First published: Thu Dec 15 2011(Updated: )
Multiple SQL injection vulnerabilities in Vik Real Estate (com_vikrealestate) component 1.0 for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) contract parameter in a results action and (2) imm parameter in a show action to index.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Extensionsforjoomla.com VikRealEstate | =1.0 | |
Joomla |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4823 includes multiple SQL injection vulnerabilities in the Vik Real Estate component that allow remote attackers to execute arbitrary SQL commands.
To mitigate CVE-2011-4823, you should upgrade the Vik Real Estate component to a patched version or implement input validation and sanitization practices.
The impact of CVE-2011-4823 allows attackers to manipulate database queries, potentially leading to data leakage or loss.
CVE-2011-4823 specifically affects version 1.0 of the Vik Real Estate component for Joomla!.
The vulnerability CVE-2011-4823 was identified in the Vik Real Estate component developed by Extensions for Joomla.