RETIRED: Joomla Kunena 'id' Parameter SQL Injection Vulnerability
BID:52636
Info
RETIRED: Joomla Kunena 'id' Parameter SQL Injection Vulnerability
| Bugtraq ID: | 52636 |
| Class: | Input Validation Error |
| CVE: |
CVE-2012-4868 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 21 2012 12:00AM |
| Updated: | Oct 22 2012 11:40AM |
| Credit: | Cyber-Assassins |
| Vulnerable: |
Joomla Kunena 2.0 |
| Not Vulnerable: | |
Discussion
RETIRED: Joomla Kunena 'id' Parameter SQL Injection Vulnerability
Kunena is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Kunena 2.0 is vulnerable; other versions may also be affected.
Note: This BID is being retired; the issue can not be exploited as described.
Kunena is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Kunena 2.0 is vulnerable; other versions may also be affected.
Note: This BID is being retired; the issue can not be exploited as described.
Exploit / POC
Joomla Kunena 'id' Parameter SQL Injection Vulnerability
An attacker can exploit the issue using a browser.
The following example data is available:
http://www.example.com/[path]/news.php?id=[SQL HERE]
An attacker can exploit the issue using a browser.
The following example data is available:
http://www.example.com/[path]/news.php?id=[SQL HERE]
Solution / Fix
RETIRED: Joomla Kunena 'id' Parameter SQL Injection Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of any more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of any more recent information, please mail us at: [email protected].