Joomla SimplestForum component version 1.5 suffers from a remote SQL injection vulnerability.
fd2f8dd54bdee577e0c52a28106e8ca0
####################################################################
# Exploit Title : Joomla SimplestForum Components 1.5 SQL Injection
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 31/01/2019
# Vendor Homepage : joomlacode.org ~ simplestforum.org
# Software Download Link : joomfans.com/joomla-components/simplest-forum-multilanguage-joomla-15.html
# Software Information Link : joomlacode.org/gf/project/simplestforum/
# Software Version : 1.5
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Google Dorks : inurl:''/index.php?option=com_simplestforum''
intext:Designed by Methealth Administrators Namibia.
# Vulnerability Type : CWE-89 [ Improper Neutralization of
Special Elements used in an SQL Command ('SQL Injection') ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
####################################################################
# Description about Software :
***************************
Simplest Forum Joomla! is simplest and easiest to use forum component. It
provides a super basic interface for both users and administrators while
still being useful. Simplest Forum is Joomla! 1.5's first fully native forum.
####################################################################
# Impact :
***********
* An attacker might be able inject and/or alter existing
SQL statements which would influence the database exchange.
* SQL injection vulnerability in the Joomla SimplestForum Components 1.5 because,
it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
* On the other hand, this component simplestforum for Joomla! allows
remote attackers to execute arbitrary SQL commands
via the " view= forumId= Itemid= limitstart= parentId= "
with different parameters action to index.php.
* Exploiting this issue could allow an attacker to compromise the application, read,
access or modify data, or exploit latent vulnerabilities in the underlying database.
If the webserver is misconfigured, read & write access to the filesystem may be possible.
####################################################################
# SQL Injection Exploit :
**********************
/index.php?option=com_simplestforum&view=[SQL Injection]
/index.php?option=com_simplestforum&view=postlist&forumId=[SQL Injection]
/index.php?option=com_simplestforum&view=forumlist&Itemid=[SQL Injection]
/index.php?option=com_simplestforum&view=postlist&forumId=[ID-NUMBER]&Itemid=[SQL Injection]
/index.php?option=com_simplestforum&view=postlist&forumId=[ID-NUMBER]&&limitstart=[SQL Injection]
/index.php?option=com_simplestforum&view=postlist&topic=true&forumId=[ID-NUMBER]&parentId=[SQL Injection]
/index.php?option=com_simplestforum&view=postlist&forumId=[ID-NUMBER]&parentId=[ID-NUMBER]&topic=true&Itemid=[SQL Injection]
####################################################################
# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
####################################################################