1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 |
# Exploit Title: Joomla Component BF Quiz SQL Injection Vulnerability # Date: 29th May 2010 # Author: Valentin # Category: webapps/0day # Version: 1.3.0 # Tested on: Debian, Apache2, MySQL 5 # CVE : # Code : [:::::::::::::::::::::::::::::::::::::: 0x1 ::::::::::::::::::::::::::::::::::::::] >> General Information Advisory/Exploit Title = Joomla Component BF Quiz SQL Injection Vulnerability Author = Valentin Hoebel Contact = valentin@xenuser.org [:::::::::::::::::::::::::::::::::::::: 0x2 ::::::::::::::::::::::::::::::::::::::] >> Product information Name = BF Quiz Vendor = Tamlyn Creative Pty Ltd Vendor Website = http://www.tamlyncreative.com/software/ Affected Version(s) = 1.3.0 [:::::::::::::::::::::::::::::::::::::: 0x3 ::::::::::::::::::::::::::::::::::::::] >> SQL Injection Example URI = index.php?option=com_bfquiztrial&view=bfquiztrial&catid=[SQL Injection]&Itemid=62 [:::::::::::::::::::::::::::::::::::::: 0x4 ::::::::::::::::::::::::::::::::::::::] >> Additional Information Advisory/Exploit Published = 29th May 2010 I found this vulnerability while testing my new SQL injection vulnerability scanner. (Will be released soon!) Actually didn't find the vulnerability when I looked at this Joomla component for the first time, lol. [:::::::::::::::::::::::::::::::::::::: 0x5 ::::::::::::::::::::::::::::::::::::::] >> Misc Greetz && Thanks = inj3ct0r team, Exploit DB and hack0wn! Special Greetz = cr4wl3r and /JosS! <3 packetstormsecurity.org! [:::::::::::::::::::::::::::::::::::::: EOF ::::::::::::::::::::::::::::::::::::::] |