SB2017021505 - SQL injection in JoomBlog component for Joomla!



SB2017021505 - SQL injection in JoomBlog component for Joomla!

Published: February 15, 2017

Security Bulletin ID SB2017021505
CSH Severity
Medium
Patch available
NO
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 vulnerability.


1) SQL injection (CVE-ID: N/A)

The vulnerability allows a remote attacker to execute arbitrary SQL commands in web application database.

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the “tag” HTTP GET parameter to "/index.php" script (when option=com_joomblog and task=tag). A remote unauthenticated attacker can send a specially crafted HTTP GET request to vulnerable script and execute arbitrary SQL queries.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable website.

Exploitation example:

 http://[host]/index.php?option=com_joomblog&task=tag&tag=[SQL injection]



Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.