Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-17254 PoC — Joomla! JCK Editor组件SQL注入漏洞

Source
Associated Vulnerability
Title:Joomla! JCK Editor组件SQL注入漏洞 (CVE-2018-17254)
Description:Joomla!是美国Open Source Matters团队开发的一套开源的内容管理系统(CMS),该系统提供RSS馈送、网站搜索等功能。JCK Editor是其中的一个编辑器组件。 Joomla! JCK Editor组件6.4.4版本中存在SQL注入漏洞。远程攻击者可通过向jtreelink/dialogs/links.php页面发送‘parent’参数利用该漏洞执行SQL命令。
Description
Exploit for Joomla JCK Editor 6.4.4 (CVE-2018-17254)
Readme
# Joomla-JCK-Editor-6.4.4-SQL-Injection

The JCK Editor Jtreelink plugin for Joomla! fails to correctly parse the user inputs, allowing SQL Injection.
This exploit takes advantage of this security flaw and dump the administrators credentials and possibly upload a PHP RCE shell.

Exploit Title: Joomla JCK Editor 6.4.4 SQL Injection

Google Dork: inurl:/plugins/editors/jckeditor/plugins/jtreelink/

Date: 05/03/2021

Exploit Author: Nicholas Ferreira

Vendor Homepage: http://docs.arkextensions.com/downloads/jck-editor

Version: 6.4.4

Tested on: Debian 10

CVE : CVE-2018-17254

Video explaining the vulnerability, it's exploitation and the code of the exploit (in portuguese): [![](http://img.youtube.com/vi/DqMC0mELPvA/0.jpg)](http://www.youtube.com/watch?v=DqMC0mELPvA "Video")


# Usage
user@lol:~$ php JCKEditor_SQLi_Exploit.php --url target.com/plugins/

You **must** specify the /plugins/ directory. This is because some websites are not hosted on the root of the webserver, e.g, the applications may be as target.com/site/, or target.com/2021/, or something like that. So, by specifying the /plugins/ path, you make sure the vulnerable file will be found.

With -r or --rce, the exploit will try to craft and upload a PHP script that allows remote command execution. This will only work if the MySQL allows stacked queries, which is not enabled in the default configuration, so it will probably not work. =(

With -t or --targets you can specify a list of vulnerable websites, and the exploit will try dump all in sequence.

Sometimes the website administrator can change the default name of the database. In this case, you can get the list of all DBs and manually specify the correct one with -d or --db.

![](https://i.imgur.com/NOrGm2c.png)
File Snapshot

[4.0K] /data/pocs/15ed02fd8738c7bc8689858833620b80fb31fce8 ├── [ 12K] JCKEditor_SQLi_Exploit.php └── [1.7K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.