Joomla FireBoard component (com_fireboard) SQL injection and repair

Source: Internet
Author: User

Title: Joomla com_fireboard-SQL Injection Vulnerability
 
Affected Version 7.3
 
Program Introduction
Joomla is a free and open source content management system (CMS) for publishing content on the World
Wide Web and intranets and a model-view-controller (MVC) Web application framework that can also be
Used independently.
 
Joomla is written in PHP, uses object-oriented programming (OOP) techniques and software design
Patterns, stores data in a MySQL database, and schemdes features such as page caching,
RSS feeds, printable versions of pages, news flashes, blogs, polls, search, and support for language
Internationalization.
 
(For details, see the official homepage: http://en.wikipedia.org/wiki/Joomla)
 
 
Risks:
==========
The maid (sec-lab.ir) discovered a SQL Injection Vulnerability in
The com_fireboard module of the joomla CMS.
 
Summary:
==========
A SQL Injection vulnerability is detected in the com_fireboard module of the joomla Content Management System.
Remote attackers & low privileged user accounts can execute/inject own SQL commands to compromise the application dbms.
The vulnerability is located in the com_fireboard module with the bound vulnerable func fb _ parameter.
Successful exploitation of the vulnerability result in dbms (Server) or application (Web) compromise.
 
Vulnerable Module (s ):
[+] Index. php? Option = com_fireboard
 
Vulnerable Parameter (s ):
[+] Func fb _
 
 
Test proof:
========================
The SQL injection vulnerability can be exploited by remote attackers without user inter action & with low
Privileged user account. For demonstration or reproduce...
 
Dork (s ):
Inurl: "id =" & intext: "/com_fireboard /"
 
PoC:
A http://www.bkjia.com/index. php? Option = com_fireboard & Itemid = 0 & id = 1 & catid = 0 & func = fb_pdf '[SQL-INJECTION]
 
Reference (s ):
Xxx.com/index.php? Option = com_fireboard & Itemid = 0 & id = 1 & catid = 5 & func = fb_pdf '[SQL-INJECTION]
Xxx.com/2012/index.php? Option = com_fireboard & Itemid = 79 & id = 1 & catid = 2 & func = fb_pdf '[SQL-INJECTION]
Xxx.com/fireboard/index.php? Option = com_fireboard & Itemid = 38 & id = 22111 & catid = 16 & func = fb_pdf '[SQL-INJECTION]
Xxx.com/board/index.php? Option = com_fireboard & Itemid = 54 & id = 70122 & catid = 12 & func = fb_pdf '[SQL-INJECTION]
Xxx.com/jmfireboard/index.php? Option = com_fireboard & Itemid = 54 & id = 70122 & catid = 12 & func = fb_pdf '[SQL-INJECTION]
 
 
--
VULNERABILITY RESEARCH LABORATORY
LABORATORY RESEARCH TEAM
CONTACT: research@vulnerability-lab.com

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.