Description
SQL injection vulnerability in the Freestyle FAQs Lite (com_fsf) component, possibly 1.3, for Joomla! allows remote attackers to execute arbitrary SQL commands via the faqid parameter in an faq action to index.php.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Chip d3 bi0s · textwebappsphp
https://www.exploit-db.com/exploits/12078
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/57588
Exploit x_refsource_misc
http://packetstormsecurity.org/1004-exploits/joomlafreestyle-sql.txt
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/39220
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/12078
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/39288
Scores
EPSS
0.0033
EPSS Percentile
55.9%
Details
CWE
CWE-89
Status
published
Products (1)
freestyle/faqs_lite
1.3
Published
Apr 26, 2010
Tracked Since
Feb 18, 2026