vendor:
mygallery Joomla Component
by:
HouSSamix From H-T TeaM
9
CVSS
HIGH
Remote SQL Injection
89
CWE
Product Name: mygallery Joomla Component
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
Joomla Component mygallery Remote SQL Injection Exploit
The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'cid' parameter to the 'index.php' script. A remote attacker can execute arbitrary SQL commands in application's database, cause denial of service, access or modify sensitive data, exploit vulnerabilities in the underlying database and in certain cases execute arbitrary code on the system.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All input data should be validated and filtered, and special characters should be escaped before being passed to the database.