Joomla! Component JE Gallery 1.3 – ‘photo_id’ SQL Injection

  • 作者: Ihsan Sencan
    日期: 2017-02-13
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/41331/
  • # # # # # 
    # Exploit Title: Joomla! Component JE Gallery v1.3 - SQL Injection
    # Google Dork: inurl:index.php?option=com_jegallery
    # Date: 13.02.2017
    # Vendor Homepage: http://www.joomlaextension.biz/
    # Software Buy: https://extensions.joomla.org/extensions/extension/photos-a-images/galleries/je-gallery/
    # Demo: http://www.joomlaextension.biz/demo/
    # Version: 1.3
    # Tested on: Win7 x64, Kali Linux x64
    # # # # # 
    # Exploit Author: Ihsan Sencan
    # Author Web: http://ihsan.net
    # Author Mail : ihsan[@]ihsan[.]net
    # # # # #
    # SQL Injection/Exploit :
    # http://localhost/[PATH]/index.php?option=com_jegallery&view=photo_detail&photo_id=[SQL]
    # # # # #