First published: Tue May 27 2008(Updated: )
SQL injection vulnerability in the xsstream-dm (com_xsstream-dm) component 0.01 Beta for Joomla! allows remote attackers to execute arbitrary SQL commands via the movie parameter to index.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Joomla! | =0.01_beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2454 is classified as a high-severity vulnerability due to its potential to allow remote attackers to execute arbitrary SQL commands.
To fix CVE-2008-2454, you should upgrade the xsstream-dm component to a version that is not affected by this SQL injection vulnerability.
CVE-2008-2454 specifically affects the xsstream-dm component version 0.01 Beta for Joomla!.
An attacker can perform SQL injection attacks through the movie parameter in the index.php file, potentially compromising the database.
CVE-2008-2454 may still be a concern for outdated Joomla! installations that have not upgraded from the vulnerable version of the xsstream-dm component.