exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 25 RSS Feed

Files from Touhid M.Shaikh

First Active2017-05-16
Last Active2020-04-06
PlaySMS index.php Unauthenticated Template Injection Code Execution
Posted Apr 6, 2020
Authored by Touhid M.Shaikh, Lucas Rosevear | Site metasploit.com

This Metasploit module exploits a preauth Server-Side Template Injection vulnerability that leads to remote code execution in PlaySMS before version 1.4.3. This issue is caused by double processing a server-side template with a custom PHP template system called TPL which is used in the PlaySMS template engine at src/Playsms/Tpl.php:_compile(). The vulnerability is triggered when an attacker supplied username with a malicious payload is submitted. This malicious payload is then stored in a TPL template which when rendered a second time, results in code execution.

tags | exploit, remote, php, code execution
advisories | CVE-2020-8644
SHA-256 | 69a0f4388bcdfe1db7116c0d2b6663a925f860d9e3598da1d2bb51cf94a6700f
October CMS Upload Protection Bypass Code Execution
Posted Sep 6, 2019
Authored by Anti Rais, Touhid M.Shaikh, SecureLayer7.net | Site metasploit.com

This Metasploit module exploits an Authenticated user with permission to upload and manage media contents can upload various files on the server. Application prevents the user from uploading PHP code by checking the file extension. It uses black-list based approach, as seen in octobercms/vendor/october/rain/src/Filesystem/ Definitions.php:blockedExtensions(). This module was tested on October CMS version version 1.0.412 on Ubuntu.

tags | exploit, php
systems | linux, ubuntu
advisories | CVE-2017-1000119
SHA-256 | 018cfd6c1eb8529baff5fa0a0a5365e86412dcf24e53e0a9dac7f7b274f80338
Vtiger CRM 6.3.0 Authenticated Logo Upload Remote Command Execution
Posted Jul 30, 2018
Authored by Benjamin Daniel Mussler, Touhid M.Shaikh | Site metasploit.com

Vtiger version 6.3.0 CRM's administration interface allows for the upload of a company logo. Instead of uploading an image, an attacker may choose to upload a file containing PHP code and run this code by accessing the resulting PHP file. This Metasploit module was tested against vTiger CRM version 6.3.0.

tags | exploit, php
advisories | CVE-2015-6000, CVE-2016-1713
SHA-256 | 0e5c78b52a8faacfdb2de57265661b6c719a85c4847298f55630458f64d9b2ed
Monstra CMS Authenticated Arbitrary File Upload
Posted Jul 11, 2018
Authored by Touhid M.Shaikh, Ishaq Mohammed | Site metasploit.com

Monstra CMS 3.0.4 allows users to upload arbitrary files which leads to remote command execution on the remote server. An attacker may choose to upload a file containing PHP code and run this code by accessing the resulting PHP file. This Metasploit module was tested against Monstra CMS 3.0.4.

tags | exploit, remote, arbitrary, php
advisories | CVE-2017-18048
SHA-256 | 1887578bc1177ca40a87f7026a635f2de84eb4fde318ce454bb39c39bf591148
PlaySMS import.php Code Execution
Posted May 7, 2018
Authored by Touhid M.Shaikh | Site metasploit.com

This Metasploit module exploits an authenticated file upload remote code execution vulnerability in PlaySMS version 1.4. This issue is caused by improper file contents handling in import.php (aka the Phonebook import feature). Authenticated Users can upload a CSV file containing a malicious payload via vectors involving the User-Agent HTTP header and PHP code in the User-Agent. This Metasploit module was tested against PlaySMS 1.4 on VulnHub's Dina 1.0 machine and Windows 7.

tags | exploit, remote, web, php, code execution, file upload
systems | windows
advisories | CVE-2017-9101
SHA-256 | fd1838461438181db5479d38d1d1a6bb70ccdcb0e64b5040c592f5b4d3e3b3c7
PlaySMS sendfromfile.php Code Execution
Posted May 7, 2018
Authored by Touhid M.Shaikh, DarkS3curity | Site metasploit.com

This Metasploit module exploits a code injection vulnerability within an authenticated file upload feature in PlaySMS version 1.4. This issue is caused by improper file name handling in sendfromfile.php file. Authenticated Users can upload a file and rename the file with a malicious payload. This Metasploit module was tested against PlaySMS 1.4 on VulnHub's Dina 1.0 machine and Windows 7.

tags | exploit, php, file upload
systems | windows
advisories | CVE-2017-9080
SHA-256 | cd8509a13a4fadd5aa08a73c50a37e6e2a9bfc372d03a5e3789206904923adf9
ClipBucket beats_uploader Unauthenticated Arbitrary File Upload
Posted Mar 26, 2018
Authored by Touhid M.Shaikh | Site metasploit.com

This Metasploit module exploits a vulnerability found in ClipBucket versions before 4.0.0 (Release 4902). A malicious file can be uploaded using an unauthenticated arbitrary file upload vulnerability. It is possible for an attacker to upload a malicious script to issue operating system commands. This issue is caused by improper session handling in /action/beats_uploader.php file. This Metasploit module was tested on ClipBucket before 4.0.0 - Release 4902 on Windows 7 and Kali Linux.

tags | exploit, arbitrary, php, file upload
systems | linux, windows
SHA-256 | 4cbc4f10623c015fe72317b111015c9c54dcbf8fdddd9d0a7b8d9e1a06c5b330
DiskBoss Enterprise 8.4.16 Import Command Buffer Overflow
Posted Sep 28, 2017
Authored by Touhid M.Shaikh

