vendor:
com_gsticketsystem
by:
Cyb3R-1sT
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: com_gsticketsystem
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: PHP
2020
Joomla com_gsticketsystem (catid) Blind SQL Injection Exploit
This exploit is used to gain access to the Joomla com_gsticketsystem (catid) by exploiting a blind SQL injection vulnerability. The exploit uses the 'catid' parameter to inject malicious SQL code into the database, which can then be used to extract the username and password of the user. The exploit is written in PHP and can be used with the command line.
Mitigation:
The best way to mitigate this vulnerability is to ensure that all user input is properly sanitized and validated before being used in any SQL queries.