Joomla RSfiles SQL Injection Vulnerabilities

Summary
This host is installed with Joomla RSfiles and is prone to sql injection vulnerabilities.
Impact
Successful exploitation will allow remote attackers to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data. Impact Level: Application
Solution
Upgrade to Joomla RSfiles REV 12 or later. For updates refer http://www.rsjoomla.com/joomla-extensions/joomla-download-manager.html
Insight
Input passed via the 'cid' GET parameter to index.php (when 'option' is set to 'com_rsfiles', 'view' is set to 'files', 'layout' is set to 'agreement', and 'tmpl' is set to 'component') is not properly sanitised before being used in a SQL query.
Affected
Joomla RSfiles
References