The provided text describes SQL injection vulnerabilities in Joomla! 1.6.0, detailing example URIs that exploit insufficient input sanitization in the 'filter_order' and 'filter_order_Dir' parameters. It references a security advisory but does not include functional exploit code.
Classification
Writeup 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Joomla! 1.6.0
No auth needed
Prerequisites:Access to a vulnerable Joomla! instance