SQL injection in JoomBlog - #VU5831

 

SQL injection in JoomBlog - #VU5831

Published: February 15, 2017


Vulnerability identifier: #VU5831
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Green
CVE-ID: N/A
CWE-ID: CWE-89
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: JoomPlace
Affected software:
JoomBlog

Detailed vulnerability description

The vulnerability allows a remote attacker to execute arbitrary SQL commands in web application database.

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the “tag” HTTP GET parameter to "/index.php" script (when option=com_joomblog and task=tag). A remote unauthenticated attacker can send a specially crafted HTTP GET request to vulnerable script and execute arbitrary SQL queries.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable website.

Exploitation example:

 http://[host]/index.php?option=com_joomblog&task=tag&tag=[SQL injection]



Remediation

The vulnerability was confirmed on version 1.3.1. Other versions may also be affected.

Cybersecuirty Help is currently unaware of any official solution to address this vulnerability.

Sources