vendor:
mydyngallery
by:
Sina Yazdanmehr (R3d.W0rm)
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: mydyngallery
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
Joomla Component mydyngallery exploit
A SQL injection vulnerability exists in the Joomla Component mydyngallery, which allows an attacker to execute arbitrary SQL commands via the 'directory' parameter in a index.php?option=com_mydyngallery request. The attacker can use the 'union' keyword to append the results of a second query to the results of the first query, and can use the 'concat' keyword to concatenate strings together.
Mitigation:
Input validation should be used to prevent SQL injection attacks.