Home / os / win7

[webapps / 0day] - Joomla Component com_classified SQL Injec

Posted on 21 December 2010

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>Joomla Component com_classified SQL Injection Vulnerability | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='Joomla Component com_classified SQL Injection Vulnerability by R4dc0re in webapps / 0day | Inj3ct0r 1337 - exploit database : vulnerability : 0day : shellcode' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var _gaq = _gaq || [];_gaq.push(["_setAccount", "UA-12725838-1"]);_gaq.push(["_setDomainName", "none"]);_gaq.push(["_setAllowLinker", true]);_gaq.push(["_trackPageview"]);(function(){var ga = document.createElement("script"); ga.type = "text/javascript"; ga.async = true;ga.src = ("https:" == document.location.protocol ? "https://ssl" : "http://www") + ".google-analytics.com/ga.js";var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(ga, s);})();</script></head><body><pre>=========================================================== Joomla Component com_classified SQL Injection Vulnerability =========================================================== 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=1 3 3 3 _ __ __ ________ __ __ 3 7 /&#039; /&#039;__` /&#039;__` /\_____ / / 7 1 /\_, /\_L /\_L \/___//&#039;/&#039; \_ \____ 1 3 /_/ /_/_\_&lt;_/_/_\_&lt;_ /&#039; /&#039; /&#039;_` &#039;__` 3 3 / L / L /&#039; /&#039; / L L 3 7 \_ \____/ \____//\_/ \___,_ \_,__/ 7 1 /_//___/ /___/ // /__,_ //___/ 1 3 &gt;&gt; Exploit database separated by exploit 3 3 type (local, remote, DoS, etc.) 3 7 7 1 [+] Site : 1337db.com 1 3 [+] Support e-mail : submit[at]1337db.com 3 3 3 7 ########################################## 7 1 I&#039;m R4dc0re 1337 Member from 1337 DataBase 1 3 ########################################## 3 3 3 7-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-7 #Author: R4dc0re # Exploit Title: Joomla Component com_classified SQL Injection Vulnerable # Date: 21-12-2010 # Vendor or Software Link: http://www.truworthit.com # Category:WebApp # Demo Link:http://demo.truworthit.com/classified-demo/ # Contact: R4dc0re@yahoo.fr # Website: www.1337db.com # Greetings to: R0073r(1337db.com), L0rd CrusAd3r,Sid3^effects and to rest of the 1337db members ################################################################################################### Submit Your Exploit at Submit@1337db.com ################################################################################################### [Product Details] SEO classifieds script is a professionally developed PHP classifieds script that helps you to generate income from your website. Our new improved classifieds solution is based on Joomla(1.5x) and gives complete solution for all kind of classified business need. [Vulnerability] SQL Injection: http://demo.truworthit.com/classified-demo/index.php?option=com_classified&amp;view=ads&amp;name=[Code] ################################################################################################### # <a href='http://1337db.com/'>1337db.com</a> [2010-12-21]</pre></body></html>

 

TOP