SB2017021505 - SQL injection in JoomBlog component for Joomla!
Published: February 15, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 vulnerability.
1) SQL injection (CVE-ID: N/A)
The vulnerability allows a remote attacker to execute arbitrary SQL commands in web application database.
The vulnerability exists due to insufficient sanitization of user-supplied input passed via the “tag” HTTP GET parameter to "/index.php" script (when option=com_joomblog and task=tag). A remote unauthenticated attacker can send a specially crafted HTTP GET request to vulnerable script and execute arbitrary SQL queries.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable website.
Exploitation example:
http://[host]/index.php?option=com_joomblog&task=tag&tag=[SQL injection]
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.