ID CVE-2007-0373
Summary Multiple SQL injection vulnerabilities in Joomla! 1.5.0 Beta allow remote attackers to execute arbitrary SQL commands via (1) the searchword parameter in certain files; the where parameter in (2) plugins/search/content.php or (3) plugins/search/weblinks.php; the text parameter in (4) plugins/search/contacts.php, (5) plugins/search/categories.php, or (6) plugins/search/sections.php; or (7) the email parameter in database/table/user.php, which is not properly handled by the check function.
References
Vulnerable Configurations
  • cpe:2.3:a:joomla:joomla:1.5.0_beta:*:*:*:*:*:*:*
    cpe:2.3:a:joomla:joomla:1.5.0_beta:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 16-10-2018 - 16:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
refmap via4
bid 22122
bugtraq 20070204 Sql injection bugs in Joomla and Mambo
fulldisc 20070118 The vulnerabilities festival !
misc http://www.hackers.ir/advisories/festival.txt
osvdb
  • 32527
  • 32528
  • 32529
  • 32530
  • 32531
  • 32532
  • 32533
Last major update 16-10-2018 - 16:32
Published 19-01-2007 - 23:28
Last modified 16-10-2018 - 16:32
Back to Top