header-logo
Suggest Exploit
vendor:
JE Auto
by:
Salvatore Fresta aka Drosophila
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: JE Auto
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:joomlaextensions.co.in:je_auto:1.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

JE Auto 1.0 SQL Injection Vulnerability

A parameter is not properly sanitised before being used in a SQL query. Input passed to 'char' parameter is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation requires that magic_quotes_gpc is set to Off.

Mitigation:

No fix.
Source

Exploit-DB raw data:

JE Auto 1.0 SQL Injection Vulnerability

 Name              JE Auto
 Vendor            http://joomlaextensions.co.in/extensions/components/je-auto.html
 Versions Affected 1.0

 Author            Salvatore Fresta aka Drosophila
 Website           http://www.salvatorefresta.net
 Contact           salvatorefresta [at] gmail [dot] com
 Date              2010-12-09

X. INDEX

 I.    ABOUT THE APPLICATION
 II.   DESCRIPTION
 III.  ANALYSIS
 IV.   SAMPLE CODE
 V.    FIX
 

I. ABOUT THE APPLICATION
________________________

JE Auto is a commercial Joomla's component.


II. DESCRIPTION
_______________

A parameter is not properly sanitised before  being used
in a SQL query.


III. ANALYSIS
_____________

Summary:

 A) SQL Injection
 

A) SQL Injection
________________

Input  passed   to   "char"  parameter  is  not  properly
sanitised before being used in a SQL query.  This  can be
exploited  to  manipulate  SQL   queries   by   injecting
arbitrary SQL code.

Successful exploitation requires that magic_quotes_gpc is
set to Off.


IV. SAMPLE CODE
_______________

A) SQL Injection

http://site/path/index.php?option=com_jeauto&catid=1&item=1&Itemid=3&view=item&char=' UNION SELECT 1,2,3,4,5,6,7,8,9,10,11,12,13,14%23


V. FIX
______

No fix.