Description
|
|
A vulnerability has been discovered in the QContacts component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks.
Input passed via the "filter_order" parameter to index.php (when "option" is set to "com_qcontacts" and "filter_order_Dir" is set) is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The vulnerability is confirmed in version 1.0.6. Other versions may also be affected.
|