Joomla! fixed High Priority SQL Injection Vulnerability

Joomla version 3.7.1 is now available. This is a security release for the 3.x series of Joomla! Which addresses one critical security flaw and several bug fixes.

Joomla is a free and open-source content management system (CMS) for publishing web content. It is built on a model–view–controller web application framework that can be used independently of the CMS. The CMS (Content Managment System) administrators recommend all users to update their sites immediately.

What is in version 3.7.1?
This release includes security and bug fixes; no other changes have been made compared to the version 3.7.0 release.

Security Issues Fixed
High Priority – Core – SQL Injection (affecting Joomla 3.7.0) – CVE-2017-8917

Fixed Bugs
– Fixed attribute checks in the new calendar.
– Inject the JInput dependency into the session handler.
– Fix b/c break in JMenuItem.
– Fix article ordering in the backend.
– Fix milliseconds handling in for PHP Versions lower to 7.1.0.
– JFilterInput adding byte offsets to character offset.
– Redirection fails on multiple status values produced by old FOF2 Extensions.
– Remove empty locked cache file if callback function terminates process.

You can visit GitHub for the full list of bug fixes.

Until now there are no technical details about the SQL injection vulnerability, but all Joomla users are strongly recommended to update the CMS to the latest release 3.7.1.

Related posts

Apple Addressed Two Zero-Day Flaws In Intel-based Macs

Really Simple Security Plugin Flaw Risks 4+ Million WordPress Websites

Microsoft Released November 2024 Patch Tuesday With ~90 Fixes