Title: Multiple SQL Injection in JNews Joomla Component
CVE ID: CVE-2015-7342
CVSSv3 Base Score: 6.6 (AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L)
Vendor: Joobi
Products: JNews Core(8.3.1)
Advisory Release Date: 28 October 2015
Advisory URL: https://labs.integrity.pt/advisories/cve-2015-7342
Credits: Discovery by Fábio Pires <fp[at]integrity.pt>, Filipe Reis <fr[at]integrity.pt>, Vitor Oliveira <vo[at]integrity.pt>
JNews component is vulnerable to Multiple SQL Injection, inside the backoffice.
#1 - SQL Injection (error based):
To replicate the issue go to:
With this we get the following response (as you can see on the response we broke the SQL query):
Now we inject with our SQL query into the parameter filename:
And we get the response with the proof.
#2 - SQL Injection (error based):
To replicate the issue go to:
Do a search and grab the request, the injection point is the parameter mailingsearch:
With this we get the following response (as you can see on the response we broke the SQL query):
Now we inject with our SQL query into the parameter mailingsearch:
And we get the response with the proof.
#3 - SQL Injection (error based):
To replicate the issue go to:
Do a search and grab the request, the injection point is the parameter emailsearch:
With this we get the following response (as you can see on the response we broke the SQL query):
Now we inject with our SQL query into the parameter emailsearch:
And we get the response with the proof.
© 2024 INTEGRITY S.A. All rights reserved. | Cookie Policy