Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-11890 PoC — Joomla! 输入验证错误漏洞

Source
Associated Vulnerability
Title:Joomla! 输入验证错误漏洞 (CVE-2020-11890)
Description:Joomla!是美国Open Source Matters团队的一套使用PHP和MySQL开发的开源、跨平台的内容管理系统(CMS)。 Joomla! 2.5.0版本至3.9.16版本中存在输入验证错误漏洞。攻击者可利用该漏洞绕过ACL保护。
Description
CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE
Readme
# Made by HK

# CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE
# Link
https://developer.joomla.org/security-centre/810-20200402-core-missing-checks-for-the-root-usergroup-in-usergroup-table.html

# PoC
## Affected version: Joomla core before 3.9.17
## User requirement: Admin account (Not superadmin)
## Gain access: Create a new Superadmin, then trigger RCE.
## Remote Code Execution (RCE) in Joomla
## Run *cve202011890.py* with your credentials and access link rce:
![image](https://user-images.githubusercontent.com/24661746/79949993-9f45b180-84a0-11ea-80bd-5b7aedbb3b64.png)

# Guide to use docker such as:
# #Step 1: 

# *docker pull hoangkien1020/joomla:3.9.16*

# #Step 2:

# *docker run -d --rm -it -p 8080:80 hoangkien1020/joomla:3.9.16*

# #Step 3: Access your domain/IP with port 8080:
![image](https://user-images.githubusercontent.com/24661746/75947931-9be86d80-5ed4-11ea-991d-f37309d4c41a.png)
# Inside this image with credentials

### *username: password*

### MySQL: root: root (can access via IP:8080/phpmyadmin)

### superadmin:1234 (Super Users)

### admin:1234 (Administrator)

### hacker:1234 (Manager) 
File Snapshot

[4.0K] /data/pocs/956e87644f6e2c32adc6fffc42b5927d0b8a47e8 ├── [6.3K] cve202011890.py └── [1.2K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.