
Soluções paleativas para o caso:SVN JOOMLA 1.0.X
** HIGH Level Threats fixed in 1.0.10
A1 Unvalidated Input
* A1 - Secured `Remember Me` functionality against SQL injection attacks
* A1 - Secured `Related Items` Module against SQL injection attacks
* A1 - Secured `Weblinks` submission against SQL injection attacks
Foros "Security" joomla.org
Gustavo:
Oficial solution for SQL injection .. 1.0.10 ? for when?
Rey Gigataras: Joomla! Core Team Member
We are working as quickly as possible to complete and release 1.0.10 as soon as possible - at last check my watch said 2am.
Aplicar o path: http://forum.joomla.org/index.php/topic,70117.msg366017.html#msg366017
Apagar o componente WebLink
É bom ficar atento: http://forum.joomla.org/index.PHP/topic,70117.0.HTML
Descrição do Path:
Abra o arquivo /components/com_weblinks/weblinks.php, procure o seguinte código:
Código: Selecionar todos
/**
* Saves the record on an edit form submit
* @param database A database connector object
*/
function saveWeblink( $option ) {
global $mosConfig_mailfrom, $mosConfig_fromname;
global $database, $my;
if ($my->gid < 1) {
mosNotAuth();
return;
}
Código: Selecionar todos
/**
* Saves the record on an edit form submit
* @param database A database connector object
*/
function saveWeblink( $option ) {
global $mosConfig_mailfrom, $mosConfig_fromname;
global $database, $my;
if ($my->gid < 1) {
mosNotAuth();
return;
}
// security check to see if link exists in a menu
$link = 'index.php?option=com_weblinks&task=new';
$query = "SELECT id"
. "\n FROM #__menu"
. "\n WHERE link LIKE '%$link%'"
. "\n AND published = 1"
;
$database->setQuery( $query );
$exists = $database->loadResult();
if ( !$exists ) {
mosNotAuth();
return;
}
Alerta: http://secunia.com/advisories/20746/
Exploit: http://milw0rm.com/exploits/1922 (apenas para aprendizado)