Joomla SimplestForum 1.5 SQL Injection

Joomla SimplestForum component version 1.5 suffers from a remote SQL injection vulnerability.


MD5 | fd2f8dd54bdee577e0c52a28106e8ca0

####################################################################

# Exploit Title : Joomla SimplestForum Components 1.5 SQL Injection
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 31/01/2019
# Vendor Homepage : joomlacode.org ~ simplestforum.org
# Software Download Link : joomfans.com/joomla-components/simplest-forum-multilanguage-joomla-15.html
# Software Information Link : joomlacode.org/gf/project/simplestforum/
# Software Version : 1.5
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Google Dorks : inurl:''/index.php?option=com_simplestforum''
intext:Designed by Methealth Administrators Namibia.
# Vulnerability Type : CWE-89 [ Improper Neutralization of
Special Elements used in an SQL Command ('SQL Injection') ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos

####################################################################

# Description about Software :
***************************
Simplest Forum Joomla! is simplest and easiest to use forum component. It

provides a super basic interface for both users and administrators while

still being useful. Simplest Forum is Joomla! 1.5's first fully native forum.

####################################################################

# Impact :
***********

* An attacker might be able inject and/or alter existing

SQL statements which would influence the database exchange.

* SQL injection vulnerability in the Joomla SimplestForum Components 1.5 because,

it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

* On the other hand, this component simplestforum for Joomla! allows

remote attackers to execute arbitrary SQL commands

via the " view= forumId= Itemid= limitstart= parentId= "

with different parameters action to index.php.

* Exploiting this issue could allow an attacker to compromise the application, read,

access or modify data, or exploit latent vulnerabilities in the underlying database.

If the webserver is misconfigured, read & write access to the filesystem may be possible.

####################################################################

# SQL Injection Exploit :
**********************

/index.php?option=com_simplestforum&view=[SQL Injection]

/index.php?option=com_simplestforum&view=postlist&forumId=[SQL Injection]

/index.php?option=com_simplestforum&view=forumlist&Itemid=[SQL Injection]

/index.php?option=com_simplestforum&view=postlist&forumId=[ID-NUMBER]&Itemid=[SQL Injection]

/index.php?option=com_simplestforum&view=postlist&forumId=[ID-NUMBER]&&limitstart=[SQL Injection]

/index.php?option=com_simplestforum&view=postlist&topic=true&forumId=[ID-NUMBER]&parentId=[SQL Injection]

/index.php?option=com_simplestforum&view=postlist&forumId=[ID-NUMBER]&parentId=[ID-NUMBER]&topic=true&Itemid=[SQL Injection]

####################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team

####################################################################

Related Posts