Mambo zOOm Media Gallery Module index.php catid Parameter SQL Injection
Remote / Network Access
Loss of Confidentiality,
Loss of Integrity
Mambo zOOm Media Gallery Module contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'index.php' script not properly sanitizing user-supplied input to the 'catid' parameter. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.
OSVDB is not aware of a solution for this vulnerability.
Discovery of this vulnerability is credited to "Andreas Constantinides" <aconstantinides@OdysseyConsultants.com>.
zOOm Media Gallery zOOm Media Gallery 2.1.2
zOOm Media Gallery is reportedly affected by a remote SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.
Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
This issue is reported to affect zOOm Media Gallery version 2.1.2; other versions may also be affected.
No exploit is required.
The following proof of concept is available: http://www.example.com/index.php?option=com_zoom&Itemid=39&catid=2+OR+1=1
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: firstname.lastname@example.org <mailto:email@example.com>.