Joomla Third-Party Plugins Multiple Vulnerabilities
Description
(#Several vulnerabilities have been identified in third-party plugins for Joomla:#- Jotloader: full path disclosure#- Threate : SQL injection#- Topics: SQL injection#- J-Business Directory: SQL injection#- Branch: SQL injection#- XMap: SQL injection#- Services: SQL injection#- Forms: SQL Injection#- Jomres: SQL injection#- JB People: SQL injection#- Guru: SQL injection#- JCal Pro: cross-site scripting##Proofs of concept are available.)
Vulnerable Products
Vulnerable Software:
Joomla (OSM Development Team) -
Solution
No solution for the moment.
CVE
References
- 0day : Joomla com_threate 1.1.4 SQL injection Vulnerability
http://0day.today/exploit/25658
- 0day : Joomla com_topics SQL Injection Vulnerability
http://0day.today/exploit/25654
- cxsecurity : Joomla Forms 1.3.1 SQL Injection
https://cxsecurity.com/issue/WLB-2016070075
- cxsecurity : Joomla jomres SQL injection Vulnerability
https://cxsecurity.com/issue/WLB-2016070102
- exploit-db : Joomla Guru Pro Component SQL Injection
https://www.exploit-db.com/exploits/40111/
- cxsecurity : Joomla com_jotloader Full Path Disclosure Vulnerability
https://cxsecurity.com/issue/WLB-2016070006
- cxsecurity : Joomla Component com_jcalpro XSS
https://cxsecurity.com/issue/WLB-2016070131
- cxsecurity : Joomla com_jbusinessdirectory SQL injection
https://cxsecurity.com/issue/WLB-2016070088
- cxsecurity : Joomla Services SQL Injection
https://cxsecurity.com/issue/WLB-2016070078
- cxsecurity : Joomla XMap 2.3.4 SQL Injection
https://cxsecurity.com/issue/WLB-2016070079
- cxsecurity : Joomla Branch 3.0 SQL Injection
https://cxsecurity.com/issue/WLB-2016070082
- 0day : Joomla com_jbpeople SQL injection Vulnerability
http://0day.today/exploit/25700
Vulnerability Manager Detection
No
IPS Protection
ASQ Engine alarm
Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'meta' tag found in URL
3.2.0
SQL injection Prevention - GET : suspicious OR statement in URL
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
SQL injection Prevention - GET : suspicious combination of 'OR' or 'AND' statements in URL
3.2.0
SQL injection Prevention - GET : suspicious CREATE statement in URL
3.2.0
SQL injection Prevention - GET : suspicious CAST statement in URL
3.2.0
SQL injection Prevention - GET : suspicious OPENROWSET statement in URL
3.2.0
SQL injection Prevention - GET : suspicious DECLARE statement in URL
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - GET : suspicious 'img' tag found in URL
3.2.0
SQL injection Prevention - GET : suspicious OPENQUERY statement in URL
3.2.0
SQL injection Prevention - GET : suspicious shutdown statement in URL
3.2.0
SQL injection Prevention - GET : suspicious UNION SELECT statement in URL
3.2.0
SQL injection Prevention - GET : possible database version probing
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
SQL injection Prevention - GET : suspicious UPDATE SET statement in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
SQL injection Prevention - GET : suspicious SELECT statement in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
SQL injection Prevention - GET : suspicious INSERT statement in URL
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
SQL injection Prevention - GET : suspicious DROP statement in URL
3.2.0
SQL injection Prevention - GET : suspicious EXEC statement in URL
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
SQL injection Prevention - GET : block comment delimiters in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
SQL injection Prevention - GET : suspicious combination of 'select' and 'sleep' statements in URL
5.0.0
SQL injection Prevention - GET : Evasion attempt with CAST and EXEC statements
5.0.0
CMS plugin - Full Path Disclosure Vulnerability
5.0.0
SQL injection Prevention - GET : Authentication bypass attempt with OR statement
5.0.0
Risk level
Moderate
Vulnerability First Public Report Date
2016-07-14
Target Type
Server
Possible exploit
Remote