vendor:
Joomla Component MisterEstate
by:
Anonymous
7,5
CVSS
HIGH
Blind SQL Injection
89
CWE
Product Name: Joomla Component MisterEstate
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: No
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020
Joomla Component MisterEstate Blind SQL Injection Exploit
This exploit is related to a Blind SQL Injection vulnerability in the Joomla Component MisterEstate. The exploit is used to extract the username and password of an administrator account by exploiting the vulnerability in the 'index.php?option=com_misterestate&act=mesearch&task=showMESR&tmpl=component' page. The exploit uses a loop to iterate through the characters of the username and password and then concatenates them to form the complete username and password.
Mitigation:
The best way to mitigate this vulnerability is to ensure that all user input is properly sanitized and validated before being used in a SQL query.