header-logo
Suggest Exploit
vendor:
MaQma Helpdesk
by:
Ihsan Sencan
8,8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: MaQma Helpdesk
Affected Version From: 4.2.7
Affected Version To: 4.2.7
Patch Exists: NO
Related CWE: N/A
CPE: a:componentslab:maqma_helpdesk:4.2.7
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Win7 x64, Kali Linux x64
2017

Joomla! Component MaQma Helpdesk v4.2.7 – SQL Injection

A SQL injection vulnerability exists in Joomla! Component MaQma Helpdesk v4.2.7. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in the back-end database. This can potentially result in the manipulation or disclosure of application data.

Mitigation:

Input validation should be used to prevent SQL injection attacks. Parameterized queries should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

# # # # # 
# Exploit Title: Joomla! Component MaQma Helpdesk v4.2.7 - SQL Injection
# Google Dork: inurl:index.php?option=com_maqmahelpdesk
# Date: 20.02.2017
# Vendor Homepage: http://componentslab.com/
# Software Buy: https://extensions.joomla.org/extensions/extension/clients-a-communities/help-desk/maqma-helpdesk/
# Demo: http://demo.componentslab.com/index.php/department/software-support
# Version: 4.2.7
# Tested on: Win7 x64, Kali Linux x64
# # # # # 
# Exploit Author: Ihsan Sencan
# Author Web: http://ihsan.net
# Author Mail : ihsan[@]ihsan[.]net
# # # # #
# SQL Injection/Exploit :
# http://localhost/[PATH]/index.php?option=com_maqmahelpdesk&task=pdf_kb&id=[SQL]
# # # # #