A vulnerability, which was classified as critical, was found in JoomGallery up to 3.3.3. This affects an unknown part of the file administrator/components/com_joomgallery/views/config/tmpl/default.php of the component Image Sort Handler. The manipulation leads to sql injection. Upgrading to version 3.3.4 is able to address this issue. The name of the patch is dc414ee954e849082260f8613e15a1c1e1d354a1. It is recommended to upgrade the affected component. The identifier VDB-217569 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://vuldb.com/?id.217569 | Permissions Required Third Party Advisory |
https://github.com/JoomGallery/JoomGallery/commit/dc414ee954e849082260f8613e15a1c1e1d354a1 | Patch Third Party Advisory |
https://github.com/JoomGallery/JoomGallery/pull/122 | Patch Third Party Advisory |
https://vuldb.com/?ctiid.217569 | Permissions Required Third Party Advisory |
https://github.com/JoomGallery/JoomGallery/releases/tag/v3.3.4 | Release Notes Third Party Advisory |
Configurations
Information
Published : 2023-01-06 13:15
Updated : 2023-01-12 07:23
NVD link : CVE-2018-25067
Mitre link : CVE-2018-25067
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
joomgallery_project
- joomgallery