Joomla! SermonSpeaker Component "id" SQL Injection Vulnerabilities

SECUNIA ADVISORY ID:
SA39385

VERIFY ADVISORY:
http://secunia.com/advisories/39385/

DESCRIPTION:
Some vulnerabilities have been reported in the SermonSpeaker
component for Joomla!, which can be exploited by malicious people to
conduct SQL injection attacks.

Input passed via the "id" parameter to index.php (when "option" is
set to "com_sermonspeaker" and "task" is set to e.g. "latest_sermons"
or "speakerpopup") is not properly sanitised before being used in SQL
queries. This can be exploited to manipulate SQL queries by injecting
arbitrary SQL code.

NOTE: Other parameters may also be affected.

The vulnerabilities are reported in versions prior to 3.2.1.

SOLUTION:
Update to version 3.2.1.

PROVIDED AND/OR DISCOVERED BY:
The vendor credits Samara Hart.

ORIGINAL ADVISORY:
http://joomlacode.org/gf/project/sermon_speaker/news/?action=NewsThreadView&id=2549

RECENT ARTICLE

RECENT POST