Description
SQL injection vulnerability in the JP Jobs (com_jp_jobs) component 1.4.1 and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action to index.php.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Valentin · textwebappsphp
https://www.exploit-db.com/exploits/12037
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/57500
Exploit x_refsource_misc
http://packetstormsecurity.org/1004-exploits/joomlajpjobs-sql.txt
Exploit x_refsource_misc
http://www.xenuser.org/documents/security/joomla_com_jp_jobs_sql.txt
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/39191
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/12037
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/39325
Scores
EPSS
0.0191
EPSS Percentile
83.4%
Details
CWE
CWE-89
Status
published
Products (3)
joomlaprojects/com_jp_jobs
1.3.0
joomlaprojects/com_jp_jobs
1.3.1
joomlaprojects/com_jp_jobs
< 1.4.1
Published
Apr 12, 2010
Tracked Since
Feb 18, 2026