The exploit demonstrates an SQL injection vulnerability in Gary's Cookbook module for Joomla! and Mambo. It leverages unsanitized user input in the 'id' parameter to extract usernames and password hashes from the 'mos_users' table via a UNION-based SQLi attack.
Classification
Working Poc 90%
Target:
Gary's Cookbook module for Joomla! and Mambo
No auth needed
Prerequisites:
Target must have Gary's Cookbook module installed · SQL error messages must be visible or blind SQLi techniques must be applicable