diff --git a/documentation/modules/exploit/unix/webapp/joomla_sqli_rce_3_7_0.md b/documentation/modules/exploit/unix/webapp/joomla_sqli_rce_3_7_0.md index 76c394dd20..1230889829 100644 --- a/documentation/modules/exploit/unix/webapp/joomla_sqli_rce_3_7_0.md +++ b/documentation/modules/exploit/unix/webapp/joomla_sqli_rce_3_7_0.md @@ -1,7 +1,7 @@ ## Vulnerable Application - This module exploits a SQL Injection vulnerability in the com_fields component which was introduced to the core of Joomla in version 3.7.0. - With the SQLi, its possible to enumerate cookies of administrative users, and hijack one of their sessions. If no administrators are authenticated, the RCE portion will not work. If a session hijack is available, one of the website templates is identified, and our payload is added to the template as a new file, and then executed. + This module exploits a SQL Injection vulnerability in the 'com_fields' component which was introduced to the core of Joomla in version 3.7.0. + With the SQLi, it's possible to enumerate cookies of administrative users, and hijack one of their sessions. If no administrators are authenticated, the RCE portion will not work. If a session hijack is available, one of the website templates is identified, and our payload is added to the template as a new file, and then executed. ## Verification diff --git a/modules/exploits/unix/webapp/joomla_comfields_sqli_rce.rb b/modules/exploits/unix/webapp/joomla_comfields_sqli_rce.rb index 17eace5d69..aa677e0d02 100644 --- a/modules/exploits/unix/webapp/joomla_comfields_sqli_rce.rb +++ b/modules/exploits/unix/webapp/joomla_comfields_sqli_rce.rb @@ -25,7 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote 'References' => [ [ 'CVE', '2017-8917' ], # SQLi - ['EDB', '42033'], + [ 'EDB', '42033' ], [ 'URL', 'https://blog.sucuri.net/2017/05/sql-injection-vulnerability-joomla-3-7.html' ] ], 'Payload' =>