SQL injection vulnerability in the Focusplus Developments Survey Manager (com_surveymanager) component 1.5.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the stype parameter in an editsurvey action to index.php.
References
Link | Resource |
---|---|
http://www.exploit-db.com/exploits/9721 | |
http://www.securityfocus.com/bid/36464 | Exploit |
http://www.vupen.com/english/advisories/2009/2705 | Vendor Advisory |
http://www.exploit-db.com/exploits/9721 | |
http://www.securityfocus.com/bid/36464 | Exploit |
http://www.vupen.com/english/advisories/2009/2705 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.exploit-db.com/exploits/9721 - | |
References | () http://www.securityfocus.com/bid/36464 - Exploit | |
References | () http://www.vupen.com/english/advisories/2009/2705 - Vendor Advisory |
Information
Published : 2009-09-23 12:08
Updated : 2024-11-21 01:07
NVD link : CVE-2009-3325
Mitre link : CVE-2009-3325
CVE.ORG link : CVE-2009-3325
JSON object : View
Products Affected
joomla
- joomla
focusdev
- com_surveymanager
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')