39 lines
No EOL
2.1 KiB
Text
39 lines
No EOL
2.1 KiB
Text
========================================================================================
|
|
| # Title : Joomla.Tutorials GHDB: Apache directory listing Download Vulnerability |
|
|
| # Author : indoushka |
|
|
| # email : indoushka@hotmail.com |
|
|
| # Home : Souk Naamane - 04325 - Oum El Bouaghi - Algeria -(00213771818860) |
|
|
| # Web Site : www.iq-ty.com |
|
|
| # Published: |
|
|
| # Script : Joomla com_intuit |
|
|
| # Tested on: windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu) |
|
|
| # Bug : GHDB |
|
|
====================== Exploit By indoushka =================================
|
|
| # Exploit :
|
|
|
|
|
| Vulnerability description:
|
|
| The description for this alert is contributed by the GHDB community, it may contain inappropriate language.
|
|
|
|
|
| Category : Files containing juicy info
|
|
|
|
|
| This is a very basic string found on directory listing pages which show the version of the Apache web server.
|
|
| Hackers can use this information to find vulnerable targets without querying the servers.
|
|
| The Google Hacking Database (GHDB) appears courtesy of the Google Hacking community.
|
|
| Affected items:
|
|
| /com_intuit
|
|
| /com_intuit (GET C=D;O=A)
|
|
| /com_intuit (GET C=D;O=D)
|
|
| /com_intuit (GET C=M;O=A)
|
|
| /com_intuit (GET C=M;O=D)
|
|
| /com_intuit (GET C=N;O=A)
|
|
| /com_intuit (GET C=N;O=D)
|
|
| /com_intuit (GET C=S;O=A)
|
|
| /com_intuit (GET C=S;O=D)
|
|
| The impact of this vulnerability:
|
|
| Not available.
|
|
| How to fix this vulnerability:
|
|
| Not available.
|
|
================================ Dz-Ghost Team ========================================
|
|
Greetz : all my friend * Dos-Dz * Snakespc * His0k4 * Hussin-X * Str0ke * Saoucha * Star08 |
|
|
Rafik (Tinjah.com) * Yashar (sc0rpion.ir) * Silitoad * redda * mourad (dgsn.dz) *
|
|
------------------------------------------------------------------------------------------- |