HTTP: Joomla! filter_order SQL Injection

This signature detects attempts to exploit multiple SQL Injection vulnerabilities in Joomla!. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Extended Description

Joomla! is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Joomla! 1.6.0 is vulnerable; other versions may also be affected.

References

BugTraq: 46846

URL: http://www.joomla.org

Short Name
HTTP:SQL:INJ:JOOMLA-FILTERORDER
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Injection Joomla! SQL bid:46846 filter_order
Release Date
03/21/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3339
False Positive
Unknown

Found a potential security threat?