Description
SQL injection vulnerability in the JoomlaBamboo (JB) Simpla Admin template for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in an article action to the com_content component, reachable through index.php. NOTE: the vendor disputes this report, saying: "JoomlaBamboo has investigated this report, and it is incorrect. There is no SQL injection vulnerability involving the id parameter in an article view, and there never was. JoomlaBamboo customers have no reason to be concerned about this report.
Exploits (1)
References (6)
Core 6
Core References
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2010/0014
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/37579
Exploit x_refsource_misc
http://packetstormsecurity.org/1001-exploits/joomlabamboo-sql.txt
Third Party Advisory mailing-list
x_refsource_mlist
http://www.attrition.org/pipermail/vim/2010-February/002319.html
Third Party Advisory mailing-list
x_refsource_mlist
http://www.attrition.org/pipermail/vim/2010-February/002320.html
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/10971
Scores
EPSS
0.0065
EPSS Percentile
70.9%
Details
CWE
CWE-89
Status
published
Products (1)
joomlabamboo/jb_simpla
Published
Jan 06, 2010
Tracked Since
Feb 18, 2026