First published: Tue Jan 18 2011(Updated: )
Multiple SQL injection vulnerabilities in Joomla! 1.5.x before 1.5.22 allow remote attackers to execute arbitrary SQL commands via (1) the filter_order parameter in a com_weblinks category action to index.php, (2) the filter_order_Dir parameter in a com_weblinks category action to index.php, or (3) the filter_order_Dir parameter in a com_messages action to administrator/index.php.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Joomla | =1.5.11 | |
Joomla | =1.5.13 | |
Joomla | =1.5.3 | |
Joomla | =1.5.2 | |
Joomla | =1.5.9 | |
Joomla | =1.5.18 | |
Joomla | =1.5.16 | |
Joomla | =1.5.4 | |
Joomla | =1.5.10 | |
Joomla | =1.5.7 | |
Joomla | =1.5.0 | |
Joomla | =1.5.15 | |
Joomla | =1.5.6 | |
Joomla | =1.5.1 | |
Joomla | =1.5.17 | |
Joomla | =1.5.8 | |
Joomla | =1.5.19 | |
Joomla | =1.5.21 | |
Joomla | =1.5.12 | |
Joomla | =1.5.5 | |
Joomla | =1.5.20 | |
Joomla | =1.5.15-rc | |
Joomla | =1.5.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4166 is classified as a critical vulnerability due to its potential for remote SQL injection attacks that could compromise the database.
To fix CVE-2010-4166, upgrade Joomla! to version 1.5.22 or later, which addresses the SQL injection vulnerabilities.
CVE-2010-4166 affects multiple versions of Joomla! 1.5.x prior to 1.5.22, specifically all versions from 1.5.0 to 1.5.21.
CVE-2010-4166 can enable attackers to execute arbitrary SQL commands, potentially leading to unauthorized access to sensitive data.
Yes, CVE-2010-4166 has known exploits that target the vulnerable parameters in Joomla!'s com_weblinks category functionality.