First published: Thu Oct 29 2015(Updated: )
SQL injection vulnerability in Joomla! 3.2 before 3.4.4 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, a different vulnerability than CVE-2015-7297.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Joomla | =3.2.0 | |
Joomla | =3.2.1 | |
Joomla | =3.2.2 | |
Joomla | =3.2.3 | |
Joomla | =3.2.4 | |
Joomla | =3.3.0 | |
Joomla | =3.3.1 | |
Joomla | =3.3.2 | |
Joomla | =3.3.3 | |
Joomla | =3.3.4 | |
Joomla | =3.4.0 | |
Joomla | =3.4.1 | |
Joomla | =3.4.2 | |
Joomla | =3.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7858 is classified as a high severity SQL injection vulnerability that allows remote attackers to execute arbitrary SQL commands.
To fix CVE-2015-7858, update Joomla! to version 3.4.4 or later, where the vulnerability is addressed.
CVE-2015-7858 affects Joomla! versions 3.2.0 to 3.4.3.
Attackers can exploit CVE-2015-7858 through unspecified vectors to perform SQL injection attacks.
Additional information regarding CVE-2015-7858 can be found in Joomla's official security advisories.