diff --git a/files.csv b/files.csv index e805aed85..9dec1da3b 100755 --- a/files.csv +++ b/files.csv @@ -36597,3 +36597,7 @@ id,file,description,date,author,platform,type,port 40479,platforms/php/webapps/40479.txt,"Entrepreneur Job Portal Script - SQL Injection",2016-10-07,OoN_Boy,php,webapps,0 40477,platforms/windows/local/40477.txt,"BlueStacks 2.5.55 - Unquoted Service Path Privilege Escalation",2016-10-07,Th3GundY,windows,local,0 40478,platforms/windows/local/40478.txt,"Waves Audio Service - Unquoted Service Path Privilege Escalation",2016-10-07,"Ross Marks",windows,local,0 +40480,platforms/php/webapps/40480.txt,"miniblog 1.0.1 - Cross-Site Request Forgery (Add New Post)",2016-10-09,Besim,php,webapps,0 +40482,platforms/windows/local/40482.txt,"Fitbit Connect Service - Unquoted Service Path Privilege Escalation",2016-10-09,"Ross Marks",windows,local,0 +40486,platforms/php/webapps/40486.txt,"PHP Press Release - Cross-Site Request Forgery (Add Admin)",2016-10-09,Besim,php,webapps,0 +40487,platforms/php/webapps/40487.txt,"PHP Press Release - Stored Cross Site Scripting",2016-10-09,Besim,php,webapps,0 diff --git a/platforms/php/webapps/40480.txt b/platforms/php/webapps/40480.txt new file mode 100755 index 000000000..68ed3f2d1 --- /dev/null +++ b/platforms/php/webapps/40480.txt @@ -0,0 +1,38 @@ +# Exploit Title : miniblog 1.0.1 - Cross-Site Request Forgery (Add New Post) +# Author : Besim +# Google Dork : +# Date : 09/10/2016 +# Type : webapps +# Platform : PHP +# Vendor Homepage : http://www.spyka.net/scripts/php/miniblog +# Software link : +http://dl.spyka.co.uk/scripts/php/miniblog-1-0-1.zip + + +Description (admin login required) : + +miniblog 1.0.1 versions is vulnerable to CSRF attack, adding, delete and +edit article in the sections + +Vulnerable page : http://localhost:8081/miniblog/*adm/admin.php?mode=add + +Dangerous point : if used with XSS can be steal on the admin's cookie information. + + +*############### CSRF PoC ###############* + + +
+ + + +######################################## + diff --git a/platforms/php/webapps/40486.txt b/platforms/php/webapps/40486.txt new file mode 100755 index 000000000..917b242bf --- /dev/null +++ b/platforms/php/webapps/40486.txt @@ -0,0 +1,35 @@ +# Exploit Title : PHP Press Release - Cross-Site Request Forgery (Add Admin - Super User ) +# Author : Besim +# Google Dork : - +# Date : 09/10/2016 +# Type : webapps +# Platform : PHP +# Vendor Homepage : http://www.pagereactions.com/product.php?pku=1 + Software link : + http://www.pagereactions.com/downloads/phppressrelease.zip + + + +########################### CSRF PoC ############################### + + + + + +
+ + + + + + + + +
+ + + + +#################################################################### diff --git a/platforms/php/webapps/40487.txt b/platforms/php/webapps/40487.txt new file mode 100755 index 000000000..84367b008 --- /dev/null +++ b/platforms/php/webapps/40487.txt @@ -0,0 +1,22 @@ +# Exploit Title : PHP Press Release* - Stored Cross Site +Scripting* +# Author : Besim +# Google Dork : - +# Date : 09/10/2016 +# Type : webapps +# Platform : PHP +# Vendor Homepage : http://www.pagereactions.com/product.php?pku=1 +# Software link : + http://www.pagereactions.com/downloads/phppressrelease.zip + + +Description : + +Vulnerable link : +http://site_name/phppressrelease/administration.php?pageaction=newrelease + +Stored XSS Payload : + +http://www.site_name/phppressrelease/administration.php?pageaction=saverelease&subaction=submit&dateday=&datemonthnewedit=&dateyearnewedit=&title=