Korean
<< Back
VID 210070
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Joomla! GMaps component is vulnerable to an SQL injection vulnerability via the 'mapID' parameter. Joomla! is an open-source contents management system written in PHP. GMaps extension for Joomla! 1.00 is vulnerable to an SQL injection vulnerability, caused by improper validation of user-supplied input passed to the 'mapID' parameter of the 'index.php' script. Regardless of PHP's 'magic_quotes_gpc' setting, this vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.

* References:
http://firestorm-technologies.com/component/option,com_joomlaboard/Itemid,52/func,view/id,1309/catid,3/
http://milw0rm.com/exploits/4248

* Platforms Affected:
Firestorm Technologies, GMaps extension for Joomla! 1.00
Any operating system Any version
Recommendation Upgrade to the latest version of GMaps (1.1 or later), available from the GMaps extension for Joomla! Web site at http://extensions.joomla.org/extensions/maps-a-weather/maps-a-locations/street-maps/5108
Related URL CVE-2007-4128 (CVE)
Related URL 25146 (SecurityFocus)
Related URL 35701 (ISS)