Vulnerable Memory Book! Component SQL Injection and LFI

Discussion regarding Joomla! 1.5 security issues.
Joomla! Vulnerable Extensions: http://feeds.joomla.org/JoomlaSecurityV ... Extensions

Moderator: General Support Moderators

Forum rules
Forum Rules
Absolute Beginner's Guide to Joomla! <-- please read before posting, this means YOU.
Security Checklist
Forum Post Assistant - If you are serious about wanting help, you will use this tool to help you post.
Locked
User avatar
fw116
Joomla! Ace
Joomla! Ace
Posts: 1373
Joined: Tue Sep 06, 2005 11:18 am
Location: Germany

Vulnerable Memory Book! Component SQL Injection and LFI

Post by fw116 » Mon Jan 04, 2010 3:01 pm

Description:
Some vulnerabilities have been reported in the Memory Book! component for Joomla!, which can be exploited by malicious users to conduct SQL injection attacks and potentially compromise a vulnerable system.

1) Input passed to the event description when adding a new event is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

Successful exploitation may require a valid user account.

2) The security issue is caused due to the application improperly validating uploaded files. This can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".jpg" file extension.

Successful exploitation may require a valid user account that Apache is not configured to handle the mime-type for uploadable media files.
Last edited by mandville on Mon Jan 04, 2010 8:47 pm, edited 1 time in total.
Reason: title naming convention

User avatar
lafrance
Joomla! Ace
Joomla! Ace
Posts: 1116
Joined: Thu Jan 11, 2007 5:02 pm
Location: Alberta,Canada
Contact:

Re: Memory Book! Component SQL Injection and File Upload Vulnera

Post by lafrance » Mon Jan 04, 2010 8:19 pm

fw116 wrote:Description:
Some vulnerabilities have been reported in the Memory Book! component for Joomla!, which can be exploited by malicious users to conduct SQL injection attacks and potentially compromise a vulnerable system.

1) Input passed to the event description when adding a new event is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

Successful exploitation may require a valid user account.

2) The security issue is caused due to the application improperly validating uploaded files. This can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".jpg" file extension.

Successful exploitation may require a valid user account that Apache is not configured to handle the mime-type for uploadable media files.
Thank you for the information.
Trying to replicate exploit so far cannot confirm it.
VEL contributor @ http://docs.joomla.org/Investigation_of_exploits
OSM,Trademark and Licensing Team,jed editor
Please no pm direct contact irc freenode.net #joomla

User avatar
fw116
Joomla! Ace
Joomla! Ace
Posts: 1373
Joined: Tue Sep 06, 2005 11:18 am
Location: Germany

Re: Memory Book! Component SQL Injection and File Upload Vulnera

Post by fw116 » Mon Jan 04, 2010 8:28 pm

you got a PM

User avatar
lafrance
Joomla! Ace
Joomla! Ace
Posts: 1116
Joined: Thu Jan 11, 2007 5:02 pm
Location: Alberta,Canada
Contact:

Re: Memory Book! Component SQL Injection and File Upload Vulnera

Post by lafrance » Mon Jan 04, 2010 8:36 pm

got it thank youu

was added on Dec 27 http://docs.joomla.org/Vulnerable_Extensions_List
VEL contributor @ http://docs.joomla.org/Investigation_of_exploits
OSM,Trademark and Licensing Team,jed editor
Please no pm direct contact irc freenode.net #joomla

User avatar
fw116
Joomla! Ace
Joomla! Ace
Posts: 1373
Joined: Tue Sep 06, 2005 11:18 am
Location: Germany

Re: Memory Book! Component SQL Injection and File Upload Vulnera

Post by fw116 » Mon Jan 04, 2010 8:41 pm

lafrance wrote:got it thank youu

was added on Dec 27 http://docs.joomla.org/Vulnerable_Extensions_List
ok,

do you have a update link ? so we can provide a solution ?

because it's still "unsolved" also on secunia...

