11 lines
No EOL
503 B
Text
Executable file
11 lines
No EOL
503 B
Text
Executable file
# Exploit Title: [Vulnerability in Joomla Component com_caddy]
|
|
# Date: [2010-04-22]
|
|
# Author: [_SuBz3r0_]
|
|
# Software Link: []
|
|
# Joomla Component: [com_caddy]
|
|
# Tested on: []
|
|
# CVE : [if exists]
|
|
# Code :
|
|
|
|
Just use for example the firefox addon tamper data while adding a product to the cart. Then look at the requests and specially have a look at your POST request....
|
|
Either you modify the post request or if you want you could also transform the POST into GET request and paste it in the URL. |