Joomla! 'com_propertylab' Component 'id' Parameter Remote SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

The following example URI is available:

http://www.example.com/index.php?option=com_propertylab&task=showproperty&id=[SQLinjection]


 

Privacy Statement
Copyright 2010, SecurityFocus