Vulnerability ID 12308

Joomla! 3.2.1 weblinks-categories id sql injection

CVSSv3 Temp ScoreCurrent Exploit Price (≈)
7.1$0-$1k

A vulnerability was found in Joomla! 3.2.1 and classified as critical. Affected by this issue is an unknown function of the file /index.php/weblinks-categories. The manipulation of the argument id with the input value 0%20%29%20union%20select%20password%20from%20%60k59cv_users%60%20--%20%29 leads to a sql injection vulnerability. Impacted is confidentiality, integrity, and availability.

The weakness was presented 02/06/2014 by kiall-9 as EDB-ID 31459 as uncorroborated exploit (Exploit-DB). The advisory is shared for download at exploit-db.com. This vulnerability is handled as CVE-2014-7981. The exploitation is known to be easy. The attack may be launched remotely. No form of authentication is required for exploitation. Technical details as well as a public exploit are known.

A public exploit has been developed by kiall-9 and been published immediately after the advisory. It is declared as highly functional. The exploit is shared for download at exploit-db.com. As 0-day the estimated underground price was around $10k-$25k. The vulnerability scanner Nessus provides a plugin with the ID 73025 (Joomla! 3.x < 3.2.3 Multiple Vulnerabilities), which helps to determine the existence of the flaw in a target environment. It is assigned to the family CGI abuses.

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

The vulnerability is also documented in the databases at SecurityFocus (BID 65410), X-Force (91072) and Secunia (SA56772). Similar entries are available at 68540, 68545, 71891 and 71892.

CVSSv3

Base Score: 7.3 [?]
Temp Score: 7.1 [?]
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:H/RL:U/RC:R [?]
Reliability: High

CVSSv2

Base Score: 7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P) [?]
Temp Score: 7.1 (CVSS2#E:H/RL:U/RC:UR) [?]
Reliability: High

AVACAuCIA
LHMNNN
AMSPPP
NLNCCC
VectorComplexityAuthenticationConfidentialityIntegrityAvailability
LocalHighMultipleNoneNoneNone
AdjacentMediumSinglePartialPartialPartial
NetworkLowNoneCompleteCompleteComplete

CPE

Exploiting

Class: Sql injection
Local: No
Remote: Yes

Availability: Yes
Access: Public
Status: Highly functional
Author: kiall-9
Download: exploit-db.com

Current Price Estimation: $10k-$25k (0-day) / $0-$1k (Today)

0-Day$0-$1k$1k-$2k$2k-$5k$5k-$10k$10k-$25k$25k-$50k$50k-$100k$100k-$500k
Today$0-$1k$1k-$2k$2k-$5k$5k-$10k$10k-$25k$25k-$50k$50k-$100k$100k-$500k


Nessus ID: 73025
Nessus Name: Joomla! 3.x < 3.2.3 Multiple Vulnerabilities
Nessus Family: CGI abuses
Exploit-DB: 31459

Countermeasures

Recommended: no mitigation known
Status: Not available
0-Day Time: 0 days since found
Exploit Delay Time: 0 days since known

Timeline

02/06/2014 Advisory disclosed
02/06/2014 +0 days Exploit disclosed
02/06/2014 +0 days SecurityFocus entry assigned
02/14/2014 +8 days VulDB entry created
03/14/2014 +28 days Nessus plugin released
07/03/2015 +476 days VulDB entry updated

Sources

Advisory: EDB-ID 31459
Researcher: kiall-9
Status: Uncorroborated

CVE: CVE-2014-7981 (mitre.org) (nvd.nist.org) (cvedetails.com)

SecurityFocus: 65410 - Joomla! 'index.php' SQL Injection Vulnerability
Secunia: 56772
X-Force: 91072 - Joomla! index.php id SQL injection, Medium Risk

See also: 68540, 68545, 71891 , 71892

Entry

Created: 02/14/2014
Updated: 07/03/2015
Entry: 83.8% complete