\t\t\t\t[+] AlbumId\r\n\t\t\t\t[+] key\r\n\r\n\r\nProof of Concept:\r\n=================\r\nThe SQL Injection vulnerabilities can be exploited by remote attackers without privileged user account or \r\nrequired user inter action. For demonstration or reproduce ...\r\n\r\nPath:\t\t/\r\nFile:\t\tindex.php\r\nParameter1:\t?AlbumId=[SQL Injection]\r\nParameter2:\t?key=[SQL Injection]\r\n\r\n\r\nReference(s):\r\nhttp://www.xxx.com.np/index.php?option=com_photo&task=gallery&AlbumId=8[SQL Injection]\r\nhttp://www.xxx.com/index.php?option=com_photo&action=slideview&key=16[SQL Injection]\r\n\r\n\r\nRisk:\r\n=====\r\nThe security risk of the SQL injection vulnerability is estimated as critical.\r\n\r\n\r\nCredits:\r\n========\r\nVulnerability Research Laboratory - Chokri Ben Achor (meister@vulnerability-lab.com)\r\n\r\n\r\nDisclaimer:\r\n===========\r\nThe information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, \r\neither expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-\r\nLab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business \r\nprofits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some \r\nstates do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation \r\nmay not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases \r\nor trade with fraud/stolen material.\r\n\r\nDomains: www.vulnerability-lab.com \t- www.vuln-lab.com\t\t\t - www.vulnerability-lab.com/register\r\nContact: admin@vulnerability-lab.com \t- support@vulnerability-lab.com \t - research@vulnerability-lab.com\r\nSection: video.vulnerability-lab.com \t- forum.vulnerability-lab.com \t\t - news.vulnerability-lab.com\r\nSocial:\t twitter.com/#!/vuln_lab \t\t- facebook.com/VulnerabilityLab \t - youtube.com/user/vulnerability0lab\r\nFeeds:\t vulnerability-lab.com/rss/rss.php\t- vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php\r\n\r\nAny modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. \r\nPermission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other \r\nmedia, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, sourcecode, videos and \r\nother information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), \r\nmodify, use or edit our material contact (admin@vulnerability-lab.com or support@vulnerability-lab.com) to get a permission.\r\n\r\n \t\t\t\t \tCopyright \u00a9 2012 | Vulnerability Laboratory\r\n\r\n\r\n\r\n-- VULNERABILITY RESEARCH LABORATORY LABORATORY RESEARCH TEAM CONTACT: research@vulnerability-lab.com\r\n", "published": "2012-08-13T00:00:00", "modified": "2012-08-13T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:28372", "reporter": "Securityvulns", "references": [], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:10:45", "edition": 1, "viewCount": 19, "enchantments": {"score": {"value": 0.6, "vector": "NONE"}, "dependencies": {"references": [{"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:12511"]}], "rev": 4}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.6}, "affectedSoftware": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645540734, "score": 1659803227}, "_internal": {"score_hash": "9bbbc12ff7ea70966073872c16056a64"}}