Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 290979 - Joomla! 'com_jshop' Component 'pid' Parameter SQL Injection Vulnerability
Summary: Joomla! 'com_jshop' Component 'pid' Parameter SQL Injection Vulnerability
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High critical (vote)
Assignee: Gentoo Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2009-10-29 08:17 UTC by Dawoud
Modified: 2009-10-29 14:19 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Dawoud 2009-10-29 08:17:01 UTC
http://www.securityfocus.com/bid/36808/info

The 'com_jshop' component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Reproducible: Always




Sorry, the initial bug report is vague.
Comment 1 Tobias Heinlein (RETIRED) gentoo-dev 2009-10-29 14:19:10 UTC
We don't ship this component, i.e. www-apps/joomla doesn't contain it.