vendor:
EasyBook
by:
ZAMUT
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: EasyBook
Affected Version From: 1.1
Affected Version To: 1.1
Patch Exists: Yes
Related CWE: N/A
CPE: a:joomla:easybook
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
Joomla Component EasyBook 1.1 SQL Injection Exploit
This exploit is for Joomla Component EasyBook 1.1. It is a SQL injection vulnerability that allows an attacker to gain access to the admin credentials. The exploit is done by sending a POST request to the index.php page with the option parameter set to com_easybook, Itemid set to 1, func set to deleteentry, gbid set to -1 union select 1,2,concat(0x3A3A3A,username,0x3a,password,0x3A3A3A),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19 from jos_users/* and md set to the md parameter. The response will contain the admin login, hash and salt.
Mitigation:
The best way to mitigate this vulnerability is to upgrade to the latest version of Joomla Component EasyBook.