Joomla! Component Com_contenthistory SQLI
Impact: High
Description
A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. SQL injection attacks are a type of injection attack, in which SQL commands are injected into data-plane input in order to effect the execution of predefined SQL commands. OWASP
Recommendation
Upgrade Joomla! to the latest stable version.
References
- OWASP: SQL Injection
- OWASP: ESAPI project
- Wikipedia: Prepared statement
- Joomla!
- CVE-2015-7858
- CVE-2015-7857
- CVE-2015-7297
- OWASP 2017-A9
- OWASP 2021-A6
- CWE-89
- OWASP 2017-A1
- OWASP 2021-A3
- CWE-20
👉 You might also like:
Joomla! Component Com_fields 3.7 SQLI - Vulnerability
Joomla! Component Com_newsfeeds 1.0 SQLI - Vulnerability
Joomla! Component File Download Tracker 3.0 SQLI - CVE-2018-6004
Joomla! Component Form Maker 3.6.12 SQLI - CVE-2018-5991
Last updated on April 10, 2022