Description
SQL injection vulnerability in Joovili 3.0 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) view.blog.php, (2) view.event.php, (3) view.group.php, (4) view.music.php, (5) view.picture.php, and (6) view.video.php.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by ~!Dok_tOR!~ · textwebappsphp
https://www.exploit-db.com/exploits/6595
References (4)
Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/45486
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/6595
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/31444
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/4486
Scores
EPSS
0.0041
EPSS Percentile
61.7%
Details
CWE
CWE-89
Status
published
Products (3)
joovili/joovili
2.1
joovili/joovili
3.0.6
joovili/joovili
< 3.0
Published
Oct 23, 2008
Tracked Since
Feb 18, 2026