Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-8869 PoC — Joomla! 提权漏洞

Source
Associated Vulnerability
Title:Joomla! 提权漏洞 (CVE-2016-8869)
Description:The register method in the UsersModelRegistration class in controllers/user.php in the Users component in Joomla! before 3.6.4 allows remote attackers to gain privileges by leveraging incorrect use of unfiltered data when registering on a site.
Description
Exploit for Joomla 3.4.4 - 3.6.4 (CVE-2016-8869 and CVE-2016-8870)
File Snapshot

[4.0K] /data/pocs/db70b5a214f1c3c0a155653274efe7c03d172f32 ├── [ 63] composer.json ├── [ 11K] exploit.php ├── [ 15] payload.pht ├── [1.7K] readme.txt └── [ 97] run.bat 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →