A critical SQL Injection Vulnerability( CVE-2017-8917) with Joomla! 3.7, if you are Joomla user it’s you need to update immediately.
Joomla! is a content management system (CMS), that allows you to make websites and powerful on-line applications.
A content management system software that keeps track of each piece of content on your internet site, very like your native library keeps track of books and stores them.
The serious advantage of employing a CMS is that it needs virtually no technical ability or information to manage. Since the CMS manages all of your content, you do not ought to.
SQL Injection is currently ranked #1 on the OWASP Top 10 chart which means that it is responsible for a large portion of public disclosures and security breaches. Read more
SQL injection is a technique which attacker takes non-validated input vulnerabilities and inject SQL commands through web applications that are executed in the backend database.Joomla not yet published complete release notes about this vulnerability.
Release note says Inadequate filtering of request data leads to a SQL Injection vulnerability.
Webmasters are strongly recommended to update to version 3.7.1 and the affected version CMS versions 3.7.0.
This particular vulnerability was reported Marc Montpas from Securi, they discovered this vulnerability while conducting regular search audits with their WAF.
Once you log in to your admin panel yourwebsite.com/administrator, in the quick link section you can see a notification for the update.
By clicking that it will take you Joomla update and you need to click on Install the update and in few minutes Joomla upgraded to new version.
It is always a good idea to backup your WordPress before proceeding with the update, if there are any issues, you can restore your website.
Through the use of XLoader and impersonating SharePoint notifications, researchers were able to identify a…
Researchers have identified a rise in malicious activity on the VSCode Marketplace, highlighting the vulnerability…
TA397, also known as Bitter, targeted a Turkish defense organization with a spearphishing email containing…
BADBOX is a cybercriminal operation infecting Android devices like TV boxes and smartphones with malware…
Europol has published a groundbreaking report titled "Leveraging Legitimacy: How the EU’s Most Threatening Criminal Networks…
The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a proposed update to the National…