vendor:
Ignite Gallery
by:
H!tm@N
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Ignite Gallery
Affected Version From: 2000.8.3
Affected Version To: 2000.8.3
Patch Exists: NO
Related CWE: N/A
CPE: a:ignitejoomlaextensions:ignite_gallery:0.8.3
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
Joomla Component Ignite Gallery SQL Injection Vulnerability
An attacker can exploit this vulnerability by crafting a malicious SQL query and sending it to the vulnerable application. This can be done by appending the malicious SQL query to the vulnerable parameter in the request. This can allow the attacker to gain access to sensitive information stored in the database.
Mitigation:
Input validation should be used to prevent malicious SQL queries from being executed. Additionally, the application should be configured to use the least privileged user account with access to the database.