User avatar
lafrance
Joomla! Ace
Joomla! Ace
Posts: 1116
Joined: Thu Jan 11, 2007 5:02 pm
Location: Alberta,Canada
Contact:

Re: Memory Book! Component SQL Injection and File Upload Vulnera

Post by lafrance » Mon Jan 04, 2010 8:58 pm

fw116 wrote:
lafrance wrote:got it thank youu

was added on Dec 27 http://docs.joomla.org/Vulnerable_Extensions_List
ok,

do you have a update link ? so we can provide a solution ?

because it's still "unsolved" also on secunia...
As far as I know there as been no fixes at this time.
we added this Multiple Vulnerabilities. requires: magic quotes OFF, user account

However contact with developer sometime is slow to response I still waiting for a major dev to reply about 1 security issues from Novemeber and he just disregard any emails attempts.

If were lucky they contact us or it update to jed then we update our list.

FYI lately the new exploit are spam and need to be taken with a grain of salt work on 1 for over one hour and none of the exploit work try others also the same try it on all version none work.

That one reason if you do not see it on VEL it spam report from exploit.db or as nothing to do with joomla even if they use joomla in the name.

Hope this help,thank you for Pm
VEL contributor @ http://docs.joomla.org/Investigation_of_exploits
OSM,Trademark and Licensing Team,jed editor
Please no pm direct contact irc freenode.net #joomla

jeffchannell
Joomla! Ace
Joomla! Ace
Posts: 1964
Joined: Tue Jun 09, 2009 2:21 am
Location: WV
Contact:

Re: Vulnerable Memory Book! Component SQL Injection and LFI

Post by jeffchannell » Wed Jan 06, 2010 3:42 am

lafrance: good luck contacting MemoryBook's dev...

-- jdc ;)
http://jeffchannell.com - Joomla Extensions & Support
http://biziant.com - Open Joomla Firewall/IDS
Unsolicited private messages/emails = hire me to fix your problem.
καλλιστι

User avatar
lafrance
Joomla! Ace
Joomla! Ace
Posts: 1116
Joined: Thu Jan 11, 2007 5:02 pm
Location: Alberta,Canada
Contact:

Re: Vulnerable Memory Book! Component SQL Injection and LFI

Post by lafrance » Wed Jan 06, 2010 3:54 am

jeffchannell wrote:lafrance: good luck contacting MemoryBook's dev...

-- jdc ;)
Hello !

Yes a same so many developer just disregard there extension exploit and worst refuse to removed Then and new users get exploited..
Same Same on them
VEL contributor @ http://docs.joomla.org/Investigation_of_exploits
OSM,Trademark and Licensing Team,jed editor
Please no pm direct contact irc freenode.net #joomla

jeffchannell
Joomla! Ace
Joomla! Ace
Posts: 1964
Joined: Tue Jun 09, 2009 2:21 am
Location: WV
Contact:

Re: Vulnerable Memory Book! Component SQL Injection and LFI

Post by jeffchannell » Wed Jan 06, 2010 4:00 am

Well I know I couldn't find it...
http://jeffchannell.com - Joomla Extensions & Support
http://biziant.com - Open Joomla Firewall/IDS
Unsolicited private messages/emails = hire me to fix your problem.
καλλιστι

User avatar
lafrance
Joomla! Ace
Joomla! Ace
Posts: 1116
Joined: Thu Jan 11, 2007 5:02 pm
Location: Alberta,Canada
Contact:

Re: Vulnerable Memory Book! Component SQL Injection and LFI

Post by lafrance » Wed Jan 06, 2010 4:09 am

jeffchannell wrote:Well I know I couldn't find it...
Just maybe if you stop slapping yourself you could find it :pop
VEL contributor @ http://docs.joomla.org/Investigation_of_exploits
OSM,Trademark and Licensing Team,jed editor
Please no pm direct contact irc freenode.net #joomla


Locked

Return to “Security in Joomla! 1.5”