header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

nginx webdav copy/move method directory traversal

The webdav component has to be enabled and the user has to have permission to use the COPY or MOVE methods. nginx ("Engine X", written by Igor Sysoev) has the ability to be used as a webdav publishing server. With webdav you can for example copy or move files from one to a different location. The move and copy methods require a "Destination:" HTTP header. The destination header contains information about where the file should be placed. By using characters like "../" the attacker can traverse down the directory tree and place files outside the webroot. This is an insecure behaviour of the nginx webdav module and can be especially dangerous when nginx is used in a virtual hosting environment. nginx runs as the user nobody per default so normally this bug is not a big deal since an attacker may only be allowed to write files to /tmp/ or nobody owned directories. The severity is low because this attack requires webdav "upload" permissions.

OSSIM – Open Source Security Information Management

Attacker need to be authorized in system for success. Vulnerable scripts are repository_document.php, repository_links.php, repository_editdocument.php, getpolicy.php and newhostgroupform.php. Vulnerable parameters are id_document, group and name. Examples of exploit are provided in the text.

MindSculpt’s new CMS Content Management System SQL injection vulnerability – (cid[0])

A SQL injection vulnerability exists in MindSculpt's new CMS Content Management System. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to sensitive information such as usernames and hashed passwords.

SwissmangoCMS SQL injection vulnerability

SwissmangoCMS is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'main' in the index.php file. This can allow the attacker to gain access to the database and extract sensitive information such as usernames and passwords.

Joomla Component com_fastball Remote SQL injection vulnerability – (league)

A remote SQL injection vulnerability exists in Joomla Component com_fastball. An attacker can exploit this vulnerability to inject malicious SQL queries in the application by sending a specially crafted HTTP request to the vulnerable parameter 'league' of the 'com_fastball' component. This can allow the attacker to gain access to the sensitive information stored in the database.

FSphp 0.2.1 Multiple Remote File Inclusion Vulnerability

FSphp 0.2.1 is vulnerable to multiple remote file inclusion vulnerability. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable application. The malicious URL contains the path of the malicious file which is hosted on a remote server. The vulnerable application includes the malicious file in the application and executes it.

Regental Medien Blind SQL Injection Vulnerability

Regental Medien is vulnerable to Blind SQL Injection. The vulnerable file is index.php. The exploit can be executed by sending a malicious SQL query to the vulnerable parameter mainid. Proof of concept can be seen in the given example. The dork for this vulnerability is 'powered by regental medien'.

Recent Exploits: