what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

JoomlaBSQ.txt

JoomlaBSQ.txt
Posted Oct 4, 2006
Site secunia.com

Secunia Research 29/09/2006: Joomla BSQ Sitestats Component Multiple Vulnerabilities

tags | advisory, vulnerability
SHA-256 | 4a10945e4b4e9c7ffb405280f105d7ebec08db3cf1d6ddfb45bebb717ef31faa

JoomlaBSQ.txt

Change Mirror Download
====================================================================== 

Secunia Research 29/09/2006

- Joomla BSQ Sitestats Component Multiple Vulnerabilities -

======================================================================
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Vendor's Description of Software.....................................3
Description of Vulnerability.........................................4
Solution.............................................................5
Time Table...........................................................6
Credits..............................................................7
References...........................................................8
About Secunia........................................................9
Verification........................................................10

======================================================================
1) Affected Software

BSQ Sitestats (component for Joomla) 1.x

NOTE: Other versions may also be affected.

======================================================================
2) Severity

Rating: Highly critical
Impact: System access
Manipulation of data
Cross Site Scripting
Where: From remote

======================================================================
3) Vendor's Description of Software

"BSQ Sitestats is a site stats module that is lightweight on the front
end but offers both tabular and graphical summaries of site visitors'
sessions on the backend".

Product Link:
http://developer.joomla.org/sf/projects/bsq_sitestats


======================================================================
4) Description of Vulnerability

Secunia Research has discovered some vulnerabilities in the BSQ
Sitestats component for Joomla, which can be exploited by malicious
people to conduct cross-site scripting and SQL injection attacks, and
to compromise a vulnerable system.

1) Input passed to the "ip" form field parameter when performing an IP
Address Lookup is not properly sanitised before being returned to the
user. This can be exploited to execute arbitrary HTML and script code
in a logged in administrator's browser session in context of an
affected site.

2) Input passed to multiple parameters when importing the
ip-to-country.csv file is not properly sanitised before being used in a
SQL query. This can be exploited to manipulate SQL queries by injecting
arbitrary SQL code when an administrator is tricked into importing a
malicious ip-to-country.csv file.

3) Input passed via the "HTTP Referer", the "HTTP User Agent", and the
"HTTP Accept Language" Header bsqtemplateinc.php is not properly
sanitised before being used in SQL queries. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.

Successful exploitation requires that "magic_quotes_gpc" is disabled.

4) Input passed to the "baseDir" parameter in
components/com_bsq_sitestats/external/rssfeeds.php is not properly
verified before being used to include files. This can be exploited to
execute arbitrary PHP code by including files from local or external
resources.

Successful exploitation requires that "register_globals" is enabled.

The vulnerabilities have been confirmed in version 1.8.0. Other
versions may also be affected.

======================================================================
5) Solution

The vulnerabilities have been fixed in version 2.2.1.

======================================================================
6) Time Table

14/09/2006 - Vendor notified.
14/09/2006 - Vendor response.
17/09/2006 - Vendor releases fixed version 2.2.1.
29/09/2006 - Public disclosure.

======================================================================
7) Credits

Discovered by Sven Krewitt, Secunia Research.

======================================================================
8) References

None assigned.

======================================================================
9) About Secunia

Secunia offers vulnerability management solutions to corporate
customers with verified and reliable vulnerability intelligence
relevant to their specific system configuration:

http://corporate.secunia.com/

Secunia also provides a publicly accessible and comprehensive advisory
database as a service to the security community and private
individuals, who are interested in or concerned about IT-security.

http://secunia.com/

Secunia believes that it is important to support the community and to
do active vulnerability research in order to aid improving the
security and reliability of software in general:

http://corporate.secunia.com/secunia_research/33/

Secunia regularly hires new skilled team members. Check the URL below to
see currently vacant positions:

http://secunia.com/secunia_vacancies/

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/secunia_security_advisories/

======================================================================
10) Verification

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2006-63/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================



Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close