header-logo
Suggest Exploit
vendor:
JSupport
by:
Valentin Hoebel
N/A
CVSS
N/A
SQL Injection
89
CWE
Product Name: JSupport
Affected Version From: 1.5.6
Affected Version To: 1.5.6
Patch Exists: Unknown
Related CWE: Unknown
CPE: a:extension_depot:jsupport
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2010

Joomla Component com_jsupport SQL Injection Vulnerability

This vulnerability can be found by viewing the component in the Joomla administrator backend. Examples: administrator/index.php?option=com_jsupport&task=listTicketsα=[SQL Injection] administrator/index.php?option=com_jsupport&task=listFaqsα=[SQL Injection]

Mitigation:

Input validation and sanitization should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

# Exploit Title: Joomla Component com_jsupport SQL Injection Vulnerability
# Date: 12.11.2010
# Author: Valentin
# Category: webapps/0day
# Version: 1.5.6
# Tested on:
# CVE :  
# Code : 

[:::::::::::::::::::::::::::::::::::::: 0x1 ::::::::::::::::::::::::::::::::::::::]
>> General Information 
Advisory/Exploit Title = Joomla Component com_jsupport SQL Injection Vulnerability
Author = Valentin Hoebel
Contact = valentin@xenuser.org

[:::::::::::::::::::::::::::::::::::::: 0x2 ::::::::::::::::::::::::::::::::::::::]
>> Product information
Name = JSupport
Vendor = Extension Depot
Vendor Website = http://www.extensiondepot.com/extensions/jsupport.html
Affected Version(s) = 1.5.6
 
[:::::::::::::::::::::::::::::::::::::: 0x3 ::::::::::::::::::::::::::::::::::::::]
>> SQL Injection
This vulnerability can be found by viewing the component in the Joomla administrator
backend.

Examples:
administrator/index.php?option=com_jsupport&task=listTicketsα=[SQL Injection]
administrator/index.php?option=com_jsupport&task=listFaqsα=[SQL Injection]

[:::::::::::::::::::::::::::::::::::::: 0x4 ::::::::::::::::::::::::::::::::::::::]
>> Additional Information
Advisory/Exploit Published = 12.11.2010

[:::::::::::::::::::::::::::::::::::::: 0x5 ::::::::::::::::::::::::::::::::::::::]
>> Misc
Greetz = cr4wl3r, JosS, packetstormsecurity.org, exploit-db.com

[:::::::::::::::::::::::::::::::::::::: EOF ::::::::::::::::::::::::::::::::::::::]