POC详情: dea0879794484318573a55c4be8ab84b3901da0b

来源
关联漏洞
标题: Joomla! SQL注入漏洞 (CVE-2017-8917)
描述:Joomla!是美国Open Source Matters团队的一套使用PHP和MySQL开发的开源、跨平台的内容管理系统(CMS)。 Joomla! 3.7.1之前的3.7.x版本中存在SQL注入漏洞。远程攻击者可利用该漏洞执行任意SQL命令。
描述
CVE-2017-8917 SQL injection Vulnerability in Joomla! 3.7.0 exploit
介绍
# CVE-2017-8917-Joomla

Python script to exploit the CVE-2017-8917 SQL injection Vulnerability in Joomla! 3.7.0

Created for **educational purposes only**. Used for the [**TryHackMe Dailybugle CTF**](https://tryhackme.com/room/dailybugle)



## Advisory

All the scripts/binaries in this repository should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own networks and/or with the network owner's permission.


## Usage

```
python3 main.py --host x.x.x.x [--debug]
```

## Example

On the [**TryHackMe Dailybugle CTF**](https://tryhackme.com/room/dailybugle)

![result.png](result.png)
文件快照

[4.0K] /data/pocs/dea0879794484318573a55c4be8ab84b3901da0b ├── [ 542] docker-compose.yaml ├── [ 11K] main.py ├── [ 735] README.md └── [373K] result.png 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。