An SQL injection vulnerability exists in Joomla! versions 3.7.x before 3.7.1, which allows unauthenticated users to execute arbitrary SQL commands. I wanted to write an SQLi related script to see how it can be integrated into a library, hence this script was written.
This script checks if the com_fields is injectable by running the information function user(). If the username and hostname is returned, website is vulnerable.
A video of the script in action can be found here.
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.