You run into this often due to search engine optimization (SEO).
For example, instead of the following:
http://www.com/index.phpoption=com_blahbla&Item=2&ItemId=5
You see:
http://www.website.com/index,51,blabla
or
http://website.com/guestbook/page2
In this type of scenario, one must examine the applicable source code.
A determination must be made about:
- Which component is currently active;
- Which parameter is applicable; and
- What their current values are.
On a Joomla based website the following code would be assessed:
<input type="hidden" name="option" value="com_blabla" />
<input type "hidden" name="ItemId" Value="5" />
<input type="hidden" name="Item" Value="2" />
<input type="hidden" Name="entry" Value="451" />
<input type="hidden" Name="view" Value="entries" />
Once this determination is made, the URL can be reconstructed to its original form and, if vulnerable, successfully exploited.
http://www.website.com/index.phpoption=com_blabla&Itemid=5&ItemId=2&Entry=451&View=Entries