exploit-db-mirror/platforms/php/webapps/12340.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

11 lines
No EOL
503 B
Text
Executable file

# Exploit Title: [Vulnerability in Joomla Component com_caddy]
# Date: [2010-04-22]
# Author: [_SuBz3r0_]
# Software Link: []
# Joomla Component: [com_caddy]
# Tested on: []
# CVE : [if exists]
# Code :
Just use for example the firefox addon tamper data while adding a product to the cart. Then look at the requests and specially have a look at your POST request....
Either you modify the post request or if you want you could also transform the POST into GET request and paste it in the URL.