vendor:
jsjobs
by:
qw3rTyTy
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: jsjobs
Affected Version From: 1.2.5
Affected Version To: 1.2.5
Patch Exists: N/A
Related CWE: N/A
CPE: a:joomsky:jsjobs
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Debian/nginx/joomla 3.9.0
2019
Joomla! component com_jsjobs – ‘customfields.php’ SQL Injection
Vulnerable code is in line 171 in file site/models/customfields.php, where an attacker can inject malicious SQL code into the 'child' parameter of the 'customfields.datafordepandantfield' task of the 'com_jsjobs' component. An example of a PoC is provided using sqlmap.py.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.