SQL injection vulnerability in ttvideo.php in the TTVideo (com_ttvideo) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the cid parameter in a video action to index.php.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
http://www.toughtomato.com/downloads/16-comttvideo-1-0-1/file | url repurposed |
http://adv.salvatorefresta.net/TTVideo_1.0_Joomla_Component_SQL_Injection_Vulnerability-27072010.txt | exploit |
http://www.exploit-db.com/exploits/14481 | exploit |
http://www.securityfocus.com/archive/1/512685/100/0/threaded | mailing list |
http://www.securityfocus.com/archive/1/512709/100/0/threaded | mailing list |
http://secunia.com/advisories/40716 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/60662 | vdb entry |
http://osvdb.org/66630 | vdb entry exploit |