The JBuildozer extension 1.4.1 for Joomla! has SQL Injection via the appid parameter in an entriessearch action.
References
Link | Resource |
---|---|
https://vel.joomla.org/vel-blog/2046-jbuildozer-1-4-1-sql-injection | Third Party Advisory |
https://www.exploit-db.com/exploits/43323/ | Exploit Third Party Advisory VDB Entry |
https://vel.joomla.org/vel-blog/2046-jbuildozer-1-4-1-sql-injection | Third Party Advisory |
https://www.exploit-db.com/exploits/43323/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://vel.joomla.org/vel-blog/2046-jbuildozer-1-4-1-sql-injection - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/43323/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2017-12-27 17:08
Updated : 2025-04-20 01:37
NVD link : CVE-2017-17870
Mitre link : CVE-2017-17870
CVE.ORG link : CVE-2017-17870
JSON object : View
Products Affected
jbuildozer
- jbuildozer
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')