DiskBoss Enterprise version 8.4.16 suffers from an import command buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | d7c0ede8c236e11bbaad0ae423654cad914ee3e9daac54527d87d869ba12f6a9
DiskBoss Enterprise 8.4.16 Buffer Overflow Proof Of Concept
Posted Sep 28, 2017
Authored by Touhid M.Shaikh

DiskBoss Enterprise version 8.4.16 buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | a6fdae67ed7fbf00f947fcf9d2978c0118c03da4e4413bceed8fb193d9da5b1d
Linux/x86_64 mkdir() Shellcode
Posted Sep 27, 2017
Authored by Touhid M.Shaikh

30 bytes small Linux/x86_64 mkdir() shellcode.

tags | shellcode
systems | linux
SHA-256 | 3154b02a88675f37e8780c81b32546679ba6686baf27481ec41777b0a348c642
Easy RM RMVB To DVD Burner 1.8.11 Buffer Overflow
Posted Aug 28, 2017
Authored by Touhid M.Shaikh

Easy RM RMVB to DVD Burner version 18.11 buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 0e6caeaabff62e5b13661c152cc35327130cb5693f71488479e4f3a2ad4a8b9e
Easy WMV/ASF/ASX To DVD Burner 2.3.11 Buffer Overflow
Posted Aug 28, 2017
Authored by Touhid M.Shaikh

Easy WMV/ASF/ASX to DVD Burner version 2.3.11 buffer overflow exploit.

tags | exploit, overflow
SHA-256 | e32cd0f9d448918e1a94e76e77bfb0ff63cbbf3418eb1d6d9c56182c8950bec5
Linux/x86-64 Reverse TCP Shell Shellcode
Posted Aug 21, 2017
Authored by Touhid M.Shaikh

153 bytes small Linux/x86-64 reverse TCP shell shellcode that binds to 192.168.1.2:4444.

tags | shell, x86, tcp, shellcode
systems | linux
SHA-256 | 8b515c4af9fd6072328a06afeedd6ffde3a78da3aa4cdccef2dfa347f402c019
RealTime RWR-3G-100 Router Cross Site Request Forgery
Posted Aug 12, 2017
Authored by Touhid M.Shaikh

RealTime RWR-3G-100 router suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 9958db6e4a33e71786b0330d416a220f1c73c39d6218e05719d261b1aae1c47a
Piwigo User Tag 0.9.0 Cross Site Scripting
Posted Aug 10, 2017
Authored by Touhid M.Shaikh

Piwigo User Tag plugin version 0.9.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | eca16ec9ac75f9160152a2940e049c3769c072813d65672d639e732dae29b8ee
VehicleWorkshop Arbitrary File Upload
Posted Aug 1, 2017
Authored by Touhid M.Shaikh

VehicleWorkshop suffers from a remote file upload vulnerability.

tags | exploit, remote, file upload
SHA-256 | d432afd836ca92cee5515ba67567d6329a5ad23eae90e05a8d2bc57a312f34b9
VehicleWorkshop Authentication Bypass / SQL Injection
Posted Aug 1, 2017
Authored by Touhid M.Shaikh

VehicleWorkshop suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection, bypass
SHA-256 | 0bd45c9f3ab5b3cdca856bbe8862d749b5c68c5efa5fb016a3e7901d024a0f44
Easy File Sharing Web Server 7.2 Buffer Overflow
Posted Jun 12, 2017
Authored by Touhid M.Shaikh

Easy File Sharing Web Server version 7.2 suffers from a buffer overflow vulnerability.

tags | exploit, web, overflow
SHA-256 | 72fcbe905756ed1d42583e8d6fcd1c8a372e756ccb0cc06867748487c3ce9915
Easy File Sharing Web Server 7.2 Authentication Bypass
Posted Jun 11, 2017
Authored by Touhid M.Shaikh

Easy File Sharing Web Server version 7.2 suffers from an authentication bypass vulnerability. suffers from a bypass vulnerability.

tags | exploit, web, bypass
SHA-256 | 570b5f08978aa0a7fc9b1fd1bf9dfdca0cbfbd6fd0cbce1b9f589eab22ef8f01
Linux/x86-64 JMP CALL POP /bin/sh Shellcode
Posted Jun 5, 2017
Authored by Touhid M.Shaikh

31 bytes small Linux/x86-64 JMP CALL POP /bin/sh shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 95dad731ba6f9381cfcdea23e78eed4588b15b3cc9e26f9b88bfc03648697c81
Piwigo Facetag 0.0.3 SQL Injection
Posted May 31, 2017
Authored by Touhid M.Shaikh

Piwigo Facetag plugin version 0.0.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3f72fcb8ece0adc26b0ccbdbcfeb68fd34b23af7b91df6f5b9dc2fe3a3041a20
Aries QWR-1104 Wireless-N Cross Site Scripting
Posted May 27, 2017
Authored by Touhid M.Shaikh

Aries QWR-1104 Wireless-N router suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e5003c524c37548060cc231edf0fc24067399ffb00f05fa475cf690683a5c17d
PlaySMS 1.4 Remote Code Execution
Posted May 20, 2017
Authored by Touhid M.Shaikh

PlaySMS version 1.4 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 3c8a63c95cb5cd39de2c05874efd2f98a9c719765b28143345cabc3ef991b525
D-Link DIR-600M Wireless N 150 Authentication Bypass
Posted May 20, 2017
Authored by Touhid M.Shaikh

D-Link DIR-600M Wireless N 150 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | d2de4c1ec6d915ce30568940e60b15df8daef411482a245f56c00ebbe5c653ba
PlaySms 1.4 Remote Code Execution
Posted May 16, 2017
Authored by Touhid M.Shaikh

PlaySms version 1.4 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 9878587e8dfdd2451061b778be33b8def9e7dcb8aa71d1ad6556d9627a73ab36
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close