First published: Thu Feb 22 2018(Updated: )
SQL Injection exists in the CheckList 1.1.1 component for Joomla! via the title_search, tag_search, name_search, description_search, or filter_order parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Belitsoft Checklist | =1.1.1 | |
Oracle Data Integrator | =11.1.1.9.0 | |
Oracle Data Integrator | =12.2.1.3.0 | |
Oracle Data Integrator | =12.2.1.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
SQL Injection is a code injection technique that allows an attacker to insert malicious SQL statements into an application's database query.
The vulnerability ID for the SQL Injection in CheckList 1.1.1 component for Joomla! is CVE-2018-7318.
The severity level of CVE-2018-7318 is critical.
The SQL Injection in CheckList 1.1.1 component for Joomla! occurs when the title_search, tag_search, name_search, description_search, or filter_order parameter is not properly sanitized, allowing an attacker to manipulate the SQL query and potentially execute malicious code.
To fix the SQL Injection vulnerability in CheckList 1.1.1 component for Joomla!, you should update to the latest version of the component and sanitize user input before using it in SQL queries.