Skip to content

Injection: Joomla departments - SQL Injection

Identifier: joomla_department_sqli

Scanner(s) Support

GraphQL Scanner REST Scanner WebApp Scanner ASM Scanner

Description

Joomla! com_departments parameter contains a SQL injection vulnerability, allowing attackers to obtain sensitive information from databases, modify data, and execute unauthorized administrative operations.

How we test: We test for SQL injection vulnerabilities in Joomla com_departments by injecting malicious SQL payloads into the parameter and analyzing responses to detect if SQL queries are executed.

Reference:

Configuration

Example

Example configuration:

---
security_tests:
  joomla_department_sqli:
    skip: false

Reference

skip

Type : boolean

Skip the test if true.