Description
Joomla! extension EkRishta 2.10 contains persistent cross-site scripting and SQL injection vulnerabilities that allow attackers to inject malicious code through profile fields and POST parameters. Attackers can inject script payloads in profile information fields like Address that execute when users visit the profile, or submit SQL injection payloads via the phone_no parameter to the user_setting endpoint to manipulate database queries.
Problem types
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
Credits
Sina Kheirkhah || (Sina.For.Sec@gmail.com)
References
www.exploit-db.com/exploits/44660 (ExploitDB-44660)
www.joomlaextensions.co.in/ (Official Product Homepage)
extensions.joomla.org/...g/dating-a-relationships/ek-rishta/ (Product Reference)
www.vulncheck.com/...rishta-persistent-xss-and-sql-injection (VulnCheck Advisory: Joomla! EkRishta 2.10 Persistent XSS and SQL Injection)