Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2015-7857

Description

SQL injection vulnerability in the getListQuery function in administrator/components/com_contenthistory/models/history.php in Joomla! 3.2 before 3.4.5 allows remote attackers to execute arbitrary SQL commands via the list[select] parameter to index.php.

POC

Reference

- http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html

- http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html

- https://www.exploit-db.com/exploits/38797/

- https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/

Github

- https://github.com/ARPSyndicate/cvemon

- https://github.com/CCrashBandicot/ContentHistory

- https://github.com/Ciber1401/Mai

- https://github.com/Jahismighty/maltrail

- https://github.com/JustF0rWork/malware

- https://github.com/Mezantrop74/MAILTRAIL

- https://github.com/Pythunder/maltrail

- https://github.com/RsbCode/maltrail

- https://github.com/Youhoohoo/maltrail-iie

- https://github.com/a-belard/maltrail

- https://github.com/areaventuno/exploit-joomla

- https://github.com/dhruvbhaiji/Maltrail-IDS

- https://github.com/dhruvgupta8050/Maltrail-IDS

- https://github.com/hxp2k6/https-github.com-stamparm-maltrail

- https://github.com/k-rks/maltrail

- https://github.com/khanzjob/maltrail

- https://github.com/mukarramkhalid/joomla-sqli-mass-exploit

- https://github.com/rsumner31/maltrail

- https://github.com/stamparm/maltrail

- https://github.com/thehananasif/Malicious-Traffic-Detection-System-by-Hanan-Asif

- https://github.com/uni-tue-kn/MalFIX

- https://github.com/yasir27uk/maltrail