Joomla! Component com_sobi2 2.9.3.2 – Blind SQL Injections

  • 作者: jdc
    日期: 2011-07-14
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/17530/
  • # Exploit Title: SOBI2 2.9.3.2 Joomla! Component Blind SQL Injections
    # Date: 13 July 2011
    # Author: jdc
    # Software Link: http://www.sigsiu.net
    # Version: 2.9.3.2
    # Fixed In: 2.9.4
    # Verified: http://www.sigsiu.net/changelog as "# Bugfix: Blind SQL injection"
    
    Versions prior to 2.9.4 suffer from a blind sql injection in both the "tag" and "letter" parameters. The request MUST reach the site with these parameters urlencoded for the injection to succeed.
    
    POSTDATA: option=com_sobi2&tmpl=component&tag=[Encoded SQL]
    
    POSTDATA: option=com_sobi2&tmpl=component&letter=[Encoded SQL]
    
    Updated release: http://www.sigsiu.net/latest_news/sobi2_version_2.9.4_released.html