Description
Joomla J2 JOBS 1.3.0 contains an authenticated SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the 'sortby' parameter. Attackers can send POST requests to the administrator index with malicious 'sortby' values to extract sensitive database information.
Problem types
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
Credits
Mehmet Kelepçe / Gais Cyber Security
References
www.exploit-db.com/exploits/48648 (ExploitDB-48648)
joomsky.com/ (Official Product Homepage)
joomsky.com/products/js-jobs-pro.html (Product Reference)
www.vulncheck.com/...-authenticated-sql-injection-via-sortby (VulnCheck Advisory: Joomla J2 JOBS 1.3.0 Authenticated SQL Injection via sortby)