CVE-2009-4650

SQL injection vulnerability in the Webee Comments (com_webeecomment) component 1.1.1, 1.2, and 2.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the articleId parameter in a default action to index2.php. NOTE: some of these details are obtained from third party information.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:onnogroen:com_webeecomment:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:onnogroen:com_webeecomment:1.2:*:*:*:*:*:*:*
cpe:2.3:a:onnogroen:com_webeecomment:2.0:*:*:*:*:*:*:*
cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:10

Type Values Removed Values Added
References () http://jeffchannell.com/Joomla/webee-111-multiple-vulnerabilities.html - Exploit () http://jeffchannell.com/Joomla/webee-111-multiple-vulnerabilities.html - Exploit
References () http://secunia.com/advisories/38625 - Vendor Advisory () http://secunia.com/advisories/38625 - Vendor Advisory
References () http://www.osvdb.org/62334 - Exploit () http://www.osvdb.org/62334 - Exploit
References () http://www.securityfocus.com/bid/38204 - Exploit () http://www.securityfocus.com/bid/38204 - Exploit

Information

Published : 2010-02-22 21:30

Updated : 2024-11-21 01:10


NVD link : CVE-2009-4650

Mitre link : CVE-2009-4650

CVE.ORG link : CVE-2009-4650


JSON object : View

Products Affected

onnogroen

  • com_webeecomment

joomla

  • joomla\!
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')