The Joomanager component through 2.0.0 for Joomla! has an Arbitrary File Download issue, resulting in exposing the Credentials of the DataBase.[]()
[]()
[]()
[]()
# COM_JOOMANAGER 2.0 -ARBITRARY FILE DOWNLOAD

Collecting databases in mass with plugin : COM_JOOMANAGER, From CMS: Joomla, Project developed in python 2.x, more information, access the youtube video.
*CVE:* `2017-18345` *Risk*: `Security Risk High`
*0day.Today-ID:* `29950` *ExploitDB-id:* `44252`
*0day db-id:* `16348` *CXSecurity-id:* `WLB-2018030054`
**CVSS v3.0 Severity and Metrics:**
*Base Score:* `9.8 CRITICAL`
- https://vel.joomla.org/vel-blog/2020-joomanager-2-0-0-other
- https://www.cvedetails.com/cve/CVE-2017-18345/
- https://nvd.nist.gov/vuln/detail/CVE-2017-18345
- https://twitter.com/cvenew/status/1033829060588302337
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18345
- https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-18345.html
- https://launchpad.net/bugs/cve/CVE-2017-18345
- https://security-tracker.debian.org/tracker/CVE-2017-18345
- https://www.cvedetails.com/cve/CVE-2017-18345/
- https://vuldb.com/?id.123260
- https://infosec.cert-pa.it/cve-2017-18345.html
- https://0day.today/exploit/29950
- https://www.exploit-db.com/exploits/44252
- https://cxsecurity.com/issue/WLB-2018030054
- https://www.exploitalert.com/view-details.html?id=29114
- https://www.phpsecure.info/go/162082.html
- https://hackertor.com/2017/08/31/joomla-component-joomanager-2-0-0-arbitrary-file-download/
- https://buzzreddit.com/post/82glkb
- https://www.exploit-database.net/?id=96963
- http://reader.centrodouniverso.com.br/archives/544371



**DEPENDENCES**
- `BeautifulSoup`
- `Threading`
- `urlparse`
- `urllib2`
- `argparse`
- `requests`
[4.0K] /data/pocs/bc4916148cbf783d263fb94508f0a9113e74ef71
├── [1.4K] COM_JOOMANAGER_TARGETS.txt
├── [ 11K] CVE-2017-18345-com_joomanager.py
├── [ 34K] LICENSE
└── [2.0K] README.md
0 directories, 4 files