EXPLOITDB-EDB-35839

EXPLOITDB text VERIFIED WORKING POC
Exploit for EIP-2026-108788 - Joomla! Component Minitek FAQ Book 1.3 - 'id' SQL Injection
AI Analysis

This exploit demonstrates an SQL injection vulnerability in Joomla Minitek FAQ Book by injecting a UNION-based query to extract user credentials from the database. The PoC is a direct URL manipulation example targeting unsanitized input in the 'id' parameter.

Attack Type
SQLi
Complexity
trivial
Reliability
reliable
MITRE ATT&CK
T1189 - Drive-by Compromise T1505 - Server Software Component
Loading exploit code...
Download ZIP Password: eip
Source
Platform Exploitdb
Type webapps
Platform php
Language text
Files 1
Authors
kaMtiEz
Vulnerability
EIP-2026-108788
Joomla! Component Minitek FAQ Book 1.3 - 'id' SQL Injection