First published: Fri May 04 2007(Updated: )
SQL injection vulnerability in index.php in the v4bJournal module for PostNuke allows remote authenticated users to execute arbitrary SQL commands via the id parameter in a journal_comment action.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Postnuke V4bjournal Module | =0.99 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2492 is considered a high severity vulnerability due to its potential for allowing unauthorized SQL command execution.
To fix CVE-2007-2492, update to a patched version of the v4bJournal module for PostNuke that addresses the SQL injection risk.
All users of the v4bJournal module for PostNuke version 0.99 are affected by CVE-2007-2492.
CVE-2007-2492 is classified as an SQL injection vulnerability.
Yes, CVE-2007-2492 can be exploited remotely by authenticated users via the id parameter.