SQL injection vulnerability in Mambo 4.5.3, 4.5.3h, and possibly earlier versions allows remote attackers to execute arbitrary SQL commands via (1) the $username variable in the mosGetParam function and (2) the $task parameter in the mosMenuCheck function in (a) includes/mambo.php; and (3) the $filter variable to the showCategory function in the com_content component (content.php).
Name | Vendor | Start Version | End Version |
---|---|---|---|
Mambo | Mambo | * | 4.5.3h (including) |
Mambo | Mambo | 4.0.14 (including) | 4.0.14 (including) |
Mambo | Mambo | 4.5.1_1.0.9 (including) | 4.5.1_1.0.9 (including) |
Mambo | Mambo | 4.5.1a (including) | 4.5.1a (including) |
Mambo | Mambo | 4.5.1a-beta (including) | 4.5.1a-beta (including) |
Mambo | Mambo | 4.5.1a-beta_2 (including) | 4.5.1a-beta_2 (including) |
Mambo | Mambo | 4.5.2 (including) | 4.5.2 (including) |
Mambo | Mambo | 4.5.2.1 (including) | 4.5.2.1 (including) |
Mambo | Mambo | 4.5.2.2 (including) | 4.5.2.2 (including) |
Mambo | Mambo | 4.5.2.3 (including) | 4.5.2.3 (including) |
Mambo | Mambo | 4.5.3h (including) | 4.5.3h (including) |
Mambo | Mambo | 4.5_1.0.0 (including) | 4.5_1.0.0 (including) |
Mambo | Mambo | 4.5_1.0.1 (including) | 4.5_1.0.1 (including) |
Mambo | Mambo | 4.5_1.0.2 (including) | 4.5_1.0.2 (including) |
Mambo | Mambo | 4.5_1.0.3_beta (including) | 4.5_1.0.3_beta (including) |
Mambo | Mambo | 4.5_1.0.3_beta-beta (including) | 4.5_1.0.3_beta-beta (including) |