Skip to content

Conversation

@wongwaituck
Copy link
Contributor

An SQL injection vulnerability exists in Joomla! versions 3.7.x before 3.7.1, which allows unauthenticated users to execute arbitrary SQL commands. I wanted to write an SQLi related script to see how it can be integrated into a library, hence this script was written.

This script checks if the com_fields is injectable by running the information function user(). If the username and hostname is returned, website is vulnerable.

A video of the script in action can be found here.

@nmap-bot nmap-bot closed this in 5096438 Jun 26, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants