CVE-2019-9184

SQL injection vulnerability in the J2Store plugin 3.x before 3.3.7 for Joomla! allows remote attackers to execute arbitrary SQL commands via the product_option[] parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:j2store:j2store:*:*:*:*:*:joomla\!:*:*

History

21 Nov 2024, 04:51

Type Values Removed Values Added
References () https://andreiconache.me/j2store-plugin-3-3-6-sql-injection/ - Third Party Advisory () https://andreiconache.me/j2store-plugin-3-3-6-sql-injection/ - Third Party Advisory
References () https://www.exploit-db.com/exploits/46467/ - VDB Entry, Exploit, Third Party Advisory () https://www.exploit-db.com/exploits/46467/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.j2store.org/blog/general/security-update-for-j2store.html - Patch, Vendor Advisory () https://www.j2store.org/blog/general/security-update-for-j2store.html - Patch, Vendor Advisory

Information

Published : 2019-02-26 15:29

Updated : 2024-11-21 04:51


NVD link : CVE-2019-9184

Mitre link : CVE-2019-9184

CVE.ORG link : CVE-2019-9184


JSON object : View

Products Affected

j2store

  • j2store
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')