JRequest in Joomla! 1.5 before 1.5.7 does not sanitize variables that were set with JRequest::setVar, which allows remote attackers to conduct "variable injection" attacks and have unspecified other impact.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://marc.info/?l=oss-security&m=122152798516853&w=2 | mailing list |
http://developer.joomla.org/security/news/271-20080901-core-jrequest-variable-injection.html | |
http://secunia.com/advisories/31789 | third party advisory |
http://marc.info/?l=oss-security&m=122115344915232&w=2 | mailing list |
http://securityreason.com/securityalert/4275 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45069 | vdb entry |
http://marc.info/?l=oss-security&m=122118210029084&w=2 | mailing list |
http://securitytracker.com/id?1020843 | vdb entry |