A critical SQL Injection Vulnerability( CVE-2017-8917) with Joomla! 3.7, if you are Joomla user it’s you need to update immediately.
Joomla! is a content management system (CMS), that allows you to make websites and powerful on-line applications.
A content management system software that keeps track of each piece of content on your internet site, very like your native library keeps track of books and stores them.
The serious advantage of employing a CMS is that it needs virtually no technical ability or information to manage. Since the CMS manages all of your content, you do not ought to.
SQL Injection in Joomla 3.7
SQL Injection is currently ranked #1 on the OWASP Top 10 chart which means that it is responsible for a large portion of public disclosures and security breaches. Read moreSQL injection is a technique which attacker takes non-validated input vulnerabilities and inject SQL commands through web applications that are executed in the backend database.
Joomla not yet published complete release notes about this vulnerability.
Release note says Inadequate filtering of request data leads to a SQL Injection vulnerability.
Webmasters are strongly recommended to update to version 3.7.1 and the affected version CMS versions 3.7.0.
How to update
Once you log in to your admin panel yourwebsite.com/administrator, in the quick link section you can see a notification for the update.
By clicking that it will take you Joomla update and you need to click on Install the update and in few minutes Joomla upgraded to new version.
It is always a good idea to backup your WordPress before proceeding with the update, if there are any issues, you can restore your website.
- WordPress 4.7.5 released with a patch for Six Major Security Issues Including CSRF & XSS.
- A complete Lookback of Historical Wannacry Ransomware Cyber Attack.
- SIEM better visibility for an analyst to handle an incident.