Joomla!.Component.EkRishta.username.SQL.Injection

description-logoDescription

This indicates an attack attempt to exploit a SQL Injection vulnerability in Joomla! Component EkRishta.
The vulnerability is due to the application's failure to properly sanitize user input before using it in a SQL query. As a result, a remote attacker can send a crafted query to execute SQL commands on a vulnerable server.

affected-products-logoAffected Products

Joomla! Component EkRishta 2.10

Impact logoImpact

System Compromise: Remote attackers can execute arbitrary SQL commands on affected machines

recomended-action-logoRecommended Actions

Currently we are unaware of any vendor supplied patch for this issue.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2019-02-01 14.540 Name:Joomla.
Component.
EkRishta.
username.
SQL.
Injection:Joomla!.
Component.
EkRishta.
username.
SQL.
Injection

References

44877