cve/2015/CVE-2015-7857.md

38 lines
1.8 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2015-7857](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7857)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
SQL injection vulnerability in the getListQuery function in administrator/components/com_contenthistory/models/history.php in Joomla! 3.2 before 3.4.5 allows remote attackers to execute arbitrary SQL commands via the list[select] parameter to index.php.
### POC
#### Reference
- http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html
- http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html
- https://www.exploit-db.com/exploits/38797/
- https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CCrashBandicot/ContentHistory
- https://github.com/Ciber1401/Mai
- https://github.com/Jahismighty/maltrail
- https://github.com/JustF0rWork/malware
- https://github.com/Mezantrop74/MAILTRAIL
- https://github.com/Pythunder/maltrail
- https://github.com/RsbCode/maltrail
- https://github.com/Youhoohoo/maltrail-iie
- https://github.com/a-belard/maltrail
- https://github.com/areaventuno/exploit-joomla
- https://github.com/dhruvbhaiji/Maltrail-IDS
- https://github.com/hxp2k6/https-github.com-stamparm-maltrail
- https://github.com/khanzjob/maltrail
- https://github.com/mukarramkhalid/joomla-sqli-mass-exploit
- https://github.com/rsumner31/maltrail
- https://github.com/stamparm/maltrail
- https://github.com/yasir27uk/maltrail