header-logo
Suggest Exploit
vendor:
Joomla Component PayPal IPN for DOCman
by:
Ihsan Sencan
8,8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Joomla Component PayPal IPN for DOCman
Affected Version From: 3.1
Affected Version To: 3.1
Patch Exists: NO
Related CWE: N/A
CPE: a:shopfiles:joomla_component_paypal_ipn_for_docman:3.1
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Win7 x64, Kali Linux x64
2017

Joomla! Component PayPal IPN for DOCman v3.1 – SQL Injection

A SQL injection vulnerability exists in Joomla! Component PayPal IPN for DOCman v3.1, which allows an attacker to inject malicious SQL queries via the 'id' parameter in the 'addToCart' task. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code in the 'id' parameter.

Mitigation:

Input validation should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

# # # # # 
# Exploit Title: Joomla! Component PayPal IPN for DOCman v3.1 - SQL Injection
# Google Dork: inurl:index.php?option=com_docmanpaypal
# Date: 20.02.2017
# Vendor Homepage: http://shopfiles.com/
# Software Buy: https://extensions.joomla.org/extensions/extension/extension-specific/docman-extensions/paypal-ipn-for-docman/
# Demo: http://demo.shopfiles.com/index.php/paypal-ipn-for-docman
# Version: 3.1
# Tested on: Win7 x64, Kali Linux x64
# # # # # 
# Exploit Author: Ihsan Sencan
# Author Web: http://ihsan.net
# Author Mail : ihsan[@]ihsan[.]net
# # # # #
# SQL Injection/Exploit :
# http://localhost/[PATH]/index.php?option=com_docmanpaypal&task=addToCart&id=[SQL]
# # # # #