Joomla! Component com_sobi2 2.9.3.2 - Blind SQL Injections

Author: jdc
type: webapps
platform: php
port: 
date_added: 2011-07-14  
date_updated: 2016-11-02  
verified: 1  
codes: OSVDB-73828  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 17530.txt  
# Exploit Title: SOBI2 2.9.3.2 Joomla! Component Blind SQL Injections
# Date: 13 July 2011
# Author: jdc
# Software Link: http://www.sigsiu.net
# Version: 2.9.3.2
# Fixed In: 2.9.4
# Verified: http://www.sigsiu.net/changelog as "# Bugfix: Blind SQL injection"

Versions prior to 2.9.4 suffer from a blind sql injection in both the "tag" and "letter" parameters. The request MUST reach the site with these parameters urlencoded for the injection to succeed.

POSTDATA: option=com_sobi2&tmpl=component&tag=[Encoded SQL]

POSTDATA: option=com_sobi2&tmpl=component&letter=[Encoded SQL]

Updated release: http://www.sigsiu.net/latest_news/sobi2_version_2.9.4_released.html