First published: Thu Oct 29 2015(Updated: )
SQL injection vulnerability in the getListQuery function in administrator/components/com_contenthistory/models/history.php in Joomla! 3.2 before 3.4.5 allows remote attackers to execute arbitrary SQL commands via the list[select] parameter to index.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Joomla | =3.2.0 | |
Joomla | =3.2.1 | |
Joomla | =3.2.2 | |
Joomla | =3.2.3 | |
Joomla | =3.2.4 | |
Joomla | =3.3.0 | |
Joomla | =3.3.1 | |
Joomla | =3.3.2 | |
Joomla | =3.3.3 | |
Joomla | =3.3.4 | |
Joomla | =3.4.0 | |
Joomla | =3.4.1 | |
Joomla | =3.4.2 | |
Joomla | =3.4.3 | |
Joomla | =3.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7857 has a high severity rating due to its potential for remote SQL injection attacks.
To fix CVE-2015-7857, update Joomla! to version 3.4.5 or later.
CVE-2015-7857 affects all Joomla! versions from 3.2.0 to 3.4.4.
CVE-2015-7857 allows remote attackers to execute arbitrary SQL commands, potentially compromising the Joomla! application.
There are no reliable workarounds for CVE-2015-7857, so the best approach is to apply the security update as soon as possible.