CVE-2008-4711

Joovili < 3.0 - SQL Injection

Title source: rule
STIX 2.1

Description

SQL injection vulnerability in Joovili 3.0 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) view.blog.php, (2) view.event.php, (3) view.group.php, (4) view.music.php, (5) view.picture.php, and (6) view.video.php.

Exploits (1)

exploitdb WORKING POC VERIFIED
by ~!Dok_tOR!~ · textwebappsphp
https://www.exploit-db.com/exploits/6595

References (4)

Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/45486
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/6595
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/31444
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/4486

Scores

EPSS 0.0041
EPSS Percentile 61.7%

Details

CWE
CWE-89
Status published
Products (3)
joovili/joovili 2.1
joovili/joovili 3.0.6
joovili/joovili < 3.0
Published Oct 23, 2008
Tracked Since Feb 18, 2026