CVE-2008-1935

Joomla Filiale 1.0.4 - SQL Injection via idFiliale Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-1935. PoCs published by str0xo.

AI-analyzed exploit summary This exploit demonstrates a SQL injection vulnerability in the Joomla Filiale component (version 1.0.4). The PoC provides a crafted URL that extracts user credentials (username and password) from the jos_users table via a UNION-based SQL injection.

Description

SQL injection vulnerability in the Filiale 1.0.4 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the idFiliale parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by str0xo · textwebappsphp
https://www.exploit-db.com/exploits/5488

This exploit demonstrates a SQL injection vulnerability in the Joomla Filiale component (version 1.0.4). The PoC provides a crafted URL that extracts user credentials (username and password) from the jos_users table via a UNION-based SQL injection.

Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: Joomla Filiale Component 1.0.4
No auth needed
Prerequisites: Target running Joomla with the vulnerable Filiale component · Component accessible via URL
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (4)

Core 4
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/28900
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2008/1346/references
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/41980
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5488

Scores

EPSS 0.0003
EPSS Percentile 7.6%

Details

CWE
CWE-89
Status published
Products (1)
joomla/joomla 1.0.4
Published Apr 25, 2008
Tracked Since Feb 18, 2026