Looking for a fix? Check your Codebase security with multiple scanners from

Edit Report

Our sensors found this exploit at:

Below is a copy:

Joomla GMapFP 3.30 Arbitrary File Upload
# Exploit Title: Joomla! Component GMapFP 3.30 - Arbitrary File Upload
# Google Dork: inurl:''com_gmapfp''
# Date: 2020-03-25
# Exploit Author: ThelastVvV
# Vendor Homepage:
# Version:* Version J3.30pro
# Tested on: Ubuntu

# PoC:

# you can bypass the the restriction by uploading your file.php.png , file2.php.jpeg , file3.html.jpg ,file3.txt.jpg 

# Dir File Path: 


# The Joomla  Gmapfp Components 3.x is allowing  
# remote attackers to upload arbitrary files upload/shell upload due the issues of unrestricted file uploads

Copyright ©2020 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.