46230.rar
SQL Injection (SQLi) via the 'type' parameter. Author: Ihsan Sencan. Disclosure Date: January 23, 2019. Platform: PHP-based web applications. Analysis of the Exploit (46230.rar Content)
To protect against this vulnerability, administrators should take the following steps: 46230.rar
Joomla! Component J-BusinessDirectory version 4.9.7. SQL Injection (SQLi) via the 'type' parameter
The package typically contains the source code or automation scripts required to demonstrate the vulnerability. In this specific case, the SQL injection allows an unauthenticated remote attacker to execute arbitrary SQL commands. Platform: PHP-based web applications
Complete extraction of the Joomla! database, including user credentials, configuration data, and business directory listings.
Potential for an attacker to escalate privileges and become a database or site administrator.
Configure the database user account used by the Joomla! application with least-privilege access to limit the damage a compromised account can do. Joomla! Component J-BusinessDirectory 4.9.7 - Exploit-DB