SQL Injection in JV Comment Joomla Extension
|Product:||JV Comment Joomla Extension|
|Vulnerable Versions:||3.0.2 and probably prior|
|Advisory Publication:||January 2, 2014 [without technical details]|
|Vendor Notification:||January 2, 2014|
|Vendor Fix:||January 14, 2014|
|Public Disclosure:||January 23, 2014|
|Latest Update:||January 14, 2014|
|Vulnerability Type:||SQL Injection [CWE-89]|
|CVSSv2 Base Score:||6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)|
|Solution Status:||Fixed by Vendor|
|Discovered and Provided:||High-Tech Bridge Security Research Lab|
High-Tech Bridge Security Research Lab discovered SQL injection vulnerability in JV Comment Joomla Extension, which can be exploited to perform SQL Injection attacks.
|Update to JV Comment 3.0.3|
| High-Tech Bridge Advisory HTB23195 - https://www.htbridge.com/advisory/HTB23195 - SQL Injection in JV Comment Joomla Extension.|
 JV Comment Joomla Extension - http://www.joomlavi.com/joomla-extensions/jv-comment.html - With JV Comment, adding a comment system to your articles is now as simple as installing a plug-in and adjusting a few parameters.
 Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
 Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
 ImmuniWeb® - a PCI compliant web application penetration test combined with managed vulnerability scan. Configure, schedule, and manage online 24/7.
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.