Home / os / win7

Joomla Component com_jefaqpro Blind SQL Injection Vulnerabil

Posted on 31 August 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Joomla Component com_jefaqpro Blind SQL Injection Vulnerability</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>=============================================================== Joomla Component com_jefaqpro Blind SQL Injection Vulnerability =============================================================== Author : Chip D3 Bi0s Group : LatinHackTeam Email &amp; msn : chipdebios[at]gmail[dot]com Date : 2010-08-30 Critical Lvl : Moderate Impact : Exposure of sensitive information Where : From Remote --------------------------------------------------------------------------- Affected software description: ~~~~~~~~~~~~~~~~~~~~~~~~~~~ Application : JE FAQ Pro version : 1.5.0 Price : 1 year: 13.08$, 2 Year: 18.31$, 3 Year: 23.54$, 4 Year: 26.16$ Developer : J Extension License : GPLv2 or later type : Commercial Date Added : 28 August 2010 Download : http://www.jextn.com/joomla-faq-component-extensions-downloads/ Demo : http://www.joomla-faq-demo.jextn.com/ Description : JE FAQ Pro is an easy to use but powerful and excellent FAQ management. Our core competency from our front end and backend features will make you to sit suitable because we take care of your needs in the FAQ Joomla component needs. This is where we extending the suitability in Joomla. Multiple Blind SQL Injection http://site/path/index.php?option=com_jefaqpro&amp;view=category&amp;layout=categorylist&amp;catid=2[bsql] http://site/path/index.php?option=com_jefaqpro&amp;view=category&amp;layout=categorylist&amp;task=lists&amp;catid=2[bsql] +++++++++++++++++++++++++++++++++++++++ [!] Produced in South America +++++++++++++++++++++++++++++++++++++++ # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-08-31]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP