HTTP: Select Concat statement Possible SQL Injection Obfuscation

This signature detects attempts to exploit Select Concat statement SQL Injection vulnerability. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Extended Description

In Joomla! 3.5.0 through 3.8.5, the lack of type casting of a variable in a SQL statement leads to a SQL injection vulnerability in the User Notes list view.

Affected Products

Joomla joomla!

Short Name
HTTP:SQL:INJ:SELECT-CONCAT-STAT
Severity
Minor
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2013-3522 CVE-2018-8045 Concat Injection Obfuscation Possible SQL Select bid:58754 statement
Release Date
06/09/2015
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3337
False Positive
Unknown
Vendors

Joomla

CVSS Score

6.5

Found a potential security threat?