SQL injection vulnerability in Mambo 4.5.3, 4.5.3h, and possibly earlier versions allows remote attackers to execute arbitrary SQL commands via (1) the $username variable in the mosGetParam function and (2) the $task parameter in the mosMenuCheck function in (a) includes/mambo.php; and (3) the $filter variable to the showCategory function in the com_content component (content.php).
Link | Tags |
---|---|
http://secunia.com/advisories/18935 | third party advisory vendor advisory |
http://www.osvdb.org/23402 | vdb entry |
http://www.vupen.com/english/advisories/2006/0719 | vdb entry |
http://archives.neohapsis.com/archives/bugtraq/2006-02/0463.html | patch vendor advisory mailing list exploit |
http://www.securityfocus.com/bid/16775 | patch vdb entry exploit |
http://www.gulftech.org/?node=research&article_id=00104-02242006 | patch exploit |
http://source.mambo-foundation.org/view/news/Announcements/Security_Patch_Released/ | patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24951 | vdb entry |
http://www.osvdb.org/23503 | vdb entry |