03 Sep 2012
10 Sep 2012
iCagenda 1.x (Component for Joomla!)
Manipulation of data
This includes vulnerabilities where a user or a remote attacker can manipulate local data on a system, but not necessarily be able to gain escalated privileges or system access.
The most frequent type of vulnerabilities with this impact are SQL-injection vulnerabilities, where a malicious user or person can manipulate SQL queries.
A vulnerability has been discovered in the iCagenda component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks.
Input passed via the "id" parameter to index.php (when "option" is set to "com_icagenda", "view" is set to "list", and "layout" is set to "event") is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The vulnerability is confirmed in version 1.2.2. Other versions may also be affected.
The vendor has released a fix, however, the fix is ineffective. No official solution is currently available.
Dark-Puzzle (Souhail Hammou)