SQL injection vulnerability in the PerchaGallery (com_perchagallery) component before 1.5b for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in an editunidad action to index.php.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://docs.joomla.org/Vulnerable_Extensions_List#New_format_Feed_Starts_Here - | |
References | () http://packetstormsecurity.org/1001-exploits/joomlaperchagallery-sql.txt - Exploit | |
References | () http://www.exploit-db.com/exploits/11024 - Exploit | |
References | () http://www.securityfocus.com/bid/37642 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/55447 - |
Information
Published : 2010-02-23 18:30
Updated : 2024-11-21 01:12
NVD link : CVE-2010-0694
Mitre link : CVE-2010-0694
CVE.ORG link : CVE-2010-0694
JSON object : View
Products Affected
joomla
- joomla
percha
- com_perchagallery
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')