Joomla LightGallery 1.2.1 SQL Injection

Joomla LightGallery component version 1.2.1 suffers from a remote SQL injection vulnerability.


MD5 | 3b2c0ac15b99c63c94cdfd5866f7c1f1

#########################################################################

# Exploit Title : Joomla LightGallery Components 1.2.1 SQL Injection
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 14/02/2019
# Vendor Homepage : joompolitan.com
# Software Download Link : joompolitan.com/lightgallery.html
joompolitan.com/joomla/free/lightgallery_plugin.2.0.3.zip
# Software Information Link : extensions.joomla.org/extension/light-gallery/
tutorial.joompolitan.com/light-gallery-for-joomla.html
# Software Affected Versions : Joomla Component 1.2.1 and Joomla Plugin 2.0.3
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Google Dorks : inurl:''/index.php?option=com_lightgallery''
# Vulnerability Type : CWE-89 [ Improper Neutralization of
Special Elements used in an SQL Command ('SQL Injection') ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos

#########################################################################

# Description about Software :
***************************
Light Gallery Component for Joomla provides a simplest way for you to create

responsive galleries in your website. It can generate a gallery from your folder.

Therefore, you don't have headache problem to insert the pictures one by one.

Light Photo Gallery also allows you to create gallery by using pictures or images

from other website. Light Gallery enables all features of light box and it will be viewed in light box.

Light Gallery Joomla component is compatible with Joomla 2.5.x, Joomla 3.x and later.

###########################################################################

# Impact :
***********
Joomla LightGallery 2.03 and other versions -

component for Joomla is prone to an SQL-injection vulnerability because it

fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application,

access or modify data, or exploit latent vulnerabilities in the underlying database.

A remote attacker can send a specially crafted request to the vulnerable application

and execute arbitrary SQL commands in application`s database.

Further exploitation of this vulnerability may result in unauthorized data manipulation.

An attacker can exploit this issue using a browser.

#########################################################################

# SQL Injection Exploit :
**********************
/index.php?option=com_lightgallery&view=category&Itemid=[SQL Injection]

/index.php?option=com_lightgallery&view=list&cid=[ID-NUMBER]&Itemid=[SQL Injection]

#########################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team

#########################################################################

Related Posts