Joomla! Projectfork Component "search" and "order" SQL Injection Vulnerabilities

SECUNIA ADVISORY ID:
SA55796

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/55796/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=55796

RELEASE DATE:
2013-11-28

DESCRIPTION:
Compass Security has reported two vulnerabilities in the Projectfork
component for Joomla!, which can be exploited by malicious people to
conduct SQL injection attacks.

Input passed via the "search" and "order" fields is not properly
sanitised before being used in a SQL query. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.

The vulnerabilities are reported in versions prior to 3.0.11.

SOLUTION:
Update to version 3.0.11.

PROVIDED AND/OR DISCOVERED BY:
Stefan Horlacher, Compass Security

ORIGINAL ADVISORY:
Projectfork:
http://projectfork.net/blog/13-releases/56-projectfork-3-security-update-released

CSNC-2012-015:
http://www.csnc.ch/misc/files/advisories/COMPASS-2012-015_Projectfork_SQL_Injection_Vulnerability.txt

RECENT ARTICLE

RECENT POST