### [CVE-2015-7857](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7857) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description SQL injection vulnerability in the getListQuery function in administrator/components/com_contenthistory/models/history.php in Joomla! 3.2 before 3.4.5 allows remote attackers to execute arbitrary SQL commands via the list[select] parameter to index.php. ### POC #### Reference - http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html - http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html - https://www.exploit-db.com/exploits/38797/ - https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/ #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CCrashBandicot/ContentHistory - https://github.com/Ciber1401/Mai - https://github.com/Jahismighty/maltrail - https://github.com/JustF0rWork/malware - https://github.com/Mezantrop74/MAILTRAIL - https://github.com/Pythunder/maltrail - https://github.com/RsbCode/maltrail - https://github.com/Youhoohoo/maltrail-iie - https://github.com/a-belard/maltrail - https://github.com/areaventuno/exploit-joomla - https://github.com/dhruvbhaiji/Maltrail-IDS - https://github.com/hxp2k6/https-github.com-stamparm-maltrail - https://github.com/khanzjob/maltrail - https://github.com/mukarramkhalid/joomla-sqli-mass-exploit - https://github.com/rsumner31/maltrail - https://github.com/stamparm/maltrail - https://github.com/yasir27uk/maltrail