Joomla BF Survey Pro component version 2.13.1 suffers from a remote SQL injection vulnerability.
3ec5a8d7a45b0c2de951bb55feb46c02
####################################################################
# Exploit Title : Joomla BF Survey Pro Components 2.13.1 SQL Injection
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 04/02/2019
# Vendor Homepage : tamlynsoftware.com
# Software Download Link : tamlynsoftware.com/joomla-surveys.html
# Software Information Link : extensions.joomla.org/extension/bf-survey/
# Software Version : 2.13.1
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Google Dorks : inurl:''/index.php?option=com_bfsurvey_pro''
# Vulnerability Type : CWE-89 [ Improper Neutralization of
Special Elements used in an SQL Command ('SQL Injection') ]
# Old Similar CVE [ Only Version is Different ] : CVE-2010-2255
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
####################################################################
# Description about Software :
***************************
This Joomla Survey Extension will allow you to create professional looking surveys in
your own Joomla environment. Unlike some online survey solutions, with
BF Survey you retain full control over your data, and can customise
to suit whatever your needs are. It can be as simple as creating a survey
category, adding quesitons, then add your menu item. Or if you have more
complex needs, you can use this software to do some really fancy stuff
such as showing or hiding questions based on previous question responses.
####################################################################
# Impact :
***********
Joomla BF Survey Pro 2.13.1 component for Joomla is prone to an SQL-injection
vulnerability because it fails to sufficiently sanitize user-supplied
data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application,
access or modify data, or exploit latent vulnerabilities in the underlying database.
A remote attacker can send a specially crafted request to the vulnerable application
and execute arbitrary SQL commands in application`s database.
This vulnerability could potentially allow remote attackers to execute arbitrary
SQL commands, and manipulate database contents to gain administration
access to the vulnerable application.
Further exploitation of this vulnerability may result in unauthorized data manipulation.
An attacker can exploit this issue using a browser.
####################################################################
# SQL Injection Exploit :
**********************
/index.php?lang=es&option=com_bfsurvey_pro&Itemid=[SQL Injection]
/index.php?option=com_bfsurvey_pro&view=sayg&catid=[ID-NUMBER]&Itemid=[SQL Injection]
####################################################################
# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
####################################################################