SQL injection in JoomBlog - #VU5831
Published: February 15, 2017
JoomBlog
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary SQL commands in web application database.
The vulnerability exists due to insufficient sanitization of user-supplied input passed via the “tag” HTTP GET parameter to "/index.php" script (when option=com_joomblog and task=tag). A remote unauthenticated attacker can send a specially crafted HTTP GET request to vulnerable script and execute arbitrary SQL queries.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable website.
Exploitation example:
http://[host]/index.php?option=com_joomblog&task=tag&tag=[SQL injection]
Remediation
Cybersecuirty Help is currently unaware of any official solution to address this vulnerability.