Joomla BookLibrary Component Four SQL Injection Vulnerabilities
9 Jul. 2010
Summary
A multiple vulnerabilities were discovered in the BookLibrary component for Joomla, which can be exploited by malicious people to conduct SQL injection attacks.
Vulnerable Systems:
* Joomla BookLibrary version 1.5.3 Basic
Immune Systems:
* Joomla BookLibrary version 1.5.3_2010_06_20.
The vulnerabilities are:
1) Input passed via the "bid[]" parameter to index.php (when "option" is set to "com_booklibrary" and "task" is set to "lend_request") is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
2) Input passed via the "bid[]" parameter to index.php (when "option" is set to "com_booklibrary" and "task" is set to "save_lend_request") is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation requires that "magic_quotes_gpc" is disabled.
3) Input passed via the "id" parameter to index.php (when "option" is set to "com_booklibrary" and "task" is set to "mdownload" or "downitsf") is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
4) Input passed via the "searchtext" parameter to index.php (when "option" is set to "com_booklibrary" and "task" is set to "search") is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation requires that "magic_quotes_gpc" is disabled.