Language:
http://www.nessus.org/u?f50cd901
https://jeffchannell.com/Joomla/lyften-bloggie-sql-injection-fix.html
Severity: High
ID: 43028
File Name: lyftenbloggie_author_sql_injection.nasl
Version: 1.18
Type: remote
Family: CGI abuses
Published: 12/7/2009
Updated: 6/5/2024
Configuration: Enable thorough checks
Supported Sensors: Nessus
Enable CGI Scanning: true
Risk Factor: Medium
Score: 4.2
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.8
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Risk Factor: High
Base Score: 7.3
Temporal Score: 6.9
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Temporal Vector: CVSS:3.0/E:P/RL:U/RC:X
CPE: cpe:/a:joomla:joomla%5c%21
Required KB Items: www/PHP, installed_sw/Joomla!
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Available: true
Exploit Ease: Exploits are available
Exploited by Nessus: true
Patch Publication Date: 11/29/2009
Vulnerability Publication Date: 11/28/2009
CVE: CVE-2009-4104
BID: 37140