Jooma Huge-IT Video Gallery "galleryid" SQL Injection Vulnerability Fixed by 1.1.0


Description   (:An SQL injection vulnerability has been identified in Huge-IT Video Gallery, a plugin for Joomla.:A remote attacker could exploit it by using URLs that include specially crafted SQL statements in order to access entries in some database tables.::The vulnerability is due to an improper validation of user-supplied input used in SQL queries in the "galleryid" parameter in the "ajax_url.php" page.::A proof of concept is available.)
     
Vulnerable Products   Vulnerable Software:
Joomla (OSM Development Team) -
     
Solution   Version 1.1.0 of Huge-IT Video Gallery plugin fixes this vulnerability.
     
CVE   CVE-2016-1000123
     
References   - VapidLabs : Unauthenticated SQL Injection in Huge-IT Video Gallery v1.0.9 for Joomla
http://www.vapidlabs.com/advisory.php?v=169
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
SQL injection Prevention - POST : suspicious UPDATE statement in data
5.0.0
SQL injection Prevention - POST : suspicious SELECT statement in data
5.0.0
SQL injection Prevention - POST : suspicious DECLARE statement in data
5.0.0
SQL injection Prevention - POST : suspicious OPENROWSET statement in data
5.0.0
SQL injection Prevention - POST : suspicious OPENQUERY statement in data
5.0.0
SQL injection Prevention - POST : suspicious CAST statement in data
5.0.0
SQL injection Prevention - POST : suspicious EXEC statement in data
5.0.0
SQL injection Prevention - POST : suspicious CREATE statement in data
5.0.0
SQL injection Prevention - POST : suspicious INSERT statement in data
5.0.0
SQL injection Prevention - POST : suspicious DROP statement in data
5.0.0
SQL injection Prevention - POST : suspicious HAVING statement in data
5.0.0
SQL injection Prevention - POST : suspicious UNION statement in data
5.0.0
SQL injection Prevention - POST : suspicious OR statement in data
5.0.0
SQL injection Prevention - POST : possible version probing in data
5.0.0
     


 
 
 
 
 Risk level 
Low 

 Vulnerability First Public Report Date 
2016-09-21 

 Target Type 
Server 

 Possible exploit 
Remote