[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Joomla com_enmasse - SQL Injection
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: Joomla com_enmasse - SQL Injection
- From: hamedizadi@xxxxxxxxx
- Date: Wed, 15 Jun 2016 01:27:33 GMT
# Exploit Title: Joomla com_enmasse - SQL Injection
# Author: [ Hamed Izadi ]
#IRAN
# Vendor Homepage :
http://extensions.joomla.org/extensions/extension/social-web/social-buy/en-masse
# Category: [ Webapps ]
# Tested on: [ Win ]
# Versions: 5.1-6.4
# Date: 2016/06/15
# Google Dork: inurl:component/enmasse/
# PoC:
# id Parameter Vulnerable To SQL
# Demo:
# http://example.com/component/enmasse/term?tmpl=component&id=2%27
# Youtube: https://youtu.be/LB5qVnXhzXE
# L u Arg