header-logo
Suggest Exploit
vendor:
Classified component
by:
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Classified component
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Joomla! Classified Component SQL Injection

The Joomla! Classified component is prone to an SQL-injection vulnerability. This vulnerability occurs because the component fails to properly sanitize user-supplied input before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries, which may allow them to bypass the authentication mechanism and gain unauthorized access to the application or the underlying database. This could lead to the compromise of sensitive information, data modification, or the exploitation of other latent vulnerabilities in the database.

Mitigation:

To mitigate this vulnerability, it is recommended to apply the latest security patches provided by the Joomla! project. Additionally, input validation and sanitization should be implemented to prevent SQL injection attacks.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/45545/info

The Classified component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. 

http://www.example.com/classified-demo/index.php?option=com_classified&view=ads&name=[SQLi]