Joomla! 'com_crhotels' Component 'catid' Parameter Remote SQL Injection Vulnerability
BID:51728
Info
Joomla! 'com_crhotels' Component 'catid' Parameter Remote SQL Injection Vulnerability
| Bugtraq ID: | 51728 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Jan 31 2012 12:00AM |
| Updated: | Jan 31 2012 12:00AM |
| Credit: | the_cyber_nuxbie |
| Vulnerable: |
Joomla com_crhotels 0 |
| Not Vulnerable: | |
Discussion
Joomla! 'com_crhotels' Component 'catid' Parameter Remote SQL Injection Vulnerability
The 'com_crhotels' component for Joomla! is prone to a remote SQL injection vulnerability.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
The 'com_crhotels' component for Joomla! is prone to a remote SQL injection vulnerability.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Exploit / POC
Joomla! 'com_crhotels' Component 'catid' Parameter Remote SQL Injection Vulnerability
Attackers can use a browser to exploit this issue.
The following example URI is available:
http://www.example.com/index.php?option=com_crhotels&view=cate&catid=[SQL Injection]
Attackers can use a browser to exploit this issue.
The following example URI is available:
http://www.example.com/index.php?option=com_crhotels&view=cate&catid=[SQL Injection]
Solution / Fix
Joomla! 'com_crhotels' Component 'catid' Parameter Remote SQL Injection Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
Joomla! 'com_crhotels' Component 'catid' Parameter Remote SQL Injection Vulnerability
References:
References:
- Home page (Joomla!)