Joomla's developers have moved to fix a critical SQL injection vulnerability – but are coming under fire for taking a month to address the issue. The version 3.2.3 update, available since late last week, is described by Joomla as fixing a high priority core SQL injection bug (along with two medium priority XSS bugs and an …
I have no understanding for people who still write code like that, concatenating SQL strings into a giant mess. Why not just use prepared statements?
I thought this might be something rather more unusual - an MS SQL Server vulnerability. Nope.
That would be interesting, as the vast majority of Joomla sites are probably not running MS SQL.
- Geek's Guide to Britain Kingston's aviation empire: From industry firsts to Airfix heroes
- Analysis Happy 2nd birthday, Windows 8 and Surface: Anatomy of a disaster
- Breaking news: Google exec veep in terrifying SKY PLUNGE DRAMA
- Adobe spies on readers: EVERY DRM page turn leaked to base over SSL
- Google chief Larry Page gives Sundar Pichai keys to the kingdom