Vulnerability Description
SQL injection vulnerability in vote.php in the 2Glux Sexy Polling (com_sexypolling) component before 1.0.9 for Joomla! allows remote attackers to execute arbitrary SQL commands via the answer_id[] parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| 2Glux | Com Sexypolling | <= 1.0.8 |
Related Weaknesses (CWE)
References
- http://2glux.com/forum/sexypolling/sexy-polling-security-vulnerability-notificat
- http://www.securityfocus.com/archive/1/530789/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90519
- https://www.htbridge.com/advisory/HTB23193Exploit
- http://2glux.com/forum/sexypolling/sexy-polling-security-vulnerability-notificat
- http://www.securityfocus.com/archive/1/530789/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90519
- https://www.htbridge.com/advisory/HTB23193Exploit
FAQ
What is CVE-2013-7219?
CVE-2013-7219 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in vote.php in the 2Glux Sexy Polling (com_sexypolling) component before 1.0.9 for Joomla! allows remote attackers to execute arbitrary SQL commands via the answer_id[] par...
How severe is CVE-2013-7219?
CVE-2013-7219 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-7219?
Check the references section above for vendor advisories and patch information. Affected products include: 2Glux Com Sexypolling.