VID |
210070 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Joomla! GMaps component is vulnerable to an SQL injection vulnerability via the 'mapID' parameter. Joomla! is an open-source contents management system written in PHP. GMaps extension for Joomla! 1.00 is vulnerable to an SQL injection vulnerability, caused by improper validation of user-supplied input passed to the 'mapID' parameter of the 'index.php' script. Regardless of PHP's 'magic_quotes_gpc' setting, this vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.
* References: http://firestorm-technologies.com/component/option,com_joomlaboard/Itemid,52/func,view/id,1309/catid,3/ http://milw0rm.com/exploits/4248
* Platforms Affected: Firestorm Technologies, GMaps extension for Joomla! 1.00 Any operating system Any version |
Recommendation |
Upgrade to the latest version of GMaps (1.1 or later), available from the GMaps extension for Joomla! Web site at http://extensions.joomla.org/extensions/maps-a-weather/maps-a-locations/street-maps/5108 |
Related URL |
CVE-2007-4128 (CVE) |
Related URL |
25146 (SecurityFocus) |
Related URL |
35701 (ISS) |
|