__________________________________________________________

                       The U.S. Department of Energy
                   Computer Incident Advisory Capability
                           ___  __ __    _     ___
                          /       |     /_\   /
                          \___  __|__  /   \  \___
             __________________________________________________________

                             INFORMATION BULLETIN

                          Joomla! PHP Vulnerabilities
                             [Security Focus 27503]

January 30, 2008 21:00 GMT                                        Number S-146
______________________________________________________________________________
PROBLEM:       There are numerous php vulnerabilities in Joomla!. The 
               following components are prone to SQL-injection 
               vulnerabilities: 
			   1) 'com_mamml'; 
			   2) com_fq Component 
               'index.php'; 
			   3) 'com_glossary'; 
			   4) Mambo Newsletter; 
               5) 'com_musepose' Component 'aid' Parameter; and 
			   6) 'com_buslicense' Component 'aid' Parameter. 
			   
PLATFORM:      Joomla com_mamml component 0 
               Joomla com_fq component 0 
               Mambo Glossary 2
			   Mambo Mambo Open Source 4.5 (1.0.3beta)
   			   Mambo Mambo Open Source 4.5 (1.0.3)
			   Mambo Mambo Open Source 4.5 (1.0.2)
			   Mambo Mambo Open Source 4.5 (1.0.1)
			   Mambo Mambo Open Source 4.5 (1.0.0)
			   Mambo and Joomla com_musepose component 0 
			   Mambo and Joomla com_buslicense component 0 
			   
DAMAGE:        Could allow an attacker to compromise the application, access 
               or modify data, or exploit latent vulnerabilities in the 
               underlying database. 
SOLUTION:      Upgrade to the appropriate version. 
______________________________________________________________________________
VULNERABILITY  The risk is MEDIUM. Exploiting this issue could allow an 
ASSESSMENT:    attacker to compromise the application, access or modify data, 
               or exploit latent vulnerabilities int he underlying database. 
______________________________________________________________________________
LINKS: 
 CIAC BULLETIN:      http://www.ciac.org/ciac/bulletins/s-146.shtml 
 ORIGINAL BULLETIN:  http://www.securityfocus.com/bid/27503/discuss 
 ADDITIONAL LINKS:   http://www.securityfocus.com/bid/27501/discuss 
                     http://www.securityfocus.com/bid/27505/discuss 
					 http://www.securityfocus.com/bid/27502/discuss 
					 http://www.securityfocus.com/bid/27507/discuss 
					 http://www.securityfocus.com/bid/27508/discuss 
______________________________________________________________________________
[***** Start Security Focus 27503 *****]

Joomla! com_mamml Component 'index.php' SQL Injection Vulnerability

The Joomla! 'com_mamml' component is prone to an SQL-injection vulnerability 
because it fails to sufficiently sanitize user-supplied data before using it in 
an SQL query.

Exploiting this issue could allow an attacker to compromise the application, 
access or modify data, or exploit latent vulnerabilities in the underlying 
database. 

Bugtraq ID:  27503  
Class:  Input Validation Error  
CVE:   
Remote:  Yes  
Local:  No  
Published:  Jan 29 2008 12:00AM  
Updated:  Jan 30 2008 02:57PM  
Credit:  S@BUN is credited with the discovery of this vulnerability.  
Vulnerable:  Joomla com_mamml component 0
 



[***** End Security Focus 27503 *****]
_______________________________________________________________________________

CIAC wishes to acknowledge the contributions of Security Focus for the 
information contained in this bulletin.
_______________________________________________________________________________


CIAC, the Computer Incident Advisory Capability, is the computer
security incident response team for the U.S. Department of Energy
(DOE) and the emergency backup response team for the National
Institutes of Health (NIH). CIAC is located at the Lawrence Livermore
National Laboratory in Livermore, California. CIAC is also a founding
member of FIRST, the Forum of Incident Response and Security Teams, a
global organization established to foster cooperation and coordination
among computer security teams worldwide.

CIAC services are available to DOE, DOE contractors, and the NIH. CIAC
can be contacted at:
    Voice:    +1 925-422-8193 (7x24)
    FAX:      +1 925-423-8002
    STU-III:  +1 925-423-2604
    E-mail:   ciac@ciac.org

Previous CIAC notices, anti-virus software, and other information are
available from the CIAC Computer Security Archive.

   World Wide Web:      http://www.ciac.org/
   Anonymous FTP:       ftp.ciac.org

PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing
communities receive CIAC bulletins.  If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum of
Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained via WWW at http://www.first.org/.

This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, express or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, apparatus, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark, manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government or the University of California, and shall not be used for
advertising or product endorsement purposes.

LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC)

S-136: International Components for Unicode Library (libicu) Vulnerabilities
S-137: yarssr vulnerability
S-138: CandyPress Vulnerabilities
S-139: Persits Software XUpload 'AddFile()' Method ActiveX Control Vulnerability
S-140: Namo Web Editor "NamoInstaller.dll' ActiveX Control Vulnerability
S-141: Horde3 Vulnerabilities
S-142: scponly Vulnerability
S-143: Cisco Wireless Control System Tomcat mod_jk.so Vulnerability
S-144: Cisco PIX and ASA Time-to-Live Vulnerability
S-145: MySQL-dfsg-5.0 Vulnerabilities