CERTA-2010-AVI-541
Vulnerability from certfr_avis - Published: 2010-11-09 - Updated: 2010-11-09
Des vulnérabilités dans Joomla! permettent de réaliser des injections SQL et d'obtenir des informations sur le système.
Description
Un manque de filtrage de certains paramètres dans Joomla! peut provoquer des erreurs dans la base de données. L'exploitation de cette vulnérabilité permet de réaliser des injections SQL et d'obtenir des informations sur le système.
Solution
Mettre Joomla! à jour en version 1.5.22.
Joomla! versions 1.5.21 et antérieures (branche 1.5).
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003e\u003cSPAN class=\"textit\"\u003eJoomla!\u003c/SPAN\u003e versions 1.5.21 et ant\u00e9rieures (branche 1.5).\u003c/P\u003e",
"content": "## Description\n\nUn manque de filtrage de certains param\u00e8tres dans Joomla! peut provoquer\ndes erreurs dans la base de donn\u00e9es. L\u0027exploitation de cette\nvuln\u00e9rabilit\u00e9 permet de r\u00e9aliser des injections SQL et d\u0027obtenir des\ninformations sur le syst\u00e8me.\n\n## Solution\n\nMettre Joomla! \u00e0 jour en version 1.5.22.\n",
"cves": [],
"initial_release_date": "2010-11-09T00:00:00",
"last_revision_date": "2010-11-09T00:00:00",
"links": [
{
"title": "T\u00e9l\u00e9chargement de la derni\u00e8re version de Joomla! :",
"url": "http://www.joomla.org/download.html"
}
],
"reference": "CERTA-2010-AVI-541",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-11-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Divulgation d\u0027informations syst\u00e8me"
},
{
"description": "Injection SQL"
}
],
"summary": "Des vuln\u00e9rabilit\u00e9s dans \u003cspan class=\"textit\"\u003eJoomla!\u003c/span\u003e permettent\nde r\u00e9aliser des injections SQL et d\u0027obtenir des informations sur le\nsyst\u00e8me.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans Joomla!",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Joomla! du 04 novembre 2010",
"url": "http://developer.joomla.org/security/news/9-security/10-core-security/323-20101101-core-sqli-info-disclosurevulnerabilities.html"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…