Vulnerability Description
SQL injection vulnerability in the Payments Plus component 2.1.5 for Joomla! allows remote attackers to execute arbitrary SQL commands via the type parameter to add.html.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Paymentsplus | Payments Plus | 2.1.5 |
| Joomla | Joomla\! | All versions |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.org/1007-exploits/joomlapaymentsplus-sql.txtExploit
- http://securityreason.com/securityalert/8497
- http://www.exploit-db.com/exploits/14265Exploit
- http://www.securityfocus.com/bid/41458Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/60166
- http://packetstormsecurity.org/1007-exploits/joomlapaymentsplus-sql.txtExploit
- http://securityreason.com/securityalert/8497
- http://www.exploit-db.com/exploits/14265Exploit
- http://www.securityfocus.com/bid/41458Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/60166
FAQ
What is CVE-2010-4992?
CVE-2010-4992 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in the Payments Plus component 2.1.5 for Joomla! allows remote attackers to execute arbitrary SQL commands via the type parameter to add.html.
How severe is CVE-2010-4992?
CVE-2010-4992 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-4992?
Check the references section above for vendor advisories and patch information. Affected products include: Paymentsplus Payments Plus, Joomla Joomla\!.