此页面尚未翻译为您的语言。我们正在努力翻译,目前显示英文内容。

💡 Keep dependencies up to date — most exploits target known, patchable vulnerabilities.

HIGHCVE-2020-37218CVSS 8.2

CVE-2020-37218: SQL Injection in Joomla com_hdwplayer

平台

joomla

组件

joomla

正在翻译为您的语言…

CVE-2020-37218 describes a SQL Injection vulnerability discovered in Joomla's comhdwplayer component, specifically version 4.2. This flaw allows unauthenticated attackers to inject malicious SQL code through the hdwplayersearch parameter, potentially leading to unauthorized access to sensitive database information. Successful exploitation can expose data stored within the hdwplayervideos table. A fix is available via component updates.

Joomla

检测此 CVE 是否影响你的项目

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。

影响与攻击场景翻译中…

The primary impact of CVE-2020-37218 is unauthorized data extraction. An attacker can craft malicious POST requests containing SQL payloads within the hdwplayersearch parameter to bypass security controls and directly query the database. This allows them to retrieve sensitive information stored in the hdwplayervideos table, such as video titles, descriptions, and potentially user-related data if stored within that table. While direct remote code execution is unlikely, the attacker could potentially use the extracted data to gain further insights into the system or launch subsequent attacks. The blast radius extends to any data stored within the hdwplayervideos table accessible through the SQL injection.

利用背景翻译中…

CVE-2020-37218 was published on May 13, 2026. Its severity is currently assessed as HIGH with a CVSS score of 8.2. Public proof-of-concept (POC) code is likely available given the nature of SQL injection vulnerabilities. There is no indication of active exploitation campaigns targeting this specific vulnerability at this time, but the ease of exploitation means it remains a potential target. Monitor security advisories and threat intelligence feeds for any updates.

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
互联网暴露

CVSS 向量

威胁情报· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N8.2HIGHAttack VectorNetwork攻击者如何到达目标Attack ComplexityLow利用漏洞所需的条件Privileges RequiredNone攻击所需的认证级别User InteractionNone是否需要受害者采取行动ScopeUnchanged超出受影响组件的影响范围ConfidentialityHigh敏感数据泄露风险IntegrityLow数据未授权篡改风险AvailabilityNone服务中断风险nextguardhq.com · CVSS v3.1 基础分数
这些指标意味着什么?
Attack Vector
网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
Attack Complexity
低 — 无需特殊条件,可以稳定地利用漏洞。
Privileges Required
无 — 无需认证,无需凭证即可利用。
User Interaction
无 — 攻击自动且无声,受害者无需任何操作。
Scope
未改变 — 影响仅限于脆弱组件本身。
Confidentiality
高 — 完全丧失机密性,攻击者可读取所有数据。
Integrity
低 — 攻击者可修改部分数据,影响有限。
Availability
无 — 无可用性影响。

弱点分类 (CWE)

时间线

  1. 发布日期

缓解措施和替代方案翻译中…

The recommended mitigation for CVE-2020-37218 is to immediately update the com_hdwplayer component to a patched version. If upgrading is not immediately feasible, consider implementing input validation and sanitization on the hdwplayersearch parameter to prevent SQL injection attempts. Web Application Firewalls (WAFs) configured with rules to detect and block SQL injection patterns targeting the hdwplayersearch parameter can provide an additional layer of defense. Monitor Joomla logs for suspicious SQL queries originating from external sources. After upgrading, confirm the vulnerability is resolved by attempting a test SQL injection payload via the hdwplayersearch parameter and verifying that it is properly sanitized.

修复方法翻译中…

暂无官方补丁。请查找临时解决方案或持续关注更新。

常见问题翻译中…

What is CVE-2020-37218 — SQL Injection in Joomla com_hdwplayer?

CVE-2020-37218 is a SQL Injection vulnerability affecting Joomla's com_hdwplayer component version 4.2. Attackers can inject malicious SQL code through the hdwplayersearch parameter to potentially extract sensitive data.

Am I affected by CVE-2020-37218 in Joomla com_hdwplayer?

You are affected if your Joomla website uses the com_hdwplayer component version 4.2 or earlier. Check your component version in the Joomla admin panel to determine your vulnerability status.

How do I fix CVE-2020-37218 in Joomla com_hdwplayer?

The recommended fix is to update the com_hdwplayer component to the latest available version. If immediate upgrade is not possible, implement input validation and WAF rules to mitigate the risk.

Is CVE-2020-37218 being actively exploited?

While there's no confirmed active exploitation, the ease of exploitation makes it a potential target. Continuous monitoring and prompt patching are crucial.

Where can I find the official Joomla advisory for CVE-2020-37218?

Refer to the official Joomla security announcements and advisories on the Joomla website for the latest information and updates regarding CVE-2020-37218: [https://security.joomla.org/]

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。

Joomla

检测此 CVE 是否影响你的项目

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。

live免费扫描

立即扫描您的Joomla项目 — 无需账户

上传任何清单文件 (composer.lock, package-lock.json, WordPress 插件列表…) 或粘贴您的组件列表。您立即获得一份漏洞报告。上传文件只是开始:拥有账户后,您将获得持续监控、Slack/电子邮件警报、多项目和白标报告。

手动扫描Slack/邮件提醒持续监控白标报告

拖放您的依赖文件

composer.lock、package-lock.json、requirements.txt、Gemfile.lock、pubspec.lock、Dockerfile...