Updated 01_30_2014
This commit is contained in:
parent
816ac77f08
commit
fe00572dd8
2 changed files with 0 additions and 44 deletions
|
@ -27994,7 +27994,6 @@ id,file,description,date,author,platform,type,port
|
|||
31163,platforms/windows/remote/31163.txt,"WinIPDS 3.3 rev. G52-33-021 Directory Traversal and Denial of Service Vulnerabilities",2008-02-12,"Luigi Auriemma",windows,remote,0
|
||||
31164,platforms/php/webapps/31164.txt,"Prince Clan Chess Club 0.8 com_pcchess Component 'user_id' Parameter SQL Injection Vulnerability",2008-02-12,S@BUN,php,webapps,0
|
||||
31168,platforms/windows/dos/31168.pl,"NCH Software Express Burn Plus 4.68 (.EBP) Project File Buffer Overflow",2014-01-24,LiquidWorm,windows,dos,0
|
||||
31171,platforms/php/webapps/31171.txt,"XOS Shop 1.0 rc7o (redirect.php, goto param) - SQL Injection Vulnerability",2014-01-24,"JoKeR DZ",php,webapps,80
|
||||
31173,platforms/php/webapps/31173.txt,"pChart 2.1.3 - Multiple Vulnerabilities",2014-01-24,"Balazs Makany",php,webapps,80
|
||||
31174,platforms/php/webapps/31174.txt,"Joomla Komento Extension 1.7.2 - Stored XSS Vulnerabilities",2014-01-24,"High-Tech Bridge SA",php,webapps,80
|
||||
31175,platforms/php/webapps/31175.txt,"Joomla JV Comment Extension 3.0.2 (index.php, id param) - SQL Injection",2014-01-24,"High-Tech Bridge SA",php,webapps,80
|
||||
|
|
Can't render this file because it is too large.
|
|
@ -1,43 +0,0 @@
|
|||
################################################################################
|
||||
# Exploit Title: XOS Shop_v1.0_rc7o Sql Injection Vulnerability
|
||||
# Date: 23/01/2014
|
||||
# Exploit Author: JoKeR_StEx
|
||||
# Vendor Homepage: http://www.xos-shop.com/
|
||||
# Software Link: http://xos-shop.com/main/index.php/cPath/25/
|
||||
# Version: v1.0 rc7o
|
||||
# Tested on: Windows PHP Version 6.0.0-dev
|
||||
# CVE : [~]
|
||||
##################################################################################
|
||||
|
||||
[-] Description :
|
||||
|
||||
XOS Shop is affected by Sql Injection Vulnerability
|
||||
The Attacker Can inject some MYSQl and exploit it(get content of db)
|
||||
|
||||
[+] VUlnerability :
|
||||
|
||||
Affected File ==> redirect.php
|
||||
Line 47;53
|
||||
|
||||
<?
|
||||
|
||||
switch($_GET['action']){
|
||||
47: case 'url':
|
||||
48: if (isset($_GET['goto']) && xos_not_null($_GET['goto'])) {
|
||||
49: $check_query = xos_db_query("select products_url from " . TABLE_PRODUCTS_DESCRIPTION . " where products_url = '" . xos_db_input($_GET['goto']) . "' limit 1");
|
||||
50: if (xos_db_num_rows($check_query)) {
|
||||
51: xos_redirect('http://' . $_GET['goto'])
|
||||
52: break;
|
||||
53: }
|
||||
?>
|
||||
[-]Exploit
|
||||
|
||||
http://127.0.0.1/Xoshop/shop/redirect.php?action=url&goto='
|
||||
http://127.0.0.1/Xoshop/shop/redirect.php?action=url&goto=[SQLI]
|
||||
|
||||
###################################################################################
|
||||
# Gr33ting's : Asesino04 , Shield Dz , Drr.0ryx & All My Friedns
|
||||
###################################################################################
|
||||
eamil : jokerdz44@yahoo.fr
|
||||
Facebook : fb.me/imadlilong.lasvegas
|
||||
Twitter : @JoKeR_StEx
|
Loading…
Add table
Reference in a new issue