Se*y Exploit Joomla File Upload

2017.05.31
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

------------------------------------------- # [Sexy Exploit] Joomla File Upload # # EXPLOIT TITLE : Sexy Exploit Joomla File Upload # Author : Mohamad peywasteh # GOOGLE DORK : inurl:/com_sexycontactform intext:contact # Tested On : [ Win 10 ] # # Telegram: @kambod ------------------------------------------- # [+] DESCRIPTION : ------------------------------------------- # # 1:Search Google Dork and Choose a Target # 2: exploit:/components/com_sexycontactform/fileupload/index.php # 3: Script CSRF #Link: https://pastebin.com/a0ZP7mVj # 4: Upload Index and sheel and image ------------------------------------------- # [+] Script Upload - Image , Index , Shell


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top