CVE-2009-3063

com_gameserver 1.0 for Joomla! - SQL Injection via id Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2009-3063. PoCs published by v3n0m.

AI-analyzed exploit summary This exploit demonstrates a SQL injection vulnerability in Joomla Component com_gameserver 1.0. The PoC uses a crafted URL to extract user credentials from the database via a UNION-based SQL injection.

Description

SQL injection vulnerability in the Game Server (com_gameserver) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a gamepanel action to index.php.

Exploits (1)

exploitdb WORKING POC VERIFIED
by v3n0m · textwebappsphp
https://www.exploit-db.com/exploits/9571

This exploit demonstrates a SQL injection vulnerability in Joomla Component com_gameserver 1.0. The PoC uses a crafted URL to extract user credentials from the database via a UNION-based SQL injection.

Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: Joomla Component com_gameserver 1.0
No auth needed
Prerequisites: Target must have the vulnerable Joomla component installed and accessible
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (3)

Core 3
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/36213
Exploit, Third Party Advisory exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/9571
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2009/2523

Scores

EPSS 0.0032
EPSS Percentile 55.5%

Details

CWE
CWE-89
Status published
Products (1)
indianpulses/com_gameserver 1.0
Published Sep 03, 2009
Tracked Since Feb 18, 2026