This exploit demonstrates a SQL injection vulnerability in Joomla! Component VMap 1.9.6 via the 'latlngbound' parameter. The PoC includes a crafted HTTP GET request that triggers an XPATH syntax error, confirming the vulnerability.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Joomla! Component VMap 1.9.6
No auth needed
Prerequisites:Access to the target Joomla! instance with the vulnerable VMap component installed