Joomla En-Masse 6.4 SQL Injection

2016.06.16
Credit: Hamed Izadi
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

# Exploit Title: Joomla com_enmasse - SQL Injection # Author: [ Hamed Izadi ] #IRAN # Vendor Homepage : http://extensions.joomla.org/extensions/extension/social-web/social-buy/en-masse # Category: [ Webapps ] # Tested on: [ Win ] # Versions: 5.1-6.4 # Date: 2016/06/15 # Google Dork: inurl:component/enmasse/ # PoC: # id Parameter Vulnerable To SQL # Demo: # http://example.com/component/enmasse/term?tmpl=component&id=2%27 # Youtube: https://youtu.be/LB5qVnXhzXE # L u Arg

References:

https://youtu.be/LB5qVnXhzXE


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top