| VID |
210070 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The Joomla! GMaps component is vulnerable to an SQL injection vulnerability via the 'mapID' parameter. Joomla! is an open-source contents management system written in PHP. GMaps extension for Joomla! 1.00 is vulnerable to an SQL injection vulnerability, caused by improper validation of user-supplied input passed to the 'mapID' parameter of the 'index.php' script. Regardless of PHP's 'magic_quotes_gpc' setting, this vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.
* References: http://firestorm-technologies.com/component/option,com_joomlaboard/Itemid,52/func,view/id,1309/catid,3/ http://milw0rm.com/exploits/4248
* Platforms Affected: Firestorm Technologies, GMaps extension for Joomla! 1.00 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of GMaps (1.1 or later), available from the GMaps extension for Joomla! Web site at http://extensions.joomla.org/extensions/maps-a-weather/maps-a-locations/street-maps/5108 |
| Related URL |
CVE-2007-4128 (CVE) |
| Related URL |
25146 (SecurityFocus) |
| Related URL |
35701 (ISS) |
|