Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-6396 PoC — Joomla! Google Map Landkarten SQL注入漏洞

Source
Associated Vulnerability
Title:Joomla! Google Map Landkarten SQL注入漏洞 (CVE-2018-6396)
Description:Joomla!是美国Open Source Matters团队开发的一套开源的内容管理系统(CMS),该系统提供RSS馈送、网站搜索等功能。Google Map Landkarten是使用在其中的一个Google地图组件。 Joomla! Google Map Landkarten 4.2.3及之前版本中存在SQL注入漏洞。远程攻击者可借助‘cid’参数、‘id’参数或‘map’参数利用该漏洞查看、添加、更改或删除后端数据库的信息。
Description
Joomla - Component Google Map Landkarten <= 4.2.3 - SQL Injection
Readme
# Joomla-CVE-2018-6396
## Joomla! Component Google Map Landkarten <= 4.2.3 - SQL Injection
**Date:** 03/03/2018

**Vendor Homepage:** [http://www.joomla-24.de/](http://www.joomla-24.de/)

**Software Link:** [https://extensions.joomla.org/extensions/extension/maps-a-weather/maps-a-locations/google-map-landkarten/](https://extensions.joomla.org/extensions/extension/maps-a-weather/maps-a-locations/google-map-landkarten/)

**Version:** <= 4.2.3

**Tested on:** KaLi Linux 2018.1

**CVE:** [CVE-2018-6396](https://www.certsi.es/en/early-warning/vulnerabilities/cve-2018-6396)

**Discovered by:** [Ihsan Sencan](https://twitter.com/ihsansencan)

**Exploit by:** [Javier Olmedo](https://twitter.com/jjavierolmedo)
## HOW TO USE?
Clone this repository
```
git clone https://github.com/JJavierOlmedo/joomla-cve-2018-6396.git
```
Go to local repository
```
cd joomla-cve-2018-6396
```
Change the access permissions
```
sudo chmod +x joomla-cve-2018-6396.py
```
Launch attack!!
```
python3 joomla-cve-2018-6396.py -u <TARGET>
```
## PoC
![cve-2018-6396](https://hackpuntes.com/wp-content/uploads/2018/03/cve-2018-6396.gif)
File Snapshot

[4.0K] /data/pocs/844597a4c4f4d999904fc2cdc46acafdbcca17d7 ├── [6.3K] joomla-cve-2018-6396.py └── [1.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.