Joomla SOBI2 2.9.3.2 SQL Injection

2011.07.15
Credit: jdc
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

# Exploit Title: SOBI2 2.9.3.2 Joomla! Component Blind SQL Injections # Date: 13 July 2011 # Author: jdc # Software Link: http://www.sigsiu.net # Version: 2.9.3.2 # Fixed In: 2.9.4 # Verified: http://www.sigsiu.net/changelog as "# Bugfix: Blind SQL injection" Versions prior to 2.9.4 suffer from a blind sql injection in both the "tag" and "letter" parameters. The request MUST reach the site with these parameters urlencoded for the injection to succeed. POSTDATA: option=com_sobi2&tmpl=component&tag=[Encoded SQL] POSTDATA: option=com_sobi2&tmpl=component&letter=[Encoded SQL] Updated release: http://www.sigsiu.net/latest_news/sobi2_version_2.9.4_released.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top