vendor:
Solidres
by:
Ihsan Sencan
9.8
CVSS
CRITICAL
SQL Injection
89
CWE
Product Name: Solidres
Affected Version From: 2.5.1
Affected Version To: 2.5.1
Patch Exists: YES
Related CWE: CVE-2018-5980
CPE: a:solidres:solidres:2.5.1
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: WiN7_x64/KaLiLinuX_x64
2018
Joomla! Component Solidres 2.5.1 – SQL Injection
Joomla! Component Solidres 2.5.1 is vulnerable to SQL Injection. An attacker can inject malicious SQL queries via the 'location', 'checkin', 'checkout', 'room_quantity', 'room_opt[1][adults]', 'room_opt[1][children]', 'task', 'start', 'Itemid', '9f3d70a896d5f1332174599ecac43607', 'ordering', 'direction', and 'type_id' parameters in the 'index.php/en/component/solidres/' URL. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.