Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-8869 PoC — Joomla! 提权漏洞

Source
Associated Vulnerability
Title:Joomla! 提权漏洞 (CVE-2016-8869)
Description:Joomla!是美国Open Source Matters团队的一套使用PHP和MySQL开发的开源、跨平台的内容管理系统(CMS)。 Joomla! 3.6.4之前的版本中的Users组件中的controllers/user.php文件中的UsersModelRegistration类中的‘register’方法存在安全漏洞。远程攻击者可通过错误使用未过滤的数据利用该漏洞提升权限。
Description
Exploit for Joomla 3.4.4 - 3.6.4 (CVE-2016-8869 and CVE-2016-8870)
File Snapshot

[4.0K] /data/pocs/db70b5a214f1c3c0a155653274efe7c03d172f32 ├── [ 63] composer.json ├── [ 11K] exploit.php ├── [ 15] payload.pht ├── [1.7K] readme.txt └── [ 97] run.bat 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.