
39 changes to exploits/shellcodes/ghdb ProLink PRS1841 PLDT Home fiber - Default Password Nacos 2.0.3 - Access Control vulnerability sudo 1.8.0 to 1.9.12p1 - Privilege Escalation sleuthkit 4.11.1 - Command Injection Active eCommerce CMS 6.5.0 - Stored Cross-Site Scripting (XSS) ManageEngin AMP 4.3.0 - File-path-traversal SQL Monitor 12.1.31.893 - Cross-Site Scripting (XSS) AmazCart CMS 3.4 - Cross-Site-Scripting (XSS) Art Gallery Management System Project v1.0 - Reflected Cross-Site Scripting (XSS) Art Gallery Management System Project v1.0 - SQL Injection (sqli) authenticated Art Gallery Management System Project v1.0 - SQL Injection (sqli) Unauthenticated ChiKoi v1.0 - SQL Injection ERPGo SaaS 3.9 - CSV Injection GLPI Cartography Plugin v6.0.0 - Unauthenticated Remote Code Execution (RCE) GLPI 4.0.2 - Unauthenticated Local File Inclusion on Manageentities plugin GLPI Activity v3.1.0 - Authenticated Local File Inclusion on Activity plugin GLPI Glpiinventory v1.0.1 - Unauthenticated Local File Inclusion GLPI v10.0.1 - Unauthenticated Sensitive Data Exposure GLPI v10.0.2 - SQL Injection (Authentication Depends on Configuration) Metform Elementor Contact Form Builder v3.1.2 - Unauthenticated Stored Cross-Site Scripting (XSS) MyBB 1.8.32 - Remote Code Execution (RCE) (Authenticated) Paid Memberships Pro v2.9.8 (WordPress Plugin) - Unauthenticated SQL Injection pimCore v5.4.18-skeleton - Sensitive Cookie with Improper SameSite Attribute Prizm Content Connect v10.5.1030.8315 - XXE SLIMSV 9.5.2 - Cross-Site Scripting (XSS) WP-file-manager v6.9 - Unauthenticated Arbitrary File Upload leading to RCE Zstore 6.5.4 - Reflected Cross-Site Scripting (XSS) Roxy WI v6.1.0.0 - Improper Authentication Control Roxy WI v6.1.0.0 - Unauthenticated Remote Code Execution (RCE) Roxy WI v6.1.1.0 - Unauthenticated Remote Code Execution (RCE) via ssl_cert Upload Solaris 10 libXm - Buffer overflow Local privilege escalation Chromacam 4.0.3.0 - PsyFrameGrabberService Unquoted Service Path Grand Theft Auto III/Vice City Skin File v1.1 - Buffer Overflow HotKey Clipboard 2.1.0.6 - Privilege Escalation Unquoted Service Path Microsoft Exchange Active Directory Topology 15.02.1118.007 - 'Service MSExchangeADTopology' Unquoted Service Path Windows 11 10.0.22000 - Backup service Privilege Escalation Windows/x86 - Create Administrator User / Dynamic PEB & EDT method null-free Shellcode (373 bytes)
38 lines
No EOL
1.5 KiB
Text
38 lines
No EOL
1.5 KiB
Text
# Exploit Title: ERPGo SaaS 3.9 - CSV Injection
|
|
# Date: 18/01/2023
|
|
# Exploit Author: Sajibe Kanti
|
|
# Vendor Name: RajodiyaInfotech
|
|
# Vendor Homepage: https://rajodiya.com/
|
|
# Software Link: https://codecanyon.net/item/erpgo-saas-all-in-one-business-erp-with-project-account-hrm-crm-pos/33263426
|
|
# Version: 3.9
|
|
# Tested on: Windows & Live Litespeed Web Server
|
|
# Demo Link : https://demo.rajodiya.com/erpgo-saas/login
|
|
|
|
# Description #
|
|
|
|
ERPGo is a software as a service (SaaS) platform that is vulnerable to CSV
|
|
injection attacks. This type of attack occurs when an attacker is able to
|
|
manipulate the data that is imported or exported in a CSV file, in order to
|
|
execute malicious code or gain unauthorized access to sensitive
|
|
information. This vulnerability can be exploited by an attacker by
|
|
injecting specially crafted data into a CSV file, which is then imported
|
|
into the ERPGo system. This can potentially allow the attacker to gain
|
|
access to sensitive information, such as login credentials or financial
|
|
data, or to execute malicious code on the system.
|
|
|
|
# Proof of Concept (PoC) : Exploit #
|
|
|
|
1) Go To : https://erpgo.127.0.0.1/ERPGo/register <====| Register New
|
|
account
|
|
2) Complete the Registration
|
|
3) Now Click Accounting System Then Customer
|
|
4) Now Add a New Vendors / Click Create
|
|
5) Now Add this Payload in Name : =10+20+cmd|' /C calc'!A0
|
|
6) Now Submit This Form
|
|
7) Now Download Vendors List as csv
|
|
8) Open This CSV File in excel
|
|
9) Now a Calculator will open
|
|
|
|
# Image PoC : Reference Image #
|
|
|
|
1) Payload Fired: https://prnt.sc/EkKPZiMa6yz8 |