Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-10945 PoC — Joomla! 路径遍历漏洞

Source
Associated Vulnerability
Title:Joomla! 路径遍历漏洞 (CVE-2019-10945)
Description:Joomla!是美国Open Source Matters团队的一套使用PHP和MySQL开发的开源、跨平台的内容管理系统(CMS)。Media Manager是使用在其中的一个媒体管理组件。 Joomla! CMS 1.5.0版本至3.9.4版本中的com_media存在路径遍历漏洞,该漏洞源于网络系统或产品未能正确地过滤资源或文件路径中的特殊元素。攻击者可利用该漏洞访问受限目录之外的位置。
Description
Python3 port of the original Joomla Core (1.5.0 through 3.9.4) - Directory Traversal && Authenticated Arbitrary File Deletion
Readme
# CVE-2019-10945

This is a Python 3 port of the original exploit from Haboob Team: https://www.exploit-db.com/exploits/46710
File Snapshot

[4.0K] /data/pocs/0aa17e981a52630f9df84055f6c5b26c3165e2fb ├── [6.1K] exp.py ├── [ 125] README.md └── [ 236] